keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
2017 Vol. 3, No. 2
Published: 15 February 2017

 
98 Venustech’s Continuous Construction of the Information Security Ecological Chain — Analyze the Information and Cyber Security Strategy of Venustech
2017 Vol. 3 (2): 98-115 [Abstract] ( 87 ) HTML (1 KB)  PDF  (3877 KB)  ( 242 )
116 Analysis of Information Security Vulnerabilities and Penetration Attack Based on Social Engineering
2017 Vol. 3 (2): 116-122 [Abstract] ( 155 ) HTML (1 KB)  PDF  (5294 KB)  ( 229 )
123 Research of Identifying Web Vulnerability Scanner Based on Finite State Machine
2017 Vol. 3 (2): 123-128 [Abstract] ( 116 ) HTML (1 KB)  PDF  (4048 KB)  ( 192 )
129 A Survey of USB HID Attack and Defense Technology
2017 Vol. 3 (2): 129-138 [Abstract] ( 106 ) HTML (1 KB)  PDF  (8524 KB)  ( 77 )
139 Research on Android Application Permission Monitor
2017 Vol. 3 (2): 139-144 [Abstract] ( 102 ) HTML (1 KB)  PDF  (4793 KB)  ( 141 )
145 Semantics Based Webshell Detection Method Research
2017 Vol. 3 (2): 145-150 [Abstract] ( 113 ) HTML (1 KB)  PDF  (4585 KB)  ( 220 )
151 A Review on Security Ontology: Document Analysis from 2010 to 2016
2017 Vol. 3 (2): 151-159 [Abstract] ( 140 ) HTML (1 KB)  PDF  (6880 KB)  ( 112 )
160 Improvement of AntColony Text Clustering Algorithm Based on “Intelligent Information Center”
2017 Vol. 3 (2): 160-165 [Abstract] ( 120 ) HTML (1 KB)  PDF  (4272 KB)  ( 101 )
166 Research on the Sentiment Analysis Model of Product Reviews Based on Machine Learning
2017 Vol. 3 (2): 166-170 [Abstract] ( 168 ) HTML (1 KB)  PDF  (3979 KB)  ( 135 )
171 A Network Security Protection Research for Industrial Control System
2017 Vol. 3 (2): 171-176 [Abstract] ( 108 ) HTML (1 KB)  PDF  (5018 KB)  ( 225 )
177 Research and Practice on Network Security Assurance of Important Activities
2017 Vol. 3 (2): 177-181 [Abstract] ( 79 ) HTML (1 KB)  PDF  (3790 KB)  ( 128 )
182 Research on the Legislation of Data Localization
2017 Vol. 3 (2): 182-187 [Abstract] ( 164 ) HTML (1 KB)  PDF  (5587 KB)  ( 127 )
188 Research on the Structural Security of Private Cloud in Government and Enterprise
2017 Vol. 3 (2): 188-192 [Abstract] ( 156 ) HTML (1 KB)  PDF  (1236 KB)  ( 167 )
Copyright © Editorial Board of Journal of Information Security Research