Works matching IS 25233246 AND DT 2024 AND VI 7 AND IP 1
1
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00306-9
- Yin, Peng;
- Zhu, Sanli;
- Yu, Yang;
- Wang, Ziqian;
- Chen, Zhuangzhi
- Article
2
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00256-2
- Ji, Yunfeng;
- Zhang, Rui;
- Tao, Yang;
- Gao, Birou
- Article
3
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00306-9
- Yin, Peng;
- Zhu, Sanli;
- Yu, Yang;
- Wang, Ziqian;
- Chen, Zhuangzhi
- Article
4
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00293-x
- Yang, Qiantao;
- Du, Xuehui;
- Wu, Xiangyu;
- Wang, Wenjuan;
- Liu, Aodi;
- Wang, Shihao
- Article
5
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00287-9
- Dafoe, Josh;
- Chen, Niusen;
- Chen, Bo;
- Wang, Zhenlin
- Article
6
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00242-8
- Xu, Haochen;
- Geng, Xiaoyu;
- Liu, Junrong;
- Lu, Zhigang;
- Jiang, Bo;
- Liu, Yuling
- Article
7
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00324-7
- Luo, Xiangyang;
- Chen, Xingxing;
- Chen, Xiaofeng;
- Cheng, Qingfeng
- Article
8
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00252-6
- Akiirne, Ziad;
- Sghir, Abdellah;
- Bouzidi, Driss
- Article
9
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00298-6
- Zhao, Boyao;
- Chen, Haozhe;
- Zhang, Jie;
- Zhang, Weiming;
- Yu, Nenghai
- Article
10
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00228-6
- Bao, Jiawei;
- Ge, Jiangxia;
- Xue, Rui
- Article
11
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00259-z
- Liu, Jingzhi;
- Yang, Hongyi;
- Qu, Quanlei;
- Liu, Zhidong;
- Cao, Yang
- Article
12
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00250-8
- Wang, Nansen;
- Zhang, Jianing;
- Huang, Ju;
- Ou, Wei;
- Han, Wenbao;
- Zhang, Qionglu
- Article
13
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00250-8
- Wang, Nansen;
- Zhang, Jianing;
- Huang, Ju;
- Ou, Wei;
- Han, Wenbao;
- Zhang, Qionglu
- Article
14
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00245-5
- Xu, Jingjie;
- Wang, Ting;
- Lv, Mingqi;
- Chen, Tieming;
- Zhu, Tiantian;
- Ji, Baiyang
- Article
15
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00236-6
- An, Chao;
- Xiao, YuTing;
- Liu, HaiHang;
- Wu, Han;
- Zhang, Rui
- Article
16
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00289-7
- Article
17
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00258-0
- Article
18
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00299-5
- Article
19
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00249-1
- Yu, Haoran;
- Yang, Wenchuan;
- Cui, Baojiang;
- Sui, Runqi;
- Wu, Xuedong
- Article
20
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00257-1
- Li, Anyi;
- Xia, Qiqing;
- Zhu, Qianru;
- Yang, Li
- Article
21
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00226-8
- Wang, Baowei;
- Guo, Fengxiao;
- Liu, Yuting;
- Li, Bin;
- Yuan, Yi
- Article
22
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00314-9
- Ji, Yulong;
- Zou, Kunjin;
- Zou, Bin
- Article
23
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00297-7
- Yu, Haoran;
- Yang, Wenchuan;
- Cui, Baojiang;
- Sui, Runqi;
- Wu, Xuedong
- Article
24
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00251-7
- Arham, Aulia;
- Nugroho, Hanung Adi
- Article
25
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00253-5
- Article
26
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00254-4
- El Gaabouri, Ismail;
- Senhadji, Mohamed;
- Belkasmi, Mostafa;
- El Bhiri, Brahim
- Article
27
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00255-3
- Liu, Yuming;
- Wang, Yong;
- Feng, Hao
- Article
28
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00221-z
- Talukder, Md. Alamin;
- Hossen, Rakib;
- Uddin, Md Ashraf;
- Uddin, Mohammed Nasir;
- Acharjee, Uzzal Kumar
- Article
29
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00220-0
- Chen, Yincen;
- Guo, Yi;
- Liang, Xuanyu;
- Song, Ling;
- Yang, Qianqian
- Article
30
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00259-z
- Liu, Jingzhi;
- Yang, Hongyi;
- Qu, Quanlei;
- Liu, Zhidong;
- Cao, Yang
- Article
31
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00224-w
- Yin, Zhongxu;
- Song, Yiran;
- Zong, Guoxiao
- Article
32
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00248-2
- Xie, Yinghong;
- Hao, Yan;
- Han, Xiaowei;
- Gao, Qiang;
- Yin, Biao
- Article
33
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00208-w
- Chen, Haobin;
- Yang, Yue;
- Lv, Siyi
- Article
34
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00216-w
- Hu, Mingxing;
- Liu, Zhen;
- Zhou, Yunhong
- Article
35
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00219-7
- Clinton, Urikhimbam Boby;
- Hoque, Nazrul;
- Robindro Singh, Khumukcham
- Article
36
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00204-0
- Wei, Benqiang;
- Lu, Xianhui
- Article
37
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00217-9
- Xu, Wenhan;
- Ma, Hui;
- Zhang, Rui
- Article
38
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00222-y
- Article
39
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00239-3
- Kadam, Sachin;
- Scaglione, Anna;
- Ravi, Nikhil;
- Peisert, Sean;
- Lunghino, Brent;
- Shumavon, Aram
- Article
40
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00246-4
- Wang, Yamei;
- You, Weijing;
- Zhang, Yuexin;
- Ye, Ayong;
- Xu, Li
- Article
41
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00241-9
- Alam, Shahid;
- Demir, Alper Kamil
- Article
42
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00234-8
- Kuznetsov, Mikhail;
- Novikova, Evgenia;
- Kotenko, Igor
- Article
43
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00223-x
- Kim, Chenset;
- So-In, Chakchai;
- Kongsorot, Yanika;
- Aimtongkham, Phet
- Article
44
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00214-y
- Jiang, Ziming;
- Zhou, Yongbin;
- Liu, Yuejun
- Article
45
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00210-2
- Chen, Kaini;
- Shen, Peisong;
- Lv, Kewei;
- Tian, Xue;
- Chen, Chi
- Article
46
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00279-9
- He, Juntao;
- Dai, Haoran;
- Sui, Runqi;
- Yuan, Xuejing;
- Liu, Dun;
- Feng, Hao;
- Liu, Xinyue;
- Yang, Wenchuan;
- Cui, Baojiang;
- Li, Kedan
- Article
47
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00240-w
- Xu, Boyuan;
- Gong, Yiru;
- Geng, Xiaoyu;
- Li, Yun;
- Dong, Cong;
- Liu, Song;
- Liu, Yuling;
- Jiang, Bo;
- Lu, Zhigang
- Article
48
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00247-3
- Zhao, Zhuo;
- Hsu, Chingfang;
- Harn, Lein;
- Xia, Zhe;
- Jiang, Xinyu;
- Liu, Liu
- Article
49
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00203-7
- Chuah, Edward;
- Suri, Neeraj
- Article
50
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00235-7
- Yuan, Jie;
- Xu, Rui;
- Wei, Xinghai;
- Miao, Keji;
- Liu, Dongxiao
- Article