keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month| Most Downloaded in Recent Year|

Most Downloaded in Recent Month
  
1 Overview on SM9 Identity Based Cryptographic Algorithm 2016 Vol.2(11):1008-1027
[Abstract] (664) [HTML 0 KB][PDF 13949 KB] (4643)
2 Deepin Anything Fast Retrieval Research 2018 Vol.4(1):15-23
[Abstract] (37) [HTML 0 KB][PDF 6426 KB] (155)
3 Analysis and Enlightenment of American Cyber Deterrence Policy 2016 Vol.2(5):471-476
[Abstract] (228) [HTML 0 KB][PDF 1086 KB] (1130)
4 Research on Data Reading Technology of Android Smart Phone Based on eMMC 2016 Vol.2(4):317-323
[Abstract] (386) [HTML 0 KB][PDF 5047 KB] (450)
5 Research on the Construction of the National Cyber?Space Governance Hierarchy 2016 Vol.2(6):537-542
[Abstract] (188) [HTML 0 KB][PDF 5059 KB] (442)
6 TOPSEC, Leading Brand of Independent Innovation, Supporting Cyberspace Power Strategy 2018 Vol.4(9):774-782
[Abstract] (2) [HTML 0 KB][PDF 1579 KB] (45)
7 A C# Source Code SQL Injection Attack Detection Algorithm Based on Abstract Syntax Tree 2015 Vol.1(2):112-125
Sun Wei Chen Lin [Abstract] (344) [HTML 0 KB][PDF 10193 KB] (413)
8 Security Problems and Coping Strategies of Cyberspace in Social Network 2015 Vol.1(2):126-130
Li Yang Lv Xin [Abstract] (161) [HTML 0 KB][PDF 4325 KB] (407)
9 A Review on Image Reversible Data Hiding 2016 Vol.2(8):729-734
[Abstract] (277) [HTML 0 KB][PDF 5707 KB] (468)
10 Artificial Immune Based Mobile Malcode Detection Model 2016 Vol.2(3):238-243
[Abstract] (193) [HTML 0 KB][PDF 5204 KB] (462)
11 CFL’s Schemes for Classical Information Security Problems 2016 Vol.2(7):639-648
[Abstract] (176) [HTML 0 KB][PDF 8174 KB] (469)
12 The Transmission Technology of Covert Information Based on Acoustic Channel 2016 Vol.2(2):131-136
Ding Xuejie, Li Bin, Wei Di, Zhang Meng, Sun Degang [Abstract] (121) [HTML 0 KB][PDF 4775 KB] (436)
13 The Overview of Authentication Systems 2016 Vol.2(7):649-659
[Abstract] (91) [HTML 0 KB][PDF 7485 KB] (420)
14 Research on Smart City Information Security System 2017 Vol.3(8):0-0
null [Abstract] (72) [HTML 0 KB][PDF 6796 KB] (152)
15 Risk Assessment on Identity Authentication Security of Intelligent Networking Devices 2018 Vol.4(10):881-888
[Abstract] (0) [HTML 0 KB][PDF 3295 KB] (25)
16 Webshell Detection Method Research Based on Web Log 2016 Vol.2(1):66-73
[Abstract] (315) [HTML 0 KB][PDF 5409 KB] (458)
17 The Research and Implementation of a RealTime Network Risk Visualization Technology 2016 Vol.2(2):180-185
Wang Lin and Hu Xiaoqin [Abstract] (99) [HTML 0 KB][PDF 4549 KB] (428)
18 Linux Binary Exploit -The Key Technology of Breaking Through the System Defense 2018 Vol.4(9):806-818
[Abstract] (4) [HTML 0 KB][PDF 2242 KB] (39)
19 Research on Information Security Risk Assessment of Power Industry Control System 2018 Vol.4(10):904-913
[Abstract] (0) [HTML 0 KB][PDF 3885 KB] (24)
20 The Reflection of Legal Position and Content of Critical Infrastructure Protection Legislation in China 2015 Vol.1(2):163-169
Zhang Min [Abstract] (182) [HTML 0 KB][PDF 7008 KB] (354)
21 A Physical Security Scheme of Wireless Networks using Matrix Projection 2015 Vol.1(2):131-139
[Abstract] (112) [HTML 0 KB][PDF 7324 KB] (330)
22 Discipline Construction and Talents Training of Cyberspace Security 2015 Vol.1(2):149-154
Li Jianhua Qiu Weidong Meng Kui Wu Jun [Abstract] (469) [HTML 0 KB][PDF 5250 KB] (495)
23 Distributed Code Clone Detection Based on Index 2016 Vol.2(3):201-210
[Abstract] (195) [HTML 0 KB][PDF 7511 KB] (314)
24 Research and Application of Security Data Space Construction Method 2016 Vol.2(12):1098-1104
Sun Wei [Abstract] (72) [HTML 0 KB][PDF 6721 KB] (238)
25 Research on Strategy of Malicious URL MultiLayer Filtering Detection Model 2016 Vol.2(1):80-85
[Abstract] (272) [HTML 0 KB][PDF 5042 KB] (457)
26 Differential Privacy and Applications 2015 Vol.1(3):224-229
[Abstract] (558) [HTML 0 KB][PDF 5750 KB] (650)
27 “Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background 2016 Vol.2(5):384-395
[Abstract] (274) [HTML 0 KB][PDF 1491 KB] (813)
28 A High Code Coverage Static and Dyamic Combined Fuzzing Method 2016 Vol.2(8):699-705
[Abstract] (179) [HTML 0 KB][PDF 6669 KB] (571)
29 Train of Thought on Governance of Dark Web 2018 Vol.4(9):846-852
[Abstract] (2) [HTML 0 KB][PDF 1707 KB] (39)
30 Trend on Cybersecurity Policy Risks of the Trump Administration and China Countermeasures 2018 Vol.4(10):870-880
[Abstract] (1) [HTML 0 KB][PDF 1337 KB] (20)
Copyright © Editorial Board of Journal of Information Security Research