keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
2018 Vol. 4, No. 4
Published: 15 April 2018

 
282 To Create a Positive Cyberspace by Safeguarding Network Security with Active Immune Trusted Computing 3.0
2018 Vol. 4 (4): 282-302 [Abstract] ( 2 ) HTML (1 KB)  PDF  (2291 KB)  ( 11 )
303 C3 Security Summit Focuses on the New Trends of Cyber Security in 2018
2018 Vol. 4 (4): 303-306 [Abstract] ( 1 ) HTML (1 KB)  PDF  (840 KB)  ( 11 )
307 A Trusted QoS Evaluation Model Based on Service Perception
2018 Vol. 4 (4): 307-314 [Abstract] ( 2 ) HTML (1 KB)  PDF  (2106 KB)  ( 7 )
315 A Method Based on Wave Filtering to Evaluate the Intensity of Privacy Preserving on Social Network
2018 Vol. 4 (4): 315-321 [Abstract] ( 3 ) HTML (1 KB)  PDF  (1727 KB)  ( 9 )
322 A Static Tagging Method of Malicious Code Family Based on Multi-Feature
2018 Vol. 4 (4): 322-328 [Abstract] ( 4 ) HTML (1 KB)  PDF  (1878 KB)  ( 5 )
329 Multi-Level Key Management Scheme for Multi-Level Removable Storage Devices
2018 Vol. 4 (4): 329-335 [Abstract] ( 2 ) HTML (1 KB)  PDF  (1403 KB)  ( 3 )
336 Chaotic Sequence Image Encryption Scheme Based on LFSR State Sequences
2018 Vol. 4 (4): 336-341 [Abstract] ( 1 ) HTML (1 KB)  PDF  (1518 KB)  ( 3 )
342 An Image and Video Protection Scheme Based on Android Kernel Extension
2018 Vol. 4 (4): 342-351 [Abstract] ( 1 ) HTML (1 KB)  PDF  (3060 KB)  ( 5 )
352 Asymmetric Text-dependent Speaker Recognition using Wavelet and Supervector
2018 Vol. 4 (4): 352-358 [Abstract] ( 2 ) HTML (1 KB)  PDF  (1265 KB)  ( 3 )
359 The Study of Defect Patterns Matching Based on Static Analysis
2018 Vol. 4 (4): 359-363 [Abstract] ( 2 ) HTML (1 KB)  PDF  (1162 KB)  ( 3 )
364 Based on DWT multi-model combined prediction of page views on the social networking site
2018 Vol. 4 (4): 364-368 [Abstract] ( 1 ) HTML (1 KB)  PDF  (1682 KB)  ( 8 )
369 Review and Research for Consensus Mechanism of Block Chain
2018 Vol. 4 (4): 369-379 [Abstract] ( 1 ) HTML (1 KB)  PDF  (2321 KB)  ( 9 )
380 Method on the Detection of Second-Order Vulnerability for PHP Applications
2018 Vol. 4 (4): 380-386 [Abstract] ( 1 ) HTML (1 KB)  PDF  (1233 KB)  ( 8 )
387 A Ransomware Testing Method Based on File Damage Degree
2018 Vol. 4 (4): 387-392 [Abstract] ( 1 ) HTML (1 KB)  PDF  (1005 KB)  ( 4 )
Copyright © Editorial Board of Journal of Information Security Research