keywords
Years
Adv Search
33
Home
About Us
Reader
Author
Review
Subscribe
Feedback
中文
About Journal
Editorial Board
Current Issue
Just Accepted
Archive
Read Articles
Download Articles
Online Submission
Manuscript Tracking
Instruction
Download
Peer Review
Editor-in-Chief
Office Work
Announcement
Special Report
Cooperator
Links
2018 Vol. 4, No. 4
Published: 15 April 2018
282
To Create a Positive Cyberspace by Safeguarding Network Security with Active Immune Trusted Computing 3.0
2018 Vol. 4 (4): 282-302 [
Abstract
] (
2
)
HTML
(1 KB)
PDF
(2291 KB) (
11
)
303
C3 Security Summit Focuses on the New Trends of Cyber Security in 2018
2018 Vol. 4 (4): 303-306 [
Abstract
] (
1
)
HTML
(1 KB)
PDF
(840 KB) (
11
)
307
A Trusted QoS Evaluation Model Based on Service Perception
2018 Vol. 4 (4): 307-314 [
Abstract
] (
2
)
HTML
(1 KB)
PDF
(2106 KB) (
7
)
315
A Method Based on Wave Filtering to Evaluate the Intensity of Privacy Preserving on Social Network
2018 Vol. 4 (4): 315-321 [
Abstract
] (
3
)
HTML
(1 KB)
PDF
(1727 KB) (
9
)
322
A Static Tagging Method of Malicious Code Family Based on Multi-Feature
2018 Vol. 4 (4): 322-328 [
Abstract
] (
4
)
HTML
(1 KB)
PDF
(1878 KB) (
5
)
329
Multi-Level Key Management Scheme for Multi-Level Removable Storage Devices
2018 Vol. 4 (4): 329-335 [
Abstract
] (
2
)
HTML
(1 KB)
PDF
(1403 KB) (
3
)
336
Chaotic Sequence Image Encryption Scheme Based on LFSR State Sequences
2018 Vol. 4 (4): 336-341 [
Abstract
] (
1
)
HTML
(1 KB)
PDF
(1518 KB) (
3
)
342
An Image and Video Protection Scheme Based on Android Kernel Extension
2018 Vol. 4 (4): 342-351 [
Abstract
] (
1
)
HTML
(1 KB)
PDF
(3060 KB) (
5
)
352
Asymmetric Text-dependent Speaker Recognition using Wavelet and Supervector
2018 Vol. 4 (4): 352-358 [
Abstract
] (
2
)
HTML
(1 KB)
PDF
(1265 KB) (
3
)
359
The Study of Defect Patterns Matching Based on Static Analysis
2018 Vol. 4 (4): 359-363 [
Abstract
] (
2
)
HTML
(1 KB)
PDF
(1162 KB) (
3
)
364
Based on DWT multi-model combined prediction of page views on the social networking site
2018 Vol. 4 (4): 364-368 [
Abstract
] (
1
)
HTML
(1 KB)
PDF
(1682 KB) (
8
)
369
Review and Research for Consensus Mechanism of Block Chain
2018 Vol. 4 (4): 369-379 [
Abstract
] (
1
)
HTML
(1 KB)
PDF
(2321 KB) (
9
)
380
Method on the Detection of Second-Order Vulnerability for PHP Applications
2018 Vol. 4 (4): 380-386 [
Abstract
] (
1
)
HTML
(1 KB)
PDF
(1233 KB) (
8
)
387
A Ransomware Testing Method Based on File Damage Degree
2018 Vol. 4 (4): 387-392 [
Abstract
] (
1
)
HTML
(1 KB)
PDF
(1005 KB) (
4
)
Copyright © Editorial Board of Journal of Information Security Research