Open Access
ARTICLE
Mingsen Mo1, Shan Ji2, Xiaowan Wang3,*, Ghulam Mohiuddin4, Yongjun Ren1
1 Engineering Research Center of Digital Forensics of Ministry of Education, School of Computer, Nanjing University of Information Science & Technology, Nanjing, 210044, China
2 Zhengde Polytechnic, Nanjing, 211106, China
3 Xi’an University of Posts & Telecommunications, Xi’an, 710061, China
4 Department of Cyber Security at VaporVM, Abu Dhabi, 999041, United Arab Emirates
* Corresponding Author: Xiaowan Wang. Email:
Computers, Materials & Continua 2023, 74(1), 37-53. https://doi.org/10.32604/cmc.2023.028843
Received 19 February 2022; Accepted 19 April 2022; Issue published 22 September 2022
View
Download
Like
Phishing Detection with Image Retrieval Based on Improved Texton Correlation Descriptor
Guoyuan Lin, Bowen Liu, Pengcheng...Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage
Zhiliang Deng, Yongjun Ren, Yepeng...A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access
Xin Jiang, Mingzhe Liu, Chen Yang,...Secure Model of Medical Data Sharing for Complex Scenarios
Wei She, Yue Hu, Zhao Tian, Guoning...Review of Access Control Model
Zhengtao Liu, Wen Gu, Jinyue Xia