keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

Most Downloaded in Recent Year
  
1 Overview on SM9 Identity Based Cryptographic Algorithm 2016 Vol.2(11):1008-1027
[Abstract] (664) [HTML 0 KB][PDF 13949 KB] (4643)
2 Analysis and Enlightenment of American Cyber Deterrence Policy 2016 Vol.2(5):471-476
[Abstract] (228) [HTML 0 KB][PDF 1086 KB] (1130)
3 Practical Confrontation Promote the Development of Sustainability —Comments on Network Attack and Defense Drill in Actual Bigdata Environment 2018 Vol.4(5):410-411
[Abstract] (19) [HTML 0 KB][PDF 707 KB] (337)
4 Research and Vulnerability Prevention of Information Gathering in Penetration Test 2016 Vol.2(3):211-219
[Abstract] (246) [HTML 0 KB][PDF 7566 KB] (406)
5 A High Code Coverage Static and Dyamic Combined Fuzzing Method 2016 Vol.2(8):699-705
[Abstract] (179) [HTML 0 KB][PDF 6669 KB] (571)
6 “Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background 2016 Vol.2(5):384-395
[Abstract] (274) [HTML 0 KB][PDF 1491 KB] (813)
7 Research on the Construction of the National Cyber?Space Governance Hierarchy 2016 Vol.2(6):537-542
[Abstract] (188) [HTML 0 KB][PDF 5059 KB] (442)
8 The Overview of Authentication Systems 2016 Vol.2(7):649-659
[Abstract] (91) [HTML 0 KB][PDF 7485 KB] (420)
9 Research on Data Reading Technology of Android Smart Phone Based on eMMC 2016 Vol.2(4):317-323
[Abstract] (386) [HTML 0 KB][PDF 5047 KB] (450)
10 Artifcial Intelligence Promotes the Paradigm Shift of Information Security —A Case Study of Driverless Car by Baidu 2016 Vol.2(11):958-968
[Abstract] (118) [HTML 0 KB][PDF 2086 KB] (473)
11 Artificial Immune Based Mobile Malcode Detection Model 2016 Vol.2(3):238-243
[Abstract] (193) [HTML 0 KB][PDF 5204 KB] (462)
12 A C# Source Code SQL Injection Attack Detection Algorithm Based on Abstract Syntax Tree 2015 Vol.1(2):112-125
Sun Wei Chen Lin [Abstract] (344) [HTML 0 KB][PDF 10193 KB] (413)
13 Security Authentication Protocol Based on Grain-v1 in National Military Standard 2016 Vol.2(6):513-518
[Abstract] (134) [HTML 0 KB][PDF 4984 KB] (393)
14 Building Cyber Security Defense by Trusted Computing 3.0 2017 Vol.3(4):290-298
[Abstract] (125) [HTML 0 KB][PDF 1075 KB] (436)
15 CFL’s Schemes for Classical Information Security Problems 2016 Vol.2(7):639-648
[Abstract] (176) [HTML 0 KB][PDF 8174 KB] (469)
16 Comparative Study on the Properties of CFL 2016 Vol.2(7):600-607
[Abstract] (93) [HTML 0 KB][PDF 5745 KB] (462)
17 Differential Privacy and Applications 2015 Vol.1(3):224-229
[Abstract] (558) [HTML 0 KB][PDF 5750 KB] (650)
18 DDoS Detection Framework based on Hadoop 2015 Vol.1(3):261-266
[Abstract] (365) [HTML 0 KB][PDF 5465 KB] (579)
19 Global Parameters Estimated of MeasurementDeviceIndependent Quantum Key Distribution 2015 Vol.1(2):105-111
Wang Hong Ma Zhi Jiang HaoDong Gao MIng [Abstract] (186) [HTML 0 KB][PDF 5263 KB] (469)
20 A Searchable PHR Cloud Service System Supporting FineGrained Privilege Control 2016 Vol.2(3):264-271
[Abstract] (170) [HTML 0 KB][PDF 6456 KB] (401)
21 Overview of Electronic Data Forensics Technology 2016 Vol.2(4):299-306
[Abstract] (411) [HTML 0 KB][PDF 5966 KB] (449)
22 The Transmission Technology of Covert Information Based on Acoustic Channel 2016 Vol.2(2):131-136
Ding Xuejie, Li Bin, Wei Di, Zhang Meng, Sun Degang [Abstract] (121) [HTML 0 KB][PDF 4775 KB] (436)
23 Research on Character Recognition of Reconstructed Image from Electromagnetic Emanation of Information Equipment 2016 Vol.2(2):137-142
Xu Yanyun1, Guo Jia2, Li Yiwei1,3, and Sun Degang1 [Abstract] (102) [HTML 0 KB][PDF 5100 KB] (409)
24 Technology Architecture of IoT Security 2016 Vol.2(5):417-423
[Abstract] (169) [HTML 0 KB][PDF 5847 KB] (448)
25 Formal Verification Method of Smart Contract 2016 Vol.2(12):1080-1089
[Abstract] (255) [HTML 0 KB][PDF 7621 KB] (324)
26 Study on Security of Card System in Smart Campus 2016 Vol.2(5):454-461
[Abstract] (145) [HTML 0 KB][PDF 6098 KB] (377)
27 The Reflection of Legal Position and Content of Critical Infrastructure Protection Legislation in China 2015 Vol.1(2):163-169
Zhang Min [Abstract] (182) [HTML 0 KB][PDF 7008 KB] (354)
28 Evidence Extraction of USB Storage Device Accessing Traces under the Windows 7 System 2016 Vol.2(4):333-338
[Abstract] (149) [HTML 0 KB][PDF 5162 KB] (451)
Copyright © Editorial Board of Journal of Information Security Research