keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
Top Read Articles
Published in last 1 year |  In last 2 years |  In last 3 years |  All

1 [Meiya Pico,Innovation to Enhance the Core Technology of Cybersecurity] 2017 Vol.3(9):770-780
[Abstract] ( 203 ) [HTML 0 KB][PDF 1952 KB] (70)
2 [The TPCM Platform Measurement and Control Design] 2017 Vol.3(4):310-315
[Abstract] ( 170 ) [HTML 0 KB][PDF 4044 KB] (104)
3 [The Design of Smart Contracts on Crowd Funding Private Blockchain] 2017 Vol.3(3):211-219
[Abstract] ( 166 ) [HTML 0 KB][PDF 7360 KB] (160)
4 [Research and Application of Trusted Software Base] 2017 Vol.3(4):316-322
[Abstract] ( 165 ) [HTML 0 KB][PDF 4520 KB] (82)
5 [Research on the Sentiment Analysis Model of Product Reviews Based on Machine Learning] 2017 Vol.3(2):166-170
[Abstract] ( 143 ) [HTML 0 KB][PDF 3979 KB] (93)
6 [Research on the Structural Security of Private Cloud in Government and Enterprise] 2017 Vol.3(2):188-192
[Abstract] ( 131 ) [HTML 0 KB][PDF 1236 KB] (137)
7 [Research on the Legislation of Data Localization] 2017 Vol.3(2):182-187
[Abstract] ( 130 ) [HTML 0 KB][PDF 5587 KB] (94)
8 [Analysis of Information Security Vulnerabilities and Penetration Attack Based on Social Engineering] 2017 Vol.3(2):116-122
[Abstract] ( 125 ) [HTML 0 KB][PDF 5294 KB] (183)
9 [Microsoft China: The Implementation of Information Security and Cooperative Strategy] 2017 Vol.3(5):386-397
[Abstract] ( 120 ) [HTML 0 KB][PDF 1668 KB] (155)
10 [ Blockchain Technology and Its Applications] 2017 Vol.3(3):237-245
Zheng Huang [Abstract] ( 112 ) [HTML 0 KB][PDF 7380 KB] (165)
11 [Blockchain Technology and Its Prospect of Industrial Application] 2017 Vol.3(3):200-210
[Abstract] ( 106 ) [HTML 0 KB][PDF 9369 KB] (152)
12 [A Review on Security Ontology: Document Analysis from 2010 to 2016] 2017 Vol.3(2):151-159
[Abstract] ( 106 ) [HTML 0 KB][PDF 6880 KB] (88)
13 [Network Intrusion Detection Method Based on Data Mining] 2017 Vol.3(9):810-816
[Abstract] ( 105 ) [HTML 0 KB][PDF 4877 KB] (67)
14 [An Overview of Trusted Computing Structure Specification] 2017 Vol.3(4):299-304
[Abstract] ( 102 ) [HTML 0 KB][PDF 4215 KB] (153)
15 [Improvement of AntColony Text Clustering Algorithm Based on “Intelligent Information Center”] 2017 Vol.3(2):160-165
[Abstract] ( 101 ) [HTML 0 KB][PDF 4272 KB] (71)
16 [Secure Operation Platform for Cloud Service] 2017 Vol.3(5):412-417
[Abstract] ( 97 ) [HTML 0 KB][PDF 5505 KB] (81)
17 [Detection Method of Android Malware by Using Permission] 2017 Vol.3(9):817-822
[Abstract] ( 97 ) [HTML 0 KB][PDF 4627 KB] (75)
18 [Research of Identifying Web Vulnerability Scanner Based on Finite State Machine] 2017 Vol.3(2):123-128
[Abstract] ( 95 ) [HTML 0 KB][PDF 4048 KB] (142)
19 [Research of Electronic Invoice System Based on Block Chain] 2017 Vol.3(6):516-522
[Abstract] ( 91 ) [HTML 0 KB][PDF 3190 KB] (176)
20 [Building Cyber Security Defense by Trusted Computing 3.0] 2017 Vol.3(4):290-298
[Abstract] ( 88 ) [HTML 0 KB][PDF 1075 KB] (297)
21 [Semantics Based Webshell Detection Method Research] 2017 Vol.3(2):145-150
[Abstract] ( 84 ) [HTML 0 KB][PDF 4585 KB] (144)
22 [Three-Dimensional Way of Acorn Network in Industrial Control Cybersecurity] 2017 Vol.3(8):0-0
null [Abstract] ( 84 ) [HTML 0 KB][PDF 3703 KB] (57)
23 [Analysis on American Critical Infrastructure Security Management] 0 Vol.():0-0
null [Abstract] ( 80 ) [HTML 0 KB][PDF 10310 KB] (23)
24 [A Glimpse at Blockchain: From the Perspective of Privacy] 2017 Vol.3(11):981-989
[Abstract] ( 79 ) [HTML 0 KB][PDF 7718 KB] (54)
25 [Research on Android Application Permission Monitor] 2017 Vol.3(2):139-144
[Abstract] ( 79 ) [HTML 0 KB][PDF 4793 KB] (112)
26 [Fine-Grained Access Control and Audit Management in Big Data Environment] 2017 Vol.3(6):509-516
[Abstract] ( 78 ) [HTML 0 KB][PDF 2431 KB] (84)
27 [CFL Authentication System and Its Applications in the Blockchain] 2017 Vol.3(3):220-226
[Abstract] ( 77 ) [HTML 0 KB][PDF 5196 KB] (172)
28 [A Network Security Protection Research for Industrial Control System] 2017 Vol.3(2):171-176
[Abstract] ( 76 ) [HTML 0 KB][PDF 5018 KB] (164)
29 [A Survey of USB HID Attack and Defense Technology] 2017 Vol.3(2):129-138
[Abstract] ( 75 ) [HTML 0 KB][PDF 8524 KB] (61)
Copyright © Editorial Board of Journal of Information Security Research