keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month| Most Downloaded in Recent Year|

Most Downloaded in Recent Month
  
1 Overview on SM9 Identity Based Cryptographic Algorithm 2016 Vol.2(11):1008-1027
[Abstract] (526) [HTML 0 KB][PDF 13949 KB] (1003)
2 Progress and Challenges of Intelligent Surveillance Industry Security 2017 Vol.3(3):277-280
[Abstract] (32) [HTML 0 KB][PDF 936 KB] (182)
3 Study of Finger Vein Recognition Application 2016 Vol.2(1):86-92
[Abstract] (363) [HTML 0 KB][PDF 5765 KB] (332)
4 Research of Threat Intelligence Sharing and Using for Cyber Attack Attribution 2015 Vol.1(1):31-36
Yang Zeming, Li Qiang, Liu Junrong, and Liu Baoxu [Abstract] (332) [HTML 0 KB][PDF 5527 KB] (502)
5 Formal Verification Method of Smart Contract 2016 Vol.2(12):1080-1089
[Abstract] (198) [HTML 0 KB][PDF 7621 KB] (178)
6 Online Rumor Governance in the View of "Cybersecurity Law of the People’s Republic of China" 2017 Vol.3(12):1091-1096
[Abstract] (28) [HTML 0 KB][PDF 5064 KB] (17)
7 Building Cyber Security Defense by Trusted Computing 3.0 2017 Vol.3(4):290-298
[Abstract] (88) [HTML 0 KB][PDF 1075 KB] (297)
8 Artifcial Intelligence Promotes the Paradigm Shift of Information Security —A Case Study of Driverless Car by Baidu 2016 Vol.2(11):958-968
[Abstract] (93) [HTML 0 KB][PDF 2086 KB] (317)
9 Overview on Information Content Security of Cyberspace 2017 Vol.3(12):1115-1118
[Abstract] (42) [HTML 0 KB][PDF 3370 KB] (33)
10 A Searchable PHR Cloud Service System Supporting FineGrained Privilege Control 2016 Vol.2(3):264-271
[Abstract] (148) [HTML 0 KB][PDF 6456 KB] (261)
11 The Overview of Authentication Systems 2016 Vol.2(7):649-659
[Abstract] (70) [HTML 0 KB][PDF 7485 KB] (243)
12 DDoS Detection Framework based on Hadoop 2015 Vol.1(3):261-266
[Abstract] (323) [HTML 0 KB][PDF 5465 KB] (435)
13 Research on Character Recognition of Reconstructed Image from Electromagnetic Emanation of Information Equipment 2016 Vol.2(2):137-142
Xu Yanyun1, Guo Jia2, Li Yiwei1,3, and Sun Degang1 [Abstract] (81) [HTML 0 KB][PDF 5100 KB] (270)
14 VEDA, Establishing the AI Dynamic Defense System for Cyber Security 2017 Vol.3(12):1058-1066
[Abstract] (33) [HTML 0 KB][PDF 1526 KB] (27)
15 Overview of Electronic Data Forensics Technology 2016 Vol.2(4):299-306
[Abstract] (386) [HTML 0 KB][PDF 5966 KB] (298)
16 Analysis and Enlightenment of American Cyber Deterrence Policy 2016 Vol.2(5):471-476
[Abstract] (189) [HTML 0 KB][PDF 1086 KB] (875)
17 Security Problems and Coping Strategies of Cyberspace in Social Network 2015 Vol.1(2):126-130
Li Yang Lv Xin [Abstract] (134) [HTML 0 KB][PDF 4325 KB] (314)
18 A C# Source Code SQL Injection Attack Detection Algorithm Based on Abstract Syntax Tree 2015 Vol.1(2):112-125
Sun Wei Chen Lin [Abstract] (291) [HTML 0 KB][PDF 10193 KB] (240)
19 Global Parameters Estimated of MeasurementDeviceIndependent Quantum Key Distribution 2015 Vol.1(2):105-111
Wang Hong Ma Zhi Jiang HaoDong Gao MIng [Abstract] (156) [HTML 0 KB][PDF 5263 KB] (317)
20 The Research on International Cyber Security Standards 2016 Vol.2(5):397-403
[Abstract] (101) [HTML 0 KB][PDF 4976 KB] (277)
21 A High Code Coverage Static and Dyamic Combined Fuzzing Method 2016 Vol.2(8):699-705
[Abstract] (135) [HTML 0 KB][PDF 6669 KB] (395)
22 PDF File Malicious Code Detection Method Based on Spectrum Analysis 2016 Vol.2(2):166-171
Hao Chenxi and Fang Yong [Abstract] (148) [HTML 0 KB][PDF 4608 KB] (291)
23 Evidence Extraction of USB Storage Device Accessing Traces under the Windows 7 System 2016 Vol.2(4):333-338
[Abstract] (126) [HTML 0 KB][PDF 5162 KB] (324)
24 The Research on Cyberspace Security Countermeasures Simulation Model 2016 Vol.2(8):0-0
[Abstract] (132) [HTML 0 KB][PDF 6359 KB] (339)
25 Differential Privacy and Applications 2015 Vol.1(3):224-229
[Abstract] (497) [HTML 0 KB][PDF 5750 KB] (502)
26 Research on the Architecture of Big Data Security Assurance System Improved 2015 Vol.1(3):211-216
Lv Xin [Abstract] (279) [HTML 0 KB][PDF 7192 KB] (325)
27 A New Fault Attack on Grain-128 2016 Vol.2(3):230-237
[Abstract] (112) [HTML 0 KB][PDF 5483 KB] (234)
28 Security Authentication Protocol Based on Grain-v1 in National Military Standard 2016 Vol.2(6):513-518
[Abstract] (101) [HTML 0 KB][PDF 4984 KB] (249)
Copyright © Editorial Board of Journal of Information Security Research