![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Research and Implementation of Cooperative Utilization of Network Security Devices for Typical Security Events
Aiming to improve the efficiency of network security protection, the collaborative utilization of network security devices is studied. Firstly, the utilization status quo of network security devices was analyz...
-
Chapter and Conference Paper
Steganalysis of Content-Adaptive JPEG Steganography Based on Ensemble of Convolutional Neural Networks with Image Preprocessing Using Gabor Filters
As we know, compared with the feature-based steganalysis method, deep convolutional neural networks (DCNNs) have firmly established themselves as the superior steganography detectors. In this paper, considerin...
-
Chapter and Conference Paper
Research on Technical System for Cyberspace Surveying and Map**
With the rapid development of the network, various businesses continue to appear, and the number of cyberspace protection targets is increasing exponentially. How to find out the family background, recognize t...