keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
Top Read Articles
Published in last 1 year |  In last 2 years |  In last 3 years |  All

1 [“Internet Plus” Mobile Power: Analysis the Network Security of ZTE] 2016 Vol.2(4):288-298
[Abstract] ( 657 ) [HTML 0 KB][PDF 1637 KB] (440)
2 [Survey of Hash Functions] 2015 Vol.1(1):19-30
Wang Xiaoyun1,2 and Yu Hongbo3 [Abstract] ( 579 ) [HTML 0 KB][PDF 11279 KB] (3035)
3 [New Trends of the Main Countries Cybersecurity Strategy in 2015] 2015 Vol.1(1):2-08
Cui Chuanzhen [Abstract] ( 554 ) [HTML 0 KB][PDF 1246 KB] (545)
4 [Overview on SM9 Identity Based Cryptographic Algorithm] 2016 Vol.2(11):1008-1027
[Abstract] ( 530 ) [HTML 0 KB][PDF 13949 KB] (1027)
5 [Time Machine Forensic] 2016 Vol.2(4):307-316
[Abstract] ( 525 ) [HTML 0 KB][PDF 5953 KB] (251)
6 [Differential Privacy and Applications] 2015 Vol.1(3):224-229
[Abstract] ( 497 ) [HTML 0 KB][PDF 5750 KB] (503)
7 [Discipline Construction and Talents Training of Cyberspace Security] 2015 Vol.1(2):149-154
Li Jianhua Qiu Weidong Meng Kui Wu Jun [Abstract] ( 426 ) [HTML 0 KB][PDF 5250 KB] (401)
8 [Overview of Electronic Data Forensics Technology] 2016 Vol.2(4):299-306
[Abstract] ( 386 ) [HTML 0 KB][PDF 5966 KB] (300)
9 [An Overview of Hadoop Security Framework] 2016 Vol.2(8):684-698
[Abstract] ( 381 ) [HTML 0 KB][PDF 12399 KB] (173)
10 [Study of Finger Vein Recognition Application] 2016 Vol.2(1):86-92
[Abstract] ( 364 ) [HTML 0 KB][PDF 5765 KB] (332)
11 [Research on Data Reading Technology of Android Smart Phone Based on eMMC] 2016 Vol.2(4):317-323
[Abstract] ( 354 ) [HTML 0 KB][PDF 5047 KB] (262)
12 [ Research on The Technology Architecture of Big Data Security and Privacy System] 2016 Vol.2(3):244-250
Lv Xin [Abstract] ( 336 ) [HTML 0 KB][PDF 6172 KB] (438)
13 [Research of Threat Intelligence Sharing and Using for Cyber Attack Attribution] 2015 Vol.1(1):31-36
Yang Zeming, Li Qiang, Liu Junrong, and Liu Baoxu [Abstract] ( 332 ) [HTML 0 KB][PDF 5527 KB] (504)
14 [DDoS Detection Framework based on Hadoop] 2015 Vol.1(3):261-266
[Abstract] ( 325 ) [HTML 0 KB][PDF 5465 KB] (436)
15 [An APT Defensive Approach Based on Big Data Analysis] 2015 Vol.1(3):230-237
[Abstract] ( 312 ) [HTML 0 KB][PDF 7888 KB] (274)
16 [Security Architecture and Key Technologies of Blockchain] 2016 Vol.2(12):1090-1097
Yan Zhu [Abstract] ( 293 ) [HTML 0 KB][PDF 6838 KB] (300)
17 [A C# Source Code SQL Injection Attack Detection Algorithm Based on Abstract Syntax Tree] 2015 Vol.1(2):112-125
Sun Wei Chen Lin [Abstract] ( 292 ) [HTML 0 KB][PDF 10193 KB] (240)
18 [A Study of Secure Deduplication Systems and Key Technologies] 2015 Vol.1(3):245-252
[Abstract] ( 287 ) [HTML 0 KB][PDF 7871 KB] (215)
19 [Research on the Architecture of Big Data Security Assurance System Improved ] 2015 Vol.1(3):211-216
Lv Xin [Abstract] ( 280 ) [HTML 0 KB][PDF 7192 KB] (325)
20 [Webshell Detection Method Research Based on Web Log] 2016 Vol.2(1):66-73
[Abstract] ( 277 ) [HTML 0 KB][PDF 5409 KB] (336)
21 [A Survey of Fingerprint Recognition Technology] 2016 Vol.2(4):343-355
[Abstract] ( 276 ) [HTML 0 KB][PDF 10838 KB] (172)
22 [Overview of Voiceprint Recognition Technology and Applications] 2016 Vol.2(1):44-57
[Abstract] ( 256 ) [HTML 0 KB][PDF 12707 KB] (201)
23 [Big Data Theme Introduction] 2015 Vol.1(3):203-204
Zhang Xiaosong [Abstract] ( 254 ) [HTML 0 KB][PDF 703 KB] (266)
24 [An Analytical Method of Mobile Phone Packet Capture Based on Android System] 2016 Vol.2(4):339-342
[Abstract] ( 248 ) [HTML 0 KB][PDF 2945 KB] (175)
25 [A Survey of Future Internet Architecture and Security Design] 2015 Vol.1(1):9-18
Chen Zhong1) Guan Zhi1),2) Meng HongWei1) Meng ZiQian1) [Abstract] ( 247 ) [HTML 0 KB][PDF 9255 KB] (341)
26 [The Core Security in Big Data Industrialization] 2015 Vol.1(3):205-210
陈瑞东 [Abstract] ( 240 ) [HTML 0 KB][PDF 2889 KB] (357)
27 [“Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background] 2016 Vol.2(5):384-395
[Abstract] ( 235 ) [HTML 0 KB][PDF 1491 KB] (620)
28 [Research of Cryptography Technologies for Big Data Security] 2015 Vol.1(3):238-244
Zhang Xiaosong [Abstract] ( 234 ) [HTML 0 KB][PDF 7091 KB] (317)
29 [Research and Progress of the Cyber Security Standardization of Smart City] 2016 Vol.2(5):442-446
[Abstract] ( 229 ) [HTML 0 KB][PDF 4021 KB] (242)
Copyright © Editorial Board of Journal of Information Security Research