keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
Top Read Articles
Published in last 1 year |  In last 2 years |  In last 3 years |  All

1 [“Internet Plus” Mobile Power: Analysis the Network Security of ZTE] 2016 Vol.2(4):288-298
[Abstract] ( 687 ) [HTML 0 KB][PDF 1637 KB] (550)
2 [Overview on SM9 Identity Based Cryptographic Algorithm] 2016 Vol.2(11):1008-1027
[Abstract] ( 664 ) [HTML 0 KB][PDF 13949 KB] (4643)
3 [Time Machine Forensic] 2016 Vol.2(4):307-316
[Abstract] ( 573 ) [HTML 0 KB][PDF 5953 KB] (382)
4 [Differential Privacy and Applications] 2015 Vol.1(3):224-229
[Abstract] ( 558 ) [HTML 0 KB][PDF 5750 KB] (650)
5 [Discipline Construction and Talents Training of Cyberspace Security] 2015 Vol.1(2):149-154
Li Jianhua Qiu Weidong Meng Kui Wu Jun [Abstract] ( 469 ) [HTML 0 KB][PDF 5250 KB] (495)
6 [An Overview of Hadoop Security Framework] 2016 Vol.2(8):684-698
[Abstract] ( 452 ) [HTML 0 KB][PDF 12399 KB] (199)
7 [Overview of Electronic Data Forensics Technology] 2016 Vol.2(4):299-306
[Abstract] ( 411 ) [HTML 0 KB][PDF 5966 KB] (449)
8 [ Research on The Technology Architecture of Big Data Security and Privacy System] 2016 Vol.2(3):244-250
Lv Xin [Abstract] ( 397 ) [HTML 0 KB][PDF 6172 KB] (490)
9 [Study of Finger Vein Recognition Application] 2016 Vol.2(1):86-92
[Abstract] ( 394 ) [HTML 0 KB][PDF 5765 KB] (372)
10 [Research on Data Reading Technology of Android Smart Phone Based on eMMC] 2016 Vol.2(4):317-323
[Abstract] ( 386 ) [HTML 0 KB][PDF 5047 KB] (450)
11 [DDoS Detection Framework based on Hadoop] 2015 Vol.1(3):261-266
[Abstract] ( 365 ) [HTML 0 KB][PDF 5465 KB] (579)
12 [Research on the Architecture of Big Data Security Assurance System Improved ] 2015 Vol.1(3):211-216
Lv Xin [Abstract] ( 356 ) [HTML 0 KB][PDF 7192 KB] (431)
13 [A C# Source Code SQL Injection Attack Detection Algorithm Based on Abstract Syntax Tree] 2015 Vol.1(2):112-125
Sun Wei Chen Lin [Abstract] ( 344 ) [HTML 0 KB][PDF 10193 KB] (413)
14 [A Study of Secure Deduplication Systems and Key Technologies] 2015 Vol.1(3):245-252
[Abstract] ( 343 ) [HTML 0 KB][PDF 7871 KB] (236)
15 [An APT Defensive Approach Based on Big Data Analysis] 2015 Vol.1(3):230-237
[Abstract] ( 341 ) [HTML 0 KB][PDF 7888 KB] (323)
16 [Security Architecture and Key Technologies of Blockchain] 2016 Vol.2(12):1090-1097
Yan Zhu [Abstract] ( 337 ) [HTML 0 KB][PDF 6838 KB] (363)
17 [Webshell Detection Method Research Based on Web Log] 2016 Vol.2(1):66-73
[Abstract] ( 315 ) [HTML 0 KB][PDF 5409 KB] (458)
18 [A Survey of Fingerprint Recognition Technology] 2016 Vol.2(4):343-355
[Abstract] ( 307 ) [HTML 0 KB][PDF 10838 KB] (237)
19 [Overview of Voiceprint Recognition Technology and Applications] 2016 Vol.2(1):44-57
[Abstract] ( 305 ) [HTML 0 KB][PDF 12707 KB] (221)
20 [Research of Cryptography Technologies for Big Data Security] 2015 Vol.1(3):238-244
Zhang Xiaosong [Abstract] ( 300 ) [HTML 0 KB][PDF 7091 KB] (365)
21 [Big Data Theme Introduction] 2015 Vol.1(3):203-204
Zhang Xiaosong [Abstract] ( 293 ) [HTML 0 KB][PDF 703 KB] (303)
22 [Overview on SM4 Algorithm] 2016 Vol.2(11):995-1007
[Abstract] ( 285 ) [HTML 0 KB][PDF 8653 KB] (314)
23 [A Review on Image Reversible Data Hiding] 2016 Vol.2(8):729-734
[Abstract] ( 277 ) [HTML 0 KB][PDF 5707 KB] (468)
24 [“Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background] 2016 Vol.2(5):384-395
[Abstract] ( 274 ) [HTML 0 KB][PDF 1491 KB] (813)
25 [The Core Security in Big Data Industrialization] 2015 Vol.1(3):205-210
陈瑞东 [Abstract] ( 272 ) [HTML 0 KB][PDF 2889 KB] (481)
26 [Research on Strategy of Malicious URL MultiLayer Filtering Detection Model] 2016 Vol.2(1):80-85
[Abstract] ( 272 ) [HTML 0 KB][PDF 5042 KB] (457)
27 [The ZUC Stream Cipher Algorithm] 2016 Vol.2(11):1028-1041
[Abstract] ( 270 ) [HTML 0 KB][PDF 7769 KB] (215)
28 [A Fully Homomorphic Encryption Scheme Based LWE] 2016 Vol.2(3):220-224
[Abstract] ( 267 ) [HTML 0 KB][PDF 3693 KB] (387)
29 [An Analytical Method of Mobile Phone Packet Capture Based on Android System] 2016 Vol.2(4):339-342
[Abstract] ( 265 ) [HTML 0 KB][PDF 2945 KB] (208)
Copyright © Editorial Board of Journal of Information Security Research