keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
30 Most Down Articles
Published in last 1 year| In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

Published in last 1 year
  
1 Building Cyber Security Defense by Trusted Computing 3.0 2017 Vol.3(4):290-298
[Abstract] (88) [HTML 0 KB][PDF 1075 KB] (297)
2 Venustech’s Continuous Construction of the Information Security Ecological Chain — Analyze the Information and Cyber Security Strategy of Venustech 2017 Vol.3(2):98-115
[Abstract] (65) [HTML 0 KB][PDF 3877 KB] (199)
3 Analysis of Information Security Vulnerabilities and Penetration Attack Based on Social Engineering 2017 Vol.3(2):116-122
[Abstract] (125) [HTML 0 KB][PDF 5294 KB] (183)
4 Construction of Critical Information Infrastructure Protection System Based on?Classifed?Protection?and?Trusted?Computing 2017 Vol.3(4):375-381
[Abstract] (27) [HTML 0 KB][PDF 1036 KB] (183)
5 Progress and Challenges of Intelligent Surveillance Industry Security 2017 Vol.3(3):277-280
[Abstract] (32) [HTML 0 KB][PDF 936 KB] (182)
6 Research of Electronic Invoice System Based on Block Chain 2017 Vol.3(6):516-522
[Abstract] (91) [HTML 0 KB][PDF 3190 KB] (177)
7 CFL Authentication System and Its Applications in the Blockchain 2017 Vol.3(3):220-226
[Abstract] (77) [HTML 0 KB][PDF 5196 KB] (172)
8 Blockchain Technology and Its Applications 2017 Vol.3(3):237-245
Zheng Huang [Abstract] (112) [HTML 0 KB][PDF 7380 KB] (165)
9 A Network Security Protection Research for Industrial Control System 2017 Vol.3(2):171-176
[Abstract] (76) [HTML 0 KB][PDF 5018 KB] (164)
10 The Design of Smart Contracts on Crowd Funding Private Blockchain 2017 Vol.3(3):211-219
[Abstract] (166) [HTML 0 KB][PDF 7360 KB] (160)
11 Microsoft China: The Implementation of Information Security and Cooperative Strategy 2017 Vol.3(5):386-397
[Abstract] (120) [HTML 0 KB][PDF 1668 KB] (155)
12 Blockchain Technology and Its Prospect of Industrial Application 2017 Vol.3(3):200-210
[Abstract] (106) [HTML 0 KB][PDF 9369 KB] (153)
13 An Overview of Trusted Computing Structure Specification 2017 Vol.3(4):299-304
[Abstract] (102) [HTML 0 KB][PDF 4215 KB] (153)
14 Semantics Based Webshell Detection Method Research 2017 Vol.3(2):145-150
[Abstract] (84) [HTML 0 KB][PDF 4585 KB] (145)
15 Research of Identifying Web Vulnerability Scanner Based on Finite State Machine 2017 Vol.3(2):123-128
[Abstract] (95) [HTML 0 KB][PDF 4048 KB] (142)
16 Research on the Structural Security of Private Cloud in Government and Enterprise 2017 Vol.3(2):188-192
[Abstract] (131) [HTML 0 KB][PDF 1236 KB] (137)
17 Innovative Technology Promotes Smart City and Network Security —A Case Study of Hikvision 2017 Vol.3(3):194-199
[Abstract] (49) [HTML 0 KB][PDF 938 KB] (122)
18 Research on Private Blockchain Based on Crowdfunding 2017 Vol.3(3):227-236
[Abstract] (56) [HTML 0 KB][PDF 8179 KB] (122)
19 Research on Android Application Permission Monitor 2017 Vol.3(2):139-144
[Abstract] (80) [HTML 0 KB][PDF 4793 KB] (113)
20 Talking About the Application of the Commercial Cryptography 2017 Vol.3(5):477-480
[Abstract] (37) [HTML 0 KB][PDF 723 KB] (107)
21 Research and Application of Trusted Computing in Electric Power System 2017 Vol.3(4):353-358
[Abstract] (59) [HTML 0 KB][PDF 5080 KB] (106)
22 The TPCM Platform Measurement and Control Design 2017 Vol.3(4):310-315
[Abstract] (170) [HTML 0 KB][PDF 4044 KB] (104)
23 Evaluation of Trusted Cloud Services Based on ThirdParty Regulation 2017 Vol.3(4):344-352
[Abstract] (46) [HTML 0 KB][PDF 6390 KB] (102)
24 A Data Protection Method Based on Trusted Computing in Distributed Storage 2017 Vol.3(4):339-343
[Abstract] (36) [HTML 0 KB][PDF 4230 KB] (101)
25 Application of Safe Independent DecisionMaking and Controllable Product in ICS 2017 Vol.3(4):370-374
[Abstract] (50) [HTML 0 KB][PDF 4361 KB] (99)
26 The Common and Differences of Visualization Products in Network Security — Product Manager's Perspective of RSA Conference 2017 Vol.3(3):281-288
[Abstract] (44) [HTML 0 KB][PDF 3555 KB] (97)
27 The Army Trusted Computing Standard of Civil-Military Integration 2017 Vol.3(4):382-384
[Abstract] (25) [HTML 0 KB][PDF 685 KB] (96)
28 Research and Practice on Network Security Assurance of Important Activities 2017 Vol.3(2):177-181
[Abstract] (56) [HTML 0 KB][PDF 3790 KB] (95)
Copyright © Editorial Board of Journal of Information Security Research