keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

In last 3 years
  
1 Overview on SM9 Identity Based Cryptographic Algorithm 2016 Vol.2(11):1008-1027
[Abstract] (664) [HTML 0 KB][PDF 13949 KB] (4643)
2 Analysis and Enlightenment of American Cyber Deterrence Policy 2016 Vol.2(5):471-476
[Abstract] (228) [HTML 0 KB][PDF 1086 KB] (1130)
3 “Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background 2016 Vol.2(5):384-395
[Abstract] (274) [HTML 0 KB][PDF 1491 KB] (813)
4 Differential Privacy and Applications 2015 Vol.1(3):224-229
[Abstract] (558) [HTML 0 KB][PDF 5750 KB] (650)
5 Opportunities and Challenges of E-Commerce Data Security in Big Data Era 2016 Vol.2(2):186-190
Ning Jiajun [Abstract] (175) [HTML 0 KB][PDF 1890 KB] (616)
6 The Development Status and Tendency of Internet Trusted Identity Management 2016 Vol.2(7):666-668
[Abstract] (163) [HTML 0 KB][PDF 1518 KB] (580)
7 DDoS Detection Framework based on Hadoop 2015 Vol.1(3):261-266
[Abstract] (365) [HTML 0 KB][PDF 5465 KB] (579)
8 Cybersecurity Research for Instant Messaging in Social Network System 2016 Vol.2(3):280-283
[Abstract] (151) [HTML 0 KB][PDF 768 KB] (575)
9 A High Code Coverage Static and Dyamic Combined Fuzzing Method 2016 Vol.2(8):699-705
[Abstract] (179) [HTML 0 KB][PDF 6669 KB] (571)
10 “Internet +”Power: The Information Security and Strategic Layout of Huawei on the Basis of “Internet +” Background 2016 Vol.2(6):478-489
[Abstract] (197) [HTML 0 KB][PDF 930 KB] (562)
11 “Internet Plus” Mobile Power: Analysis the Network Security of ZTE 2016 Vol.2(4):288-298
[Abstract] (687) [HTML 0 KB][PDF 1637 KB] (550)
12 Security-Development Road of National E-Gov Network in the “Internet +” Era 2015 Vol.1(2):98-104
Zhou Min [Abstract] (186) [HTML 0 KB][PDF 2278 KB] (539)
13 Discipline Construction and Talents Training of Cyberspace Security 2015 Vol.1(2):149-154
Li Jianhua Qiu Weidong Meng Kui Wu Jun [Abstract] (469) [HTML 0 KB][PDF 5250 KB] (495)
14 Research on The Technology Architecture of Big Data Security and Privacy System 2016 Vol.2(3):244-250
Lv Xin [Abstract] (397) [HTML 0 KB][PDF 6172 KB] (490)
15 Promote the “Internet+” Action: The Information Network Security of Corporation Beijing VRV 2016 Vol.2(3):192-200
[Abstract] (202) [HTML 0 KB][PDF 2392 KB] (485)
16 The Core Security in Big Data Industrialization 2015 Vol.1(3):205-210
陈瑞东 [Abstract] (272) [HTML 0 KB][PDF 2889 KB] (481)
17 Artifcial Intelligence Promotes the Paradigm Shift of Information Security —A Case Study of Driverless Car by Baidu 2016 Vol.2(11):958-968
[Abstract] (118) [HTML 0 KB][PDF 2086 KB] (473)
18 CFL’s Schemes for Classical Information Security Problems 2016 Vol.2(7):639-648
[Abstract] (176) [HTML 0 KB][PDF 8174 KB] (469)
19 Global Parameters Estimated of MeasurementDeviceIndependent Quantum Key Distribution 2015 Vol.1(2):105-111
Wang Hong Ma Zhi Jiang HaoDong Gao MIng [Abstract] (186) [HTML 0 KB][PDF 5263 KB] (469)
20 A Review on Image Reversible Data Hiding 2016 Vol.2(8):729-734
[Abstract] (277) [HTML 0 KB][PDF 5707 KB] (468)
21 Comparative Study on the Properties of CFL 2016 Vol.2(7):600-607
[Abstract] (93) [HTML 0 KB][PDF 5745 KB] (462)
22 Artificial Immune Based Mobile Malcode Detection Model 2016 Vol.2(3):238-243
[Abstract] (193) [HTML 0 KB][PDF 5204 KB] (462)
23 The Method and Realization of Android Applications Malicious Code Static Injection 2016 Vol.2(7):660-664
[Abstract] (161) [HTML 0 KB][PDF 5039 KB] (461)
24 Webshell Detection Method Research Based on Web Log 2016 Vol.2(1):66-73
[Abstract] (315) [HTML 0 KB][PDF 5409 KB] (458)
25 Research on Strategy of Malicious URL MultiLayer Filtering Detection Model 2016 Vol.2(1):80-85
[Abstract] (272) [HTML 0 KB][PDF 5042 KB] (457)
26 “Internet +”Power: Overview of AsiaInfo Secruity’s Cyber Security 2016 Vol.2(8):670-684
[Abstract] (211) [HTML 0 KB][PDF 1873 KB] (453)
27 Evidence Extraction of USB Storage Device Accessing Traces under the Windows 7 System 2016 Vol.2(4):333-338
[Abstract] (149) [HTML 0 KB][PDF 5162 KB] (451)
28 Research on Data Reading Technology of Android Smart Phone Based on eMMC 2016 Vol.2(4):317-323
[Abstract] (386) [HTML 0 KB][PDF 5047 KB] (450)
Copyright © Editorial Board of Journal of Information Security Research