keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
30 Most Down Articles
Published in last 1 year| In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

Published in last 1 year
  
1 Practical Confrontation Promote the Development of Sustainability —Comments on Network Attack and Defense Drill in Actual Bigdata Environment 2018 Vol.4(5):410-411
[Abstract] (19) [HTML 0 KB][PDF 707 KB] (337)
2 Network intrusion detection model based on convolutional neural network 2017 Vol.3(11):990-994
[Abstract] (111) [HTML 0 KB][PDF 3567 KB] (161)
3 Review and Research for Consensus Mechanism of Block Chain 2018 Vol.4(4):369-379
[Abstract] (13) [HTML 0 KB][PDF 2321 KB] (150)
4 Deepin Anything Fast Retrieval Research 2018 Vol.4(1):15-23
[Abstract] (40) [HTML 0 KB][PDF 6426 KB] (147)
5 From “Latter-wit” to “Nip in the Bud” 2017 Vol.3(11):962-965
[Abstract] (79) [HTML 0 KB][PDF 700 KB] (129)
6 A Glimpse at Blockchain: From the Perspective of Privacy 2017 Vol.3(11):981-989
[Abstract] (143) [HTML 0 KB][PDF 7718 KB] (113)
7 To Create a Positive Cyberspace by Safeguarding Network Security with Active Immune Trusted Computing 3.0 2018 Vol.4(4):282-302
[Abstract] (21) [HTML 0 KB][PDF 2291 KB] (105)
8 ANTIY, Using the Actual Combat Mode to Protect the Cyber-Security 2018 Vol.4(2):98-103
[Abstract] (27) [HTML 0 KB][PDF 3475 KB] (104)
9 Autonomy and Controllability are Necessary Conditions for Ensuring Cyber Scurity 2018 Vol.4(1):6-7
[Abstract] (31) [HTML 0 KB][PDF 576 KB] (97)
10 Design and Implementation of Android Malware Detection System Based on Deep Learning 2018 Vol.4(2):140-144
[Abstract] (27) [HTML 0 KB][PDF 956 KB] (93)
11 Blockchain and Quantum Computing 2018 Vol.4(6):496-504
[Abstract] (11) [HTML 0 KB][PDF 1390 KB] (93)
12 Build an Independent IT Eco-System as the Basement of Network Security 2018 Vol.4(1):2-5
[Abstract] (47) [HTML 0 KB][PDF 668 KB] (92)
13 Overview on Information Content Security of Cyberspace 2017 Vol.3(12):1115-1118
[Abstract] (74) [HTML 0 KB][PDF 3370 KB] (92)
14 Defects and Breakthroughs of Current Cyberspace Security Technology System 2017 Vol.3(12):1141-1144
[Abstract] (52) [HTML 0 KB][PDF 886 KB] (91)
15 Improved random forest algorithm and its application in Android malware detection 2017 Vol.3(11):1020-1027
[Abstract] (77) [HTML 0 KB][PDF 4155 KB] (90)
16 The Problems and Countermeasures of obtaining evidence from "electronic data" in criminal judicial practice 2018 Vol.4(3):195-200
[Abstract] (25) [HTML 0 KB][PDF 1109 KB] (88)
17 The Highlights, Pain Points and Priority of Cyber Security Attack and Defense Drill 2018 Vol.4(5):402-404
Hao Yeli [Abstract] (11) [HTML 0 KB][PDF 738 KB] (87)
18 Webshell Detection Method Based on Correlation Analysis 2018 Vol.4(3):251-255
[Abstract] (21) [HTML 0 KB][PDF 899 KB] (86)
19 Study on loan fraud prevention algorithm based on maximum clique 2017 Vol.3(11):1017-1019
[Abstract] (78) [HTML 0 KB][PDF 1505 KB] (85)
20 A Survey of the Basic Technology and Application of Block Chain 2017 Vol.3(11):968-980
[Abstract] (101) [HTML 0 KB][PDF 11096 KB] (82)
21 Three “Sharp Weapons” of AI for Strengthening Financial Information Security 2017 Vol.3(11):1053-1056
[Abstract] (29) [HTML 0 KB][PDF 736 KB] (81)
22 VEDA, Establishing the AI Dynamic Defense System for Cyber Security 2017 Vol.3(12):1058-1066
[Abstract] (64) [HTML 0 KB][PDF 1526 KB] (81)
23 Guiyang Taking Actualization to Ensure the Security of Big Data 2018 Vol.4(5):394-401
[Abstract] (17) [HTML 0 KB][PDF 1599 KB] (81)
24 Risk Control System For Mobile Bank Based on Artificial Intelligence 2017 Vol.3(11):1000-1005
[Abstract] (96) [HTML 0 KB][PDF 4953 KB] (79)
25 C3 Security Summit Focuses on the New Trends of Cyber Security in 2018 2018 Vol.4(4):303-306
[Abstract] (16) [HTML 0 KB][PDF 840 KB] (77)
26 Opinions on Critical Information Infrastructure Protection of Power System at Network Age 2017 Vol.3(12):1134-1140
[Abstract] (64) [HTML 0 KB][PDF 1007 KB] (74)
27 Research and Implementation of Security Management of Data Files 2018 Vol.4(1):84-90
[Abstract] (35) [HTML 0 KB][PDF 4398 KB] (73)
28 The Design, Implementation and Application of OpenSSL with Chinese Cryptographic Algorithms 2018 Vol.4(2):115-132
[Abstract] (27) [HTML 0 KB][PDF 2215 KB] (72)
Copyright © Editorial Board of Journal of Information Security Research