Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Tsinghua University(Science and Technology)
1000-0054
2016 Issue 5
Assessment of Android application’s risk behavior based on a sandbox system
LI Zhoujun;WU Chunming;WANG Xiao;School of Computer Science and Engineering;Beihang University;National Computer Network Emergency Response Technical Team;Coordination Center of China;
..............page:453-460
Android application security vulnerability analysis framework based on feature matching
DONG Guowei;WANG Meilin;SHAO Shuai;ZHU Longhua;China Information Technology Security Evaluation Center;
..............page:461-467
Android malicious AD threat analysis and detection techniques
HAN Xinhui;DING Yijing;WANG Dongqi;LI Tongxin;YE Zhiyuan;Institute of Computer Science and Technology;Peking University;
..............page:468-477
Improved fuzzy analysis methods
MA Jinxin;ZHANG Tao;LI Zhoujun;ZHANG Jiangxiao;China Information Technology Security Evaluation Center;School of Computer Science and Engineering;Beihang University;Mathematics and Information Technology Institute;Xingtai University;
..............page:478-483
Malware algorithm recognition based on offline instruction-flow analyse
ZHAO Jingling;CHEN Shilei;CAO Mengchen;CUI Baojiang;School of Computer;Beijng University of Post and Telecommunications;National Engineering Lab for Mobile Network Security;
..............page:484-492
Analyse of the security architecture and policy model in the Common Criteria
SHI Hongsong;GAO Jinping;JIA Wei;LIU Hui;China Information Technology Security Evaluation Center;
..............page:493-498
Evaluating side-channel information leakage in 3DES using the t-test
CHEN Jiazhe;LI Hexin;WANG Yanan;WANG Yuhang;China Information Technology Security Evaluation Center;
..............page:499-503
LBT-based cloud data integrity verification scheme
LI Yong;YAO Ge;LEI Linan;ZHANG Xiaofei;YANG Kun;School of Electronic and Information Engineering;Beijing Jiaotong University;Fujian Provincial Key Laboratory of Network Security and Cryptology;Fujian Normal University;China Information Technology Security Evaluation Center;National Institute of Metrology;
..............page:504-510
Similarity measures and polymerization to identity threats in complex networks
DENG Hui;LIU Hui;ZHANG Baofeng;MAO Junjie;GUO Ying;XIONG Qi;XIE Shihua;China Information Technology Security Evaluation Center;
..............page:511-516
Mixed-index information system security evaluation
WANG Danchen;XU Yang;LI Bin;HE Xingxing;Intelligent Control Development Center;Southwest Jiaotong University;Sichuan Information Security Testing Evaluation Center;China Information Technology Security Evaluation Center;
..............page:517-521+529
Temporal and spatial characteristics of offshore wind resources
FENG Yu;HE Yan;ZHU Qihao;GUO Chen;FENG Xiaodan;HUANG Biqing;Department of Automation;Tsinghua University;Huaneng Renewables Corporation Limited;
..............page:522-529
Fault diagnostics using DUCG incomplex systems
ZHAO Yue;DONG Chunling;ZHANG Qin;Key Laboratory of Advanced Reactor Engineering and Safety of the Ministry of Education;Collaborative Innovation Center of Advanced Nuclear Energy Technology;Institute of Nuclear and New Energy Technology;Tsinghua University;Department of Computer Science and Technology;Tsinghua University;
..............page:530-537+543
Student-teacher networks in university research institutes
MA Xun;SHEN Shifei;NI Shunjiang;YONG Nuo;Institute of Public Safety Research;Department of Engineering Physics;Tsinghua University;
..............page:538-543
Code structure and information modeling for health intervention classifications
WANG Tingyan;YU Ming;YANG Lan;NING Wenxin;KONG Dehua;Health Care Services Research Center;Department of Industrial Engineering;Tsinghua University;
..............page:544-552
Vector distance direction information for spatio-temporal Kriging
CHEN Dingxin;LU Wenkai;LIU Daizhi;State Key Laboratory of Intelligent Technology and Systems;Department of Automation;Tsinghua University;Staff Room 907;PLA Rocket Force University of Engineering;
..............page:553-557
Stakeholder cooperation management in hydropower development projects
WANG Shuli;TANG Wenzhe;SHEN Wenxin;LEI Zhen;State Key Laboratory of Hydroscience and Engineering;Institute of Project Management and Construction Technology;Tsinghua University;
..............page:558-564