keywords
Years
Adv Search
33
Home
About Us
Reader
Author
Review
Subscribe
Feedback
中文
About Journal
Editorial Board
Current Issue
Just Accepted
Archive
Read Articles
Download Articles
Online Submission
Manuscript Tracking
Instruction
Download
Peer Review
Editor-in-Chief
Office Work
Announcement
Special Report
Cooperator
Links
2017 Vol. 3, No. 2
Published: 15 February 2017
98
Venustech’s Continuous Construction of the Information Security Ecological Chain — Analyze the Information and Cyber Security Strategy of Venustech
2017 Vol. 3 (2): 98-115 [
Abstract
] (
72
)
HTML
(1 KB)
PDF
(3877 KB) (
213
)
116
Analysis of Information Security Vulnerabilities and Penetration Attack Based on Social Engineering
2017 Vol. 3 (2): 116-122 [
Abstract
] (
138
)
HTML
(1 KB)
PDF
(5294 KB) (
198
)
123
Research of Identifying Web Vulnerability Scanner Based on Finite State Machine
2017 Vol. 3 (2): 123-128 [
Abstract
] (
106
)
HTML
(1 KB)
PDF
(4048 KB) (
156
)
129
A Survey of USB HID Attack and Defense Technology
2017 Vol. 3 (2): 129-138 [
Abstract
] (
83
)
HTML
(1 KB)
PDF
(8524 KB) (
65
)
139
Research on Android Application Permission Monitor
2017 Vol. 3 (2): 139-144 [
Abstract
] (
87
)
HTML
(1 KB)
PDF
(4793 KB) (
120
)
145
Semantics Based Webshell Detection Method Research
2017 Vol. 3 (2): 145-150 [
Abstract
] (
98
)
HTML
(1 KB)
PDF
(4585 KB) (
161
)
151
A Review on Security Ontology: Document Analysis from 2010 to 2016
2017 Vol. 3 (2): 151-159 [
Abstract
] (
121
)
HTML
(1 KB)
PDF
(6880 KB) (
90
)
160
Improvement of AntColony Text Clustering Algorithm Based on “Intelligent Information Center”
2017 Vol. 3 (2): 160-165 [
Abstract
] (
112
)
HTML
(1 KB)
PDF
(4272 KB) (
82
)
166
Research on the Sentiment Analysis Model of Product Reviews Based on Machine Learning
2017 Vol. 3 (2): 166-170 [
Abstract
] (
158
)
HTML
(1 KB)
PDF
(3979 KB) (
104
)
171
A Network Security Protection Research for Industrial Control System
2017 Vol. 3 (2): 171-176 [
Abstract
] (
90
)
HTML
(1 KB)
PDF
(5018 KB) (
177
)
177
Research and Practice on Network Security Assurance of Important Activities
2017 Vol. 3 (2): 177-181 [
Abstract
] (
67
)
HTML
(1 KB)
PDF
(3790 KB) (
107
)
182
Research on the Legislation of Data Localization
2017 Vol. 3 (2): 182-187 [
Abstract
] (
154
)
HTML
(1 KB)
PDF
(5587 KB) (
102
)
188
Research on the Structural Security of Private Cloud in Government and Enterprise
2017 Vol. 3 (2): 188-192 [
Abstract
] (
146
)
HTML
(1 KB)
PDF
(1236 KB) (
147
)
Copyright © Editorial Board of Journal of Information Security Research