keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
2017 Vol. 3, No. 2
Published: 15 February 2017

 
98 Venustech’s Continuous Construction of the Information Security Ecological Chain — Analyze the Information and Cyber Security Strategy of Venustech
2017 Vol. 3 (2): 98-115 [Abstract] ( 72 ) HTML (1 KB)  PDF  (3877 KB)  ( 213 )
116 Analysis of Information Security Vulnerabilities and Penetration Attack Based on Social Engineering
2017 Vol. 3 (2): 116-122 [Abstract] ( 138 ) HTML (1 KB)  PDF  (5294 KB)  ( 198 )
123 Research of Identifying Web Vulnerability Scanner Based on Finite State Machine
2017 Vol. 3 (2): 123-128 [Abstract] ( 106 ) HTML (1 KB)  PDF  (4048 KB)  ( 156 )
129 A Survey of USB HID Attack and Defense Technology
2017 Vol. 3 (2): 129-138 [Abstract] ( 83 ) HTML (1 KB)  PDF  (8524 KB)  ( 65 )
139 Research on Android Application Permission Monitor
2017 Vol. 3 (2): 139-144 [Abstract] ( 87 ) HTML (1 KB)  PDF  (4793 KB)  ( 120 )
145 Semantics Based Webshell Detection Method Research
2017 Vol. 3 (2): 145-150 [Abstract] ( 98 ) HTML (1 KB)  PDF  (4585 KB)  ( 161 )
151 A Review on Security Ontology: Document Analysis from 2010 to 2016
2017 Vol. 3 (2): 151-159 [Abstract] ( 121 ) HTML (1 KB)  PDF  (6880 KB)  ( 90 )
160 Improvement of AntColony Text Clustering Algorithm Based on “Intelligent Information Center”
2017 Vol. 3 (2): 160-165 [Abstract] ( 112 ) HTML (1 KB)  PDF  (4272 KB)  ( 82 )
166 Research on the Sentiment Analysis Model of Product Reviews Based on Machine Learning
2017 Vol. 3 (2): 166-170 [Abstract] ( 158 ) HTML (1 KB)  PDF  (3979 KB)  ( 104 )
171 A Network Security Protection Research for Industrial Control System
2017 Vol. 3 (2): 171-176 [Abstract] ( 90 ) HTML (1 KB)  PDF  (5018 KB)  ( 177 )
177 Research and Practice on Network Security Assurance of Important Activities
2017 Vol. 3 (2): 177-181 [Abstract] ( 67 ) HTML (1 KB)  PDF  (3790 KB)  ( 107 )
182 Research on the Legislation of Data Localization
2017 Vol. 3 (2): 182-187 [Abstract] ( 154 ) HTML (1 KB)  PDF  (5587 KB)  ( 102 )
188 Research on the Structural Security of Private Cloud in Government and Enterprise
2017 Vol. 3 (2): 188-192 [Abstract] ( 146 ) HTML (1 KB)  PDF  (1236 KB)  ( 147 )
Copyright © Editorial Board of Journal of Information Security Research