keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

In last 2 years
  
1 Overview on SM9 Identity Based Cryptographic Algorithm 2016 Vol.2(11):1008-1027
[Abstract] (525) [HTML 0 KB][PDF 13949 KB] (987)
2 Analysis and Enlightenment of American Cyber Deterrence Policy 2016 Vol.2(5):471-476
[Abstract] (189) [HTML 0 KB][PDF 1086 KB] (875)
3 “Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background 2016 Vol.2(5):384-395
[Abstract] (235) [HTML 0 KB][PDF 1491 KB] (620)
4 Cybersecurity Research for Instant Messaging in Social Network System 2016 Vol.2(3):280-283
[Abstract] (120) [HTML 0 KB][PDF 768 KB] (505)
5 “Internet +”Power: The Information Security and Strategic Layout of Huawei on the Basis of “Internet +” Background 2016 Vol.2(6):478-489
[Abstract] (165) [HTML 0 KB][PDF 930 KB] (467)
6 Opportunities and Challenges of E-Commerce Data Security in Big Data Era 2016 Vol.2(2):186-190
Ning Jiajun [Abstract] (140) [HTML 0 KB][PDF 1890 KB] (466)
7 The Development Status and Tendency of Internet Trusted Identity Management 2016 Vol.2(7):666-668
[Abstract] (130) [HTML 0 KB][PDF 1518 KB] (453)
8 “Internet Plus” Mobile Power: Analysis the Network Security of ZTE 2016 Vol.2(4):288-298
[Abstract] (657) [HTML 0 KB][PDF 1637 KB] (439)
9 Research on The Technology Architecture of Big Data Security and Privacy System 2016 Vol.2(3):244-250
Lv Xin [Abstract] (336) [HTML 0 KB][PDF 6172 KB] (437)
10 The Method and Realization of Android Applications Malicious Code Static Injection 2016 Vol.2(7):660-664
[Abstract] (114) [HTML 0 KB][PDF 5039 KB] (417)
11 A High Code Coverage Static and Dyamic Combined Fuzzing Method 2016 Vol.2(8):699-705
[Abstract] (135) [HTML 0 KB][PDF 6669 KB] (395)
12 Smartphone Image Recovery and Forensics Based on WinHex 2016 Vol.2(4):328-332
[Abstract] (122) [HTML 0 KB][PDF 4459 KB] (367)
13 A Review on Image Reversible Data Hiding 2016 Vol.2(8):729-734
[Abstract] (205) [HTML 0 KB][PDF 5707 KB] (366)
14 “Internet +”Power: Overview of AsiaInfo Secruity’s Cyber Security 2016 Vol.2(8):670-684
[Abstract] (184) [HTML 0 KB][PDF 1873 KB] (353)
15 A Fully Homomorphic Encryption Scheme Based LWE 2016 Vol.2(3):220-224
[Abstract] (220) [HTML 0 KB][PDF 3693 KB] (352)
16 Modulated Signal Information Security Risk Analysis in Wireless Communications 2016 Vol.2(2):143-149
Wei Dong1, Liu Bo2, Liang Lili1, and Li Min1 [Abstract] (98) [HTML 0 KB][PDF 6826 KB] (351)
17 “Internet +”Power: The Information Security and Strategic Layout of Lenovo on the Basis of “Internet +” Background 2016 Vol.2(7):574-586
[Abstract] (74) [HTML 0 KB][PDF 3175 KB] (351)
18 Promote the “Internet+” Action: The Information Network Security of Corporation Beijing VRV 2016 Vol.2(3):192-200
[Abstract] (171) [HTML 0 KB][PDF 2392 KB] (342)
19 The Research on Cyberspace Security Countermeasures Simulation Model 2016 Vol.2(8):0-0
[Abstract] (132) [HTML 0 KB][PDF 6359 KB] (339)
20 Establishing New Network Defense System for Responding to Advanced Network Threat 2016 Vol.2(4):377-382
[Abstract] (123) [HTML 0 KB][PDF 1019 KB] (334)
21 Management and Directed Study of Internet Public Opinion in the Age of Big Data 2016 Vol.2(4):356-360
[Abstract] (158) [HTML 0 KB][PDF 4303 KB] (332)
22 The Research and Implementation of a RealTime Network Risk Visualization Technology 2016 Vol.2(2):180-185
Wang Lin and Hu Xiaoqin [Abstract] (83) [HTML 0 KB][PDF 4549 KB] (326)
23 Evidence Extraction of USB Storage Device Accessing Traces under the Windows 7 System 2016 Vol.2(4):333-338
[Abstract] (126) [HTML 0 KB][PDF 5162 KB] (324)
24 “Internet +”Power: Overview of Westone Secruity’s Cyber Secruity 2016 Vol.2(10):862-875
[Abstract] (113) [HTML 0 KB][PDF 2788 KB] (322)
25 Research of the Index of National Cybersecurity 2016 Vol.2(9):766-773
Lv Xin [Abstract] (125) [HTML 0 KB][PDF 1086 KB] (320)
26 The Improvement and Instance Analysis of the Formal Verification Tool Scyther 2016 Vol.2(3):272-279
Xu Han [Abstract] (214) [HTML 0 KB][PDF 6016 KB] (318)
27 The Totlal Solution of Cyber Security in Critical Information Infrastructure 2016 Vol.2(10):946-951
[Abstract] (81) [HTML 0 KB][PDF 1455 KB] (317)
28 Artifcial Intelligence Promotes the Paradigm Shift of Information Security —A Case Study of Driverless Car by Baidu 2016 Vol.2(11):958-968
[Abstract] (93) [HTML 0 KB][PDF 2086 KB] (314)
Copyright © Editorial Board of Journal of Information Security Research