keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
30 Most Down Articles
Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

Most Downloaded in Recent Year
  
1 Overview on SM9 Identity Based Cryptographic Algorithm 2016 Vol.2(11):1008-1027
[Abstract] (526) [HTML 0 KB][PDF 13949 KB] (1003)
2 Analysis and Enlightenment of American Cyber Deterrence Policy 2016 Vol.2(5):471-476
[Abstract] (189) [HTML 0 KB][PDF 1086 KB] (875)
3 “Internet +”Power: Analyze the Network Security of Alibaba —The Information Security and Strategic Layout of Alibaba and Ants Gold Dress on the Basis of “Internet +” Background 2016 Vol.2(5):384-395
[Abstract] (235) [HTML 0 KB][PDF 1491 KB] (620)
4 Building Cyber Security Defense by Trusted Computing 3.0 2017 Vol.3(4):290-298
[Abstract] (88) [HTML 0 KB][PDF 1075 KB] (297)
5 A High Code Coverage Static and Dyamic Combined Fuzzing Method 2016 Vol.2(8):699-705
[Abstract] (135) [HTML 0 KB][PDF 6669 KB] (395)
6 The Method and Realization of Android Applications Malicious Code Static Injection 2016 Vol.2(7):660-664
[Abstract] (114) [HTML 0 KB][PDF 5039 KB] (417)
7 The Development Status and Tendency of Internet Trusted Identity Management 2016 Vol.2(7):666-668
[Abstract] (130) [HTML 0 KB][PDF 1518 KB] (453)
8 Opportunities and Challenges of E-Commerce Data Security in Big Data Era 2016 Vol.2(2):186-190
Ning Jiajun [Abstract] (140) [HTML 0 KB][PDF 1890 KB] (467)
9 Cybersecurity Research for Instant Messaging in Social Network System 2016 Vol.2(3):280-283
[Abstract] (120) [HTML 0 KB][PDF 768 KB] (505)
10 Smartphone Image Recovery and Forensics Based on WinHex 2016 Vol.2(4):328-332
[Abstract] (122) [HTML 0 KB][PDF 4459 KB] (368)
11 Modulated Signal Information Security Risk Analysis in Wireless Communications 2016 Vol.2(2):143-149
Wei Dong1, Liu Bo2, Liang Lili1, and Li Min1 [Abstract] (98) [HTML 0 KB][PDF 6826 KB] (351)
12 The Research on Cyberspace Security Countermeasures Simulation Model 2016 Vol.2(8):0-0
[Abstract] (132) [HTML 0 KB][PDF 6359 KB] (339)
13 Study of Finger Vein Recognition Application 2016 Vol.2(1):86-92
[Abstract] (363) [HTML 0 KB][PDF 5765 KB] (332)
14 A Review on Image Reversible Data Hiding 2016 Vol.2(8):729-734
[Abstract] (205) [HTML 0 KB][PDF 5707 KB] (366)
15 Research on The Technology Architecture of Big Data Security and Privacy System 2016 Vol.2(3):244-250
Lv Xin [Abstract] (336) [HTML 0 KB][PDF 6172 KB] (438)
16 Comparative Study on the Properties of CFL 2016 Vol.2(7):600-607
[Abstract] (62) [HTML 0 KB][PDF 5745 KB] (312)
17 A Fully Homomorphic Encryption Scheme Based LWE 2016 Vol.2(3):220-224
[Abstract] (220) [HTML 0 KB][PDF 3693 KB] (352)
18 CFL is Statistical Zero Knowledge Proof System 2016 Vol.2(7):621-627
[Abstract] (74) [HTML 0 KB][PDF 4887 KB] (305)
19 Spread Spectrum Information Hiding with PN Sequence Mask 2016 Vol.2(8):735-740
[Abstract] (114) [HTML 0 KB][PDF 6121 KB] (277)
20 Differential Privacy and Applications 2015 Vol.1(3):224-229
[Abstract] (497) [HTML 0 KB][PDF 5750 KB] (502)
21 “Internet Plus” Mobile Power: Analysis the Network Security of ZTE 2016 Vol.2(4):288-298
[Abstract] (657) [HTML 0 KB][PDF 1637 KB] (440)
22 A Malicious Code Detection Method Based on Data Mining and Machine Learning 2016 Vol.2(1):74-79
[Abstract] (182) [HTML 0 KB][PDF 4535 KB] (360)
23 Research of Threat Intelligence Sharing and Using for Cyber Attack Attribution 2015 Vol.1(1):31-36
Yang Zeming, Li Qiang, Liu Junrong, and Liu Baoxu [Abstract] (332) [HTML 0 KB][PDF 5527 KB] (502)
24 The Present Situation and Thought of Cloud Computing Security Standards at Home and Abroad 2016 Vol.2(5):424-428
[Abstract] (193) [HTML 0 KB][PDF 4332 KB] (309)
25 Management and Directed Study of Internet Public Opinion in the Age of Big Data 2016 Vol.2(4):356-360
[Abstract] (158) [HTML 0 KB][PDF 4303 KB] (332)
26 Research of Electronic Invoice System Based on Block Chain 2017 Vol.3(6):516-522
[Abstract] (91) [HTML 0 KB][PDF 3190 KB] (177)
27 Security Authentication Protocol Based on Grain-v1 in National Military Standard 2016 Vol.2(6):513-518
[Abstract] (101) [HTML 0 KB][PDF 4984 KB] (249)
28 The Detecting Algorithm of Pornographic Image Based on Deep Learning and Model Cascade 2016 Vol.2(10):903-908
[Abstract] (167) [HTML 0 KB][PDF 5764 KB] (289)
29 “Internet +”Power: The Information Security and Strategic Layout of Lenovo on the Basis of “Internet +” Background 2016 Vol.2(7):574-586
[Abstract] (74) [HTML 0 KB][PDF 3175 KB] (351)
Copyright © Editorial Board of Journal of Information Security Research