keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
Top Read Articles
Published in last 1 year |  In last 2 years |  In last 3 years |  All

1 [A Glimpse at Blockchain: From the Perspective of Privacy] 2017 Vol.3(11):981-989
[Abstract] ( 143 ) [HTML 0 KB][PDF 7718 KB] (113)
2 [Network intrusion detection model based on convolutional neural network] 2017 Vol.3(11):990-994
[Abstract] ( 111 ) [HTML 0 KB][PDF 3567 KB] (161)
3 [Extraterritorial Experience and Lessons Learned from the Construction of the Minors Network Protecting System] 2017 Vol.3(12):1068-1074
[Abstract] ( 108 ) [HTML 0 KB][PDF 5982 KB] (45)
4 [A Survey of the Basic Technology and Application of Block Chain ] 2017 Vol.3(11):968-980
[Abstract] ( 101 ) [HTML 0 KB][PDF 11096 KB] (82)
5 [Risk Control System For Mobile Bank Based on Artificial Intelligence] 2017 Vol.3(11):1000-1005
[Abstract] ( 96 ) [HTML 0 KB][PDF 4953 KB] (79)
6 [From “Latter-wit” to “Nip in the Bud”] 2017 Vol.3(11):962-965
[Abstract] ( 79 ) [HTML 0 KB][PDF 700 KB] (129)
7 [Study on loan fraud prevention algorithm based on maximum clique] 2017 Vol.3(11):1017-1019
[Abstract] ( 78 ) [HTML 0 KB][PDF 1505 KB] (85)
8 [Improved random forest algorithm and its application in Android malware detection] 2017 Vol.3(11):1020-1027
[Abstract] ( 77 ) [HTML 0 KB][PDF 4155 KB] (90)
9 [Research on the Ethical and Legal Risk of Artificial Intelligence] 2017 Vol.3(12):1080-1090
[Abstract] ( 74 ) [HTML 0 KB][PDF 9629 KB] (29)
10 [Overview on Information Content Security of Cyberspace] 2017 Vol.3(12):1115-1118
[Abstract] ( 74 ) [HTML 0 KB][PDF 3370 KB] (92)
11 [Artificial Intelligence to Promote Precision Marketing Network] 2017 Vol.3(11):1011-1016
[Abstract] ( 71 ) [HTML 0 KB][PDF 4444 KB] (71)
12 [Sentiment Analysis of Aerospace Microblog Using SVM ] 2017 Vol.3(12):1129-1133
[Abstract] ( 67 ) [HTML 0 KB][PDF 4335 KB] (52)
13 [Online Rumor Governance in the View of "Cybersecurity Law of the People’s Republic of China"] 2017 Vol.3(12):1091-1096
[Abstract] ( 65 ) [HTML 0 KB][PDF 5064 KB] (57)
14 [VEDA, Establishing the AI Dynamic Defense System for Cyber Security] 2017 Vol.3(12):1058-1066
[Abstract] ( 64 ) [HTML 0 KB][PDF 1526 KB] (81)
15 [Opinions on Critical Information Infrastructure Protection of Power System at Network Age] 2017 Vol.3(12):1134-1140
[Abstract] ( 64 ) [HTML 0 KB][PDF 1007 KB] (74)
16 [A Research on U.S. Information System Audit] 2017 Vol.3(12):1108-1114
[Abstract] ( 63 ) [HTML 0 KB][PDF 5886 KB] (50)
17 [Research on the Legal Dilemma and Countermeasures of Personal Information Protection in Big Data Age] 2017 Vol.3(12):1097-1101
[Abstract] ( 63 ) [HTML 0 KB][PDF 4468 KB] (65)
18 [The Network Information Regulation in the We Media Era] 2017 Vol.3(12):1102-1107
[Abstract] ( 61 ) [HTML 0 KB][PDF 5563 KB] (52)
19 [International Comparison and China Program for the Right of Forgotten] 2017 Vol.3(12):1075-1079
[Abstract] ( 58 ) [HTML 0 KB][PDF 4664 KB] (66)
20 [The Application and Analysis of Artificial Intelligence in Bank] 2017 Vol.3(12):1125-1128
[Abstract] ( 58 ) [HTML 0 KB][PDF 3369 KB] (62)
21 [Research on Domestic Security Browser] 2018 Vol.4(1):31-39
[Abstract] ( 57 ) [HTML 0 KB][PDF 6967 KB] (47)
22 [The analysis of the application of biometric technology in commercial Banks] 2017 Vol.3(11):1006-1010
[Abstract] ( 56 ) [HTML 0 KB][PDF 4073 KB] (57)
23 [Defects and Breakthroughs of Current Cyberspace Security Technology System] 2017 Vol.3(12):1141-1144
[Abstract] ( 52 ) [HTML 0 KB][PDF 886 KB] (91)
24 [Accelerating The Construction Of The National Cloud Security System] 2017 Vol.3(12):1119-1124
[Abstract] ( 51 ) [HTML 0 KB][PDF 4617 KB] (65)
25 [Research on Deceptive Technology of Mobile Browser Based on Fuzzing] 2017 Vol.3(11):1028-1033
[Abstract] ( 50 ) [HTML 0 KB][PDF 5267 KB] (67)
26 [Database localization of alternative are faced with the problem and countermeasure research] 2018 Vol.4(1):24-30
[Abstract] ( 48 ) [HTML 0 KB][PDF 5874 KB] (57)
27 [Build an Independent IT Eco-System as the Basement of Network Security] 2018 Vol.4(1):2-5
[Abstract] ( 47 ) [HTML 0 KB][PDF 668 KB] (92)
28 [Study on Metal Attributions of Defense Decision of Networks Security from Cognitive Views] 2017 Vol.3(11):995-999
[Abstract] ( 46 ) [HTML 0 KB][PDF 4309 KB] (62)
Copyright © Editorial Board of Journal of Information Security Research