keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
Top Read Articles
Published in last 1 year |  In last 2 years |  In last 3 years |  All

1 [Meiya Pico,Innovation to Enhance the Core Technology of Cybersecurity] 2017 Vol.3(9):770-780
[Abstract] ( 228 ) [HTML 0 KB][PDF 1952 KB] (88)
2 [Microsoft China: The Implementation of Information Security and Cooperative Strategy] 2017 Vol.3(5):386-397
[Abstract] ( 153 ) [HTML 0 KB][PDF 1668 KB] (166)
3 [Network Intrusion Detection Method Based on Data Mining] 2017 Vol.3(9):810-816
[Abstract] ( 131 ) [HTML 0 KB][PDF 4877 KB] (77)
4 [Secure Operation Platform for Cloud Service] 2017 Vol.3(5):412-417
[Abstract] ( 129 ) [HTML 0 KB][PDF 5505 KB] (89)
5 [Detection Method of Android Malware by Using Permission] 2017 Vol.3(9):817-822
[Abstract] ( 126 ) [HTML 0 KB][PDF 4627 KB] (85)
6 [Three-Dimensional Way of Acorn Network in Industrial Control Cybersecurity] 2017 Vol.3(8):0-0
null [Abstract] ( 115 ) [HTML 0 KB][PDF 3703 KB] (70)
7 [A Glimpse at Blockchain: From the Perspective of Privacy] 2017 Vol.3(11):981-989
[Abstract] ( 114 ) [HTML 0 KB][PDF 7718 KB] (71)
8 [Research of Electronic Invoice System Based on Block Chain] 2017 Vol.3(6):516-522
[Abstract] ( 110 ) [HTML 0 KB][PDF 3190 KB] (218)
9 [Fine-Grained Access Control and Audit Management in Big Data Environment] 2017 Vol.3(6):509-516
[Abstract] ( 109 ) [HTML 0 KB][PDF 2431 KB] (99)
10 [Analysis on American Critical Infrastructure Security Management] 0 Vol.():0-0
null [Abstract] ( 104 ) [HTML 0 KB][PDF 10310 KB] (24)
11 [Overview of Big Data Forensics Technology] 2017 Vol.3(9):795-802
[Abstract] ( 99 ) [HTML 0 KB][PDF 6061 KB] (98)
12 [Construct Secure Mobile Office Environment] 2017 Vol.3(9):841-845
[Abstract] ( 94 ) [HTML 0 KB][PDF 3582 KB] (63)
13 [Research on the Technology Architecture of Enterprise Trust Service Based On Trusted Identity Authentication] 2017 Vol.3(9):832-840
[Abstract] ( 92 ) [HTML 0 KB][PDF 7168 KB] (33)
14 [Analysis on Social Media Text Orientation Oriented on Public Opinion] 2017 Vol.3(9):781-794
Yan Zhu [Abstract] ( 91 ) [HTML 0 KB][PDF 9755 KB] (75)
15 [Research on SSL/TLS Protocol Configuration Security Assessment Model Based on Fuzzy Comprehensive Analysis] 2017 Vol.3(6):538-547
[Abstract] ( 88 ) [HTML 0 KB][PDF 1124 KB] (56)
16 [Extraterritorial Experience and Lessons Learned from the Construction of the Minors Network Protecting System] 2017 Vol.3(12):1068-1074
[Abstract] ( 88 ) [HTML 0 KB][PDF 5982 KB] (24)
17 [Research on Intelligent Manufacturing Information System Security] 2017 Vol.3(8):0-0
null [Abstract] ( 87 ) [HTML 0 KB][PDF 8305 KB] (30)
18 [A Survey of the Basic Technology and Application of Block Chain ] 2017 Vol.3(11):968-980
[Abstract] ( 83 ) [HTML 0 KB][PDF 11096 KB] (59)
19 [Network intrusion detection model based on convolutional neural network] 2017 Vol.3(11):990-994
[Abstract] ( 80 ) [HTML 0 KB][PDF 3567 KB] (118)
20 [Risk Control System For Mobile Bank Based on Artificial Intelligence] 2017 Vol.3(11):1000-1005
[Abstract] ( 79 ) [HTML 0 KB][PDF 4953 KB] (47)
21 [A Survey of Botnet] 2017 Vol.3(7):589-600
[Abstract] ( 78 ) [HTML 0 KB][PDF 9509 KB] (60)
22 [Trusted Computing: Constructing a New Architecture for Cloud Security] 2017 Vol.3(5):440-450
[Abstract] ( 78 ) [HTML 0 KB][PDF 9099 KB] (83)
23 [A Privacy Preserving Scheme for Continuous Data Publishing Based on Clustering and Segmentation Technology] 2017 Vol.3(10):0-0
[Abstract] ( 76 ) [HTML 0 KB][PDF 1613 KB] (35)
24 [Promoting Information Security Is the Responsibility of the Enterprise] 2017 Vol.3(5):427-431
[Abstract] ( 75 ) [HTML 0 KB][PDF 476 KB] (82)
25 [Analysis of the Application of Cryptographic Algorithms in Eduroam] 2017 Vol.3(6):501-509
[Abstract] ( 73 ) [HTML 0 KB][PDF 1932 KB] (63)
26 [The Processing Monitoring Framework and the Random Authorization using Blockchain] 2017 Vol.3(8):0-0
null [Abstract] ( 70 ) [HTML 0 KB][PDF 4926 KB] (72)
27 [Scheme of Encrypted Cloud Data Transmission and Achieve the Data Integrity Valid] 2017 Vol.3(7):647-651
[Abstract] ( 69 ) [HTML 0 KB][PDF 6250 KB] (117)
28 [A Static Android Repackaged Malicious Application Detection Method] 2017 Vol.3(8):0-0
Sun Wei [Abstract] ( 68 ) [HTML 0 KB][PDF 6864 KB] (20)
Copyright © Editorial Board of Journal of Information Security Research