keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
Top Read Articles
Published in last 1 year |  In last 2 years |  In last 3 years |  All

1 [“Internet Plus” Mobile Power: Analysis the Network Security of ZTE] 2016 Vol.2(4):288-298
[Abstract] ( 670 ) [HTML 0 KB][PDF 1637 KB] (465)
2 [Survey of Hash Functions] 2015 Vol.1(1):19-30
Wang Xiaoyun1,2 and Yu Hongbo3 [Abstract] ( 617 ) [HTML 0 KB][PDF 11279 KB] (3047)
3 [Overview on SM9 Identity Based Cryptographic Algorithm] 2016 Vol.2(11):1008-1027
[Abstract] ( 576 ) [HTML 0 KB][PDF 13949 KB] (2008)
4 [New Trends of the Main Countries Cybersecurity Strategy in 2015] 2015 Vol.1(1):2-08
Cui Chuanzhen [Abstract] ( 573 ) [HTML 0 KB][PDF 1246 KB] (557)
5 [Time Machine Forensic] 2016 Vol.2(4):307-316
[Abstract] ( 554 ) [HTML 0 KB][PDF 5953 KB] (300)
6 [Differential Privacy and Applications] 2015 Vol.1(3):224-229
[Abstract] ( 530 ) [HTML 0 KB][PDF 5750 KB] (549)
7 [Discipline Construction and Talents Training of Cyberspace Security] 2015 Vol.1(2):149-154
Li Jianhua Qiu Weidong Meng Kui Wu Jun [Abstract] ( 451 ) [HTML 0 KB][PDF 5250 KB] (417)
8 [An Overview of Hadoop Security Framework] 2016 Vol.2(8):684-698
[Abstract] ( 407 ) [HTML 0 KB][PDF 12399 KB] (182)
9 [Overview of Electronic Data Forensics Technology] 2016 Vol.2(4):299-306
[Abstract] ( 398 ) [HTML 0 KB][PDF 5966 KB] (343)
10 [Study of Finger Vein Recognition Application] 2016 Vol.2(1):86-92
[Abstract] ( 378 ) [HTML 0 KB][PDF 5765 KB] (344)
11 [Research on Data Reading Technology of Android Smart Phone Based on eMMC] 2016 Vol.2(4):317-323
[Abstract] ( 369 ) [HTML 0 KB][PDF 5047 KB] (309)
12 [ Research on The Technology Architecture of Big Data Security and Privacy System] 2016 Vol.2(3):244-250
Lv Xin [Abstract] ( 366 ) [HTML 0 KB][PDF 6172 KB] (455)
13 [Research of Threat Intelligence Sharing and Using for Cyber Attack Attribution] 2015 Vol.1(1):31-36
Yang Zeming, Li Qiang, Liu Junrong, and Liu Baoxu [Abstract] ( 359 ) [HTML 0 KB][PDF 5527 KB] (527)
14 [DDoS Detection Framework based on Hadoop] 2015 Vol.1(3):261-266
[Abstract] ( 345 ) [HTML 0 KB][PDF 5465 KB] (473)
15 [An APT Defensive Approach Based on Big Data Analysis] 2015 Vol.1(3):230-237
[Abstract] ( 325 ) [HTML 0 KB][PDF 7888 KB] (283)
16 [Security Architecture and Key Technologies of Blockchain] 2016 Vol.2(12):1090-1097
Yan Zhu [Abstract] ( 317 ) [HTML 0 KB][PDF 6838 KB] (321)
17 [A C# Source Code SQL Injection Attack Detection Algorithm Based on Abstract Syntax Tree] 2015 Vol.1(2):112-125
Sun Wei Chen Lin [Abstract] ( 312 ) [HTML 0 KB][PDF 10193 KB] (289)
18 [A Study of Secure Deduplication Systems and Key Technologies] 2015 Vol.1(3):245-252
[Abstract] ( 309 ) [HTML 0 KB][PDF 7871 KB] (219)
19 [Research on the Architecture of Big Data Security Assurance System Improved ] 2015 Vol.1(3):211-216
Lv Xin [Abstract] ( 309 ) [HTML 0 KB][PDF 7192 KB] (355)
20 [Webshell Detection Method Research Based on Web Log] 2016 Vol.2(1):66-73
[Abstract] ( 297 ) [HTML 0 KB][PDF 5409 KB] (351)
21 [A Survey of Fingerprint Recognition Technology] 2016 Vol.2(4):343-355
[Abstract] ( 292 ) [HTML 0 KB][PDF 10838 KB] (182)
22 [Overview of Voiceprint Recognition Technology and Applications] 2016 Vol.2(1):44-57
[Abstract] ( 287 ) [HTML 0 KB][PDF 12707 KB] (207)
23 [Big Data Theme Introduction] 2015 Vol.1(3):203-204
Zhang Xiaosong [Abstract] ( 270 ) [HTML 0 KB][PDF 703 KB] (277)
24 [Research of Cryptography Technologies for Big Data Security] 2015 Vol.1(3):238-244
Zhang Xiaosong [Abstract] ( 259 ) [HTML 0 KB][PDF 7091 KB] (334)
25 [A Survey of Future Internet Architecture and Security Design] 2015 Vol.1(1):9-18
Chen Zhong1) Guan Zhi1),2) Meng HongWei1) Meng ZiQian1) [Abstract] ( 258 ) [HTML 0 KB][PDF 9255 KB] (346)
26 [“Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background] 2016 Vol.2(5):384-395
[Abstract] ( 258 ) [HTML 0 KB][PDF 1491 KB] (664)
27 [Research on Strategy of Malicious URL MultiLayer Filtering Detection Model] 2016 Vol.2(1):80-85
[Abstract] ( 256 ) [HTML 0 KB][PDF 5042 KB] (376)
28 [The Core Security in Big Data Industrialization] 2015 Vol.1(3):205-210
陈瑞东 [Abstract] ( 255 ) [HTML 0 KB][PDF 2889 KB] (388)
29 [An Analytical Method of Mobile Phone Packet Capture Based on Android System] 2016 Vol.2(4):339-342
[Abstract] ( 254 ) [HTML 0 KB][PDF 2945 KB] (185)
Copyright © Editorial Board of Journal of Information Security Research