Open Access
ARTICLE
Shenjian Xiao1, Xiaoli Qin1, Yanzhao Tian1,*, Zhongkai Dang2
1 School of Cyberspace Security, Hainan University, Haikou, 570208, China
2 National Computer Network Emergency Response Technical Team, Coordination Center of China, Beijing, 100029, China
* Corresponding Author: Yanzhao Tian. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.062324
Received 16 December 2024; Accepted 28 January 2025; Published online 12 March 2025
View
Download
Like
Inverted XML Access Control Model Based on Ontology Semantic Dependency
Meijuan Wang, Jian Wang, Lihong...Phishing Detection with Image Retrieval Based on Improved Texton Correlation Descriptor
Guoyuan Lin, Bowen Liu, Pengcheng...Seed Selection for Data Offloading Based on Social and Interest Graphs
Ying Li, Jianbo Li, Jianwei Chen,...Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage
Zhiliang Deng, Yongjun Ren, Yepeng...A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access
Xin Jiang, Mingzhe Liu, Chen Yang,...