keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month| Most Downloaded in Recent Year|

Most Downloaded in Recent Month
  
1 Overview on SM9 Identity Based Cryptographic Algorithm 2016 Vol.2(11):1008-1027
[Abstract] (581) [HTML 0 KB][PDF 13949 KB] (2078)
2 ANTIY, Using the Actual Combat Mode to Protect the Cyber-Security 2018 Vol.4(2):98-103
[Abstract] (14) [HTML 0 KB][PDF 3475 KB] (74)
3 The Problems and Countermeasures of obtaining evidence from "electronic data" in criminal judicial practice 2018 Vol.4(3):195-200
[Abstract] (12) [HTML 0 KB][PDF 1109 KB] (43)
4 “Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background 2016 Vol.2(5):384-395
[Abstract] (262) [HTML 0 KB][PDF 1491 KB] (666)
5 Haitai Fangyuan, Security Creates Value 2018 Vol.4(3):186-194
[Abstract] (16) [HTML 0 KB][PDF 10333 KB] (31)
6 Analysis and Enlightenment of American Cyber Deterrence Policy 2016 Vol.2(5):471-476
[Abstract] (210) [HTML 0 KB][PDF 1086 KB] (929)
7 Research on the Construction of the National Cyber?Space Governance Hierarchy 2016 Vol.2(6):537-542
[Abstract] (178) [HTML 0 KB][PDF 5059 KB] (311)
8 An improved snapshot method based on CDP 2018 Vol.4(3):276-280
[Abstract] (13) [HTML 0 KB][PDF 859 KB] (40)
9 Opportunities and Challenges of E-Commerce Data Security in Big Data Era 2016 Vol.2(2):186-190
Ning Jiajun [Abstract] (159) [HTML 0 KB][PDF 1890 KB] (524)
10 Research and Vulnerability Prevention of Information Gathering in Penetration Test 2016 Vol.2(3):211-219
[Abstract] (237) [HTML 0 KB][PDF 7566 KB] (262)
11 Research on Data Reading Technology of Android Smart Phone Based on eMMC 2016 Vol.2(4):317-323
[Abstract] (370) [HTML 0 KB][PDF 5047 KB] (314)
12 Formal Verification Method of Smart Contract 2016 Vol.2(12):1080-1089
[Abstract] (226) [HTML 0 KB][PDF 7621 KB] (231)
13 The Introduction and Review of NATO Ten Rules for Cyber Security 2018 Vol.4(3):233-237
[Abstract] (18) [HTML 0 KB][PDF 988 KB] (21)
14 CFL’s Schemes for Classical Information Security Problems 2016 Vol.2(7):639-648
[Abstract] (159) [HTML 0 KB][PDF 8174 KB] (347)
15 Security Authentication Protocol Based on Grain-v1 in National Military Standard 2016 Vol.2(6):513-518
[Abstract] (119) [HTML 0 KB][PDF 4984 KB] (300)
16 Webshell Detection Method Based on Correlation Analysis 2018 Vol.4(3):251-255
[Abstract] (9) [HTML 0 KB][PDF 899 KB] (29)
17 Study on Security of Card System in Smart Campus 2016 Vol.2(5):454-461
[Abstract] (134) [HTML 0 KB][PDF 6098 KB] (286)
18 The Overview of Authentication Systems 2016 Vol.2(7):649-659
[Abstract] (77) [HTML 0 KB][PDF 7485 KB] (295)
19 A Physical Security Scheme of Wireless Networks using Matrix Projection 2015 Vol.1(2):131-139
[Abstract] (98) [HTML 0 KB][PDF 7324 KB] (218)
20 A Searchable PHR Cloud Service System Supporting FineGrained Privilege Control 2016 Vol.2(3):264-271
[Abstract] (161) [HTML 0 KB][PDF 6456 KB] (305)
21 Comparative Study on the Properties of CFL 2016 Vol.2(7):600-607
[Abstract] (72) [HTML 0 KB][PDF 5745 KB] (367)
22 A High Code Coverage Static and Dyamic Combined Fuzzing Method 2016 Vol.2(8):699-705
[Abstract] (156) [HTML 0 KB][PDF 6669 KB] (438)
23 From “Latter-wit” to “Nip in the Bud” 2017 Vol.3(11):962-965
[Abstract] (66) [HTML 0 KB][PDF 700 KB] (86)
24 Case Analysis of “Encryption and Law Enforcement” Abroad and It’s Enlightenment to China's Cryptography Legal System 2018 Vol.4(3):201-210
[Abstract] (14) [HTML 0 KB][PDF 1546 KB] (36)
25 The Reflection of Legal Position and Content of Critical Infrastructure Protection Legislation in China 2015 Vol.1(2):163-169
Zhang Min [Abstract] (158) [HTML 0 KB][PDF 7008 KB] (241)
26 The Development Status and Tendency of Internet Trusted Identity Management 2016 Vol.2(7):666-668
[Abstract] (153) [HTML 0 KB][PDF 1518 KB] (494)
27 Research on the Legal Personality of Artificial Intelligence 2018 Vol.4(3):224-232
[Abstract] (15) [HTML 0 KB][PDF 1427 KB] (21)
28 A C# Source Code SQL Injection Attack Detection Algorithm Based on Abstract Syntax Tree 2015 Vol.1(2):112-125
Sun Wei Chen Lin [Abstract] (313) [HTML 0 KB][PDF 10193 KB] (290)
29 The Transmission Technology of Covert Information Based on Acoustic Channel 2016 Vol.2(2):131-136
Ding Xuejie, Li Bin, Wei Di, Zhang Meng, Sun Degang [Abstract] (107) [HTML 0 KB][PDF 4775 KB] (318)
30 Overview of Electronic Data Forensics Technology 2016 Vol.2(4):299-306
[Abstract] (399) [HTML 0 KB][PDF 5966 KB] (346)
Copyright © Editorial Board of Journal of Information Security Research