keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
Top Read Articles
Published in last 1 year |  In last 2 years |  In last 3 years |  All

1 [Survey of Hash Functions] 2015 Vol.1(1):19-30
Wang Xiaoyun1,2 and Yu Hongbo3 [Abstract] ( 764 ) [HTML 0 KB][PDF 11279 KB] (3124)
2 [“Internet Plus” Mobile Power: Analysis the Network Security of ZTE] 2016 Vol.2(4):288-298
[Abstract] ( 687 ) [HTML 0 KB][PDF 1637 KB] (548)
3 [Overview on SM9 Identity Based Cryptographic Algorithm] 2016 Vol.2(11):1008-1027
[Abstract] ( 663 ) [HTML 0 KB][PDF 13949 KB] (4642)
4 [New Trends of the Main Countries Cybersecurity Strategy in 2015] 2015 Vol.1(1):2-08
Cui Chuanzhen [Abstract] ( 594 ) [HTML 0 KB][PDF 1246 KB] (590)
5 [Time Machine Forensic] 2016 Vol.2(4):307-316
[Abstract] ( 573 ) [HTML 0 KB][PDF 5953 KB] (381)
6 [Differential Privacy and Applications] 2015 Vol.1(3):224-229
[Abstract] ( 558 ) [HTML 0 KB][PDF 5750 KB] (645)
7 [Discipline Construction and Talents Training of Cyberspace Security] 2015 Vol.1(2):149-154
Li Jianhua Qiu Weidong Meng Kui Wu Jun [Abstract] ( 468 ) [HTML 0 KB][PDF 5250 KB] (491)
8 [An Overview of Hadoop Security Framework] 2016 Vol.2(8):684-698
[Abstract] ( 451 ) [HTML 0 KB][PDF 12399 KB] (199)
9 [Overview of Electronic Data Forensics Technology] 2016 Vol.2(4):299-306
[Abstract] ( 412 ) [HTML 0 KB][PDF 5966 KB] (447)
10 [ Research on The Technology Architecture of Big Data Security and Privacy System] 2016 Vol.2(3):244-250
Lv Xin [Abstract] ( 397 ) [HTML 0 KB][PDF 6172 KB] (490)
11 [Study of Finger Vein Recognition Application] 2016 Vol.2(1):86-92
[Abstract] ( 394 ) [HTML 0 KB][PDF 5765 KB] (372)
12 [Research on Data Reading Technology of Android Smart Phone Based on eMMC] 2016 Vol.2(4):317-323
[Abstract] ( 386 ) [HTML 0 KB][PDF 5047 KB] (447)
13 [Research of Threat Intelligence Sharing and Using for Cyber Attack Attribution] 2015 Vol.1(1):31-36
Yang Zeming, Li Qiang, Liu Junrong, and Liu Baoxu [Abstract] ( 384 ) [HTML 0 KB][PDF 5527 KB] (595)
14 [DDoS Detection Framework based on Hadoop] 2015 Vol.1(3):261-266
[Abstract] ( 365 ) [HTML 0 KB][PDF 5465 KB] (577)
15 [Research on the Architecture of Big Data Security Assurance System Improved ] 2015 Vol.1(3):211-216
Lv Xin [Abstract] ( 354 ) [HTML 0 KB][PDF 7192 KB] (429)
16 [A C# Source Code SQL Injection Attack Detection Algorithm Based on Abstract Syntax Tree] 2015 Vol.1(2):112-125
Sun Wei Chen Lin [Abstract] ( 343 ) [HTML 0 KB][PDF 10193 KB] (412)
17 [A Study of Secure Deduplication Systems and Key Technologies] 2015 Vol.1(3):245-252
[Abstract] ( 343 ) [HTML 0 KB][PDF 7871 KB] (235)
18 [An APT Defensive Approach Based on Big Data Analysis] 2015 Vol.1(3):230-237
[Abstract] ( 340 ) [HTML 0 KB][PDF 7888 KB] (323)
19 [Security Architecture and Key Technologies of Blockchain] 2016 Vol.2(12):1090-1097
Yan Zhu [Abstract] ( 336 ) [HTML 0 KB][PDF 6838 KB] (363)
20 [Webshell Detection Method Research Based on Web Log] 2016 Vol.2(1):66-73
[Abstract] ( 315 ) [HTML 0 KB][PDF 5409 KB] (458)
21 [A Survey of Fingerprint Recognition Technology] 2016 Vol.2(4):343-355
[Abstract] ( 306 ) [HTML 0 KB][PDF 10838 KB] (236)
22 [Overview of Voiceprint Recognition Technology and Applications] 2016 Vol.2(1):44-57
[Abstract] ( 305 ) [HTML 0 KB][PDF 12707 KB] (221)
23 [Research of Cryptography Technologies for Big Data Security] 2015 Vol.1(3):238-244
Zhang Xiaosong [Abstract] ( 299 ) [HTML 0 KB][PDF 7091 KB] (365)
24 [Big Data Theme Introduction] 2015 Vol.1(3):203-204
Zhang Xiaosong [Abstract] ( 293 ) [HTML 0 KB][PDF 703 KB] (303)
25 [Overview on SM4 Algorithm] 2016 Vol.2(11):995-1007
[Abstract] ( 284 ) [HTML 0 KB][PDF 8653 KB] (313)
26 [A Review on Image Reversible Data Hiding] 2016 Vol.2(8):729-734
[Abstract] ( 275 ) [HTML 0 KB][PDF 5707 KB] (466)
27 [“Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background] 2016 Vol.2(5):384-395
[Abstract] ( 274 ) [HTML 0 KB][PDF 1491 KB] (811)
28 [The Core Security in Big Data Industrialization] 2015 Vol.1(3):205-210
陈瑞东 [Abstract] ( 272 ) [HTML 0 KB][PDF 2889 KB] (479)
29 [Research on Strategy of Malicious URL MultiLayer Filtering Detection Model] 2016 Vol.2(1):80-85
[Abstract] ( 272 ) [HTML 0 KB][PDF 5042 KB] (455)
Copyright © Editorial Board of Journal of Information Security Research