keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
Top Read Articles
Published in last 1 year |  In last 2 years |  In last 3 years |  All

1 [“Internet Plus” Mobile Power: Analysis the Network Security of ZTE] 2016 Vol.2(4):288-298
[Abstract] ( 655 ) [HTML 0 KB][PDF 1637 KB] (439)
2 [Survey of Hash Functions] 2015 Vol.1(1):19-30
Wang Xiaoyun1,2 and Yu Hongbo3 [Abstract] ( 577 ) [HTML 0 KB][PDF 11279 KB] (3034)
3 [New Trends of the Main Countries Cybersecurity Strategy in 2015] 2015 Vol.1(1):2-08
Cui Chuanzhen [Abstract] ( 551 ) [HTML 0 KB][PDF 1246 KB] (545)
4 [Time Machine Forensic] 2016 Vol.2(4):307-316
[Abstract] ( 522 ) [HTML 0 KB][PDF 5953 KB] (250)
5 [Overview on SM9 Identity Based Cryptographic Algorithm] 2016 Vol.2(11):1008-1027
[Abstract] ( 522 ) [HTML 0 KB][PDF 13949 KB] (975)
6 [Differential Privacy and Applications] 2015 Vol.1(3):224-229
[Abstract] ( 495 ) [HTML 0 KB][PDF 5750 KB] (502)
7 [Discipline Construction and Talents Training of Cyberspace Security] 2015 Vol.1(2):149-154
Li Jianhua Qiu Weidong Meng Kui Wu Jun [Abstract] ( 423 ) [HTML 0 KB][PDF 5250 KB] (401)
8 [Overview of Electronic Data Forensics Technology] 2016 Vol.2(4):299-306
[Abstract] ( 386 ) [HTML 0 KB][PDF 5966 KB] (298)
9 [An Overview of Hadoop Security Framework] 2016 Vol.2(8):684-698
[Abstract] ( 379 ) [HTML 0 KB][PDF 12399 KB] (173)
10 [Study of Finger Vein Recognition Application] 2016 Vol.2(1):86-92
[Abstract] ( 363 ) [HTML 0 KB][PDF 5765 KB] (331)
11 [Research on Data Reading Technology of Android Smart Phone Based on eMMC] 2016 Vol.2(4):317-323
[Abstract] ( 354 ) [HTML 0 KB][PDF 5047 KB] (262)
12 [ Research on The Technology Architecture of Big Data Security and Privacy System] 2016 Vol.2(3):244-250
Lv Xin [Abstract] ( 334 ) [HTML 0 KB][PDF 6172 KB] (437)
13 [Research of Threat Intelligence Sharing and Using for Cyber Attack Attribution] 2015 Vol.1(1):31-36
Yang Zeming, Li Qiang, Liu Junrong, and Liu Baoxu [Abstract] ( 329 ) [HTML 0 KB][PDF 5527 KB] (502)
14 [DDoS Detection Framework based on Hadoop] 2015 Vol.1(3):261-266
[Abstract] ( 321 ) [HTML 0 KB][PDF 5465 KB] (434)
15 [An APT Defensive Approach Based on Big Data Analysis] 2015 Vol.1(3):230-237
[Abstract] ( 312 ) [HTML 0 KB][PDF 7888 KB] (274)
16 [A C# Source Code SQL Injection Attack Detection Algorithm Based on Abstract Syntax Tree] 2015 Vol.1(2):112-125
Sun Wei Chen Lin [Abstract] ( 291 ) [HTML 0 KB][PDF 10193 KB] (238)
17 [Security Architecture and Key Technologies of Blockchain] 2016 Vol.2(12):1090-1097
Yan Zhu [Abstract] ( 289 ) [HTML 0 KB][PDF 6838 KB] (297)
18 [A Study of Secure Deduplication Systems and Key Technologies] 2015 Vol.1(3):245-252
[Abstract] ( 286 ) [HTML 0 KB][PDF 7871 KB] (215)
19 [Research on the Architecture of Big Data Security Assurance System Improved ] 2015 Vol.1(3):211-216
Lv Xin [Abstract] ( 279 ) [HTML 0 KB][PDF 7192 KB] (325)
20 [A Survey of Fingerprint Recognition Technology] 2016 Vol.2(4):343-355
[Abstract] ( 275 ) [HTML 0 KB][PDF 10838 KB] (172)
21 [Webshell Detection Method Research Based on Web Log] 2016 Vol.2(1):66-73
[Abstract] ( 274 ) [HTML 0 KB][PDF 5409 KB] (335)
22 [Overview of Voiceprint Recognition Technology and Applications] 2016 Vol.2(1):44-57
[Abstract] ( 256 ) [HTML 0 KB][PDF 12707 KB] (201)
23 [Big Data Theme Introduction] 2015 Vol.1(3):203-204
Zhang Xiaosong [Abstract] ( 253 ) [HTML 0 KB][PDF 703 KB] (265)
24 [An Analytical Method of Mobile Phone Packet Capture Based on Android System] 2016 Vol.2(4):339-342
[Abstract] ( 248 ) [HTML 0 KB][PDF 2945 KB] (175)
25 [A Survey of Future Internet Architecture and Security Design] 2015 Vol.1(1):9-18
Chen Zhong1) Guan Zhi1),2) Meng HongWei1) Meng ZiQian1) [Abstract] ( 247 ) [HTML 0 KB][PDF 9255 KB] (341)
26 [The Core Security in Big Data Industrialization] 2015 Vol.1(3):205-210
陈瑞东 [Abstract] ( 238 ) [HTML 0 KB][PDF 2889 KB] (357)
27 [Research of Cryptography Technologies for Big Data Security] 2015 Vol.1(3):238-244
Zhang Xiaosong [Abstract] ( 233 ) [HTML 0 KB][PDF 7091 KB] (316)
28 [“Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background] 2016 Vol.2(5):384-395
[Abstract] ( 233 ) [HTML 0 KB][PDF 1491 KB] (620)
29 [Research and Progress of the Cyber Security Standardization of Smart City] 2016 Vol.2(5):442-446
[Abstract] ( 229 ) [HTML 0 KB][PDF 4021 KB] (241)
Copyright © Editorial Board of Journal of Information Security Research