Research on Webshell-based botnet
LI Ke;FANG Bin-xing;CUI Xiang;LIU Qi-xu;YAN Zhi-tao;School of Computer;Beijing University of Posts and Telecommunications;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:11-19
..............page:94-105
..............page:106-118
..............page:119-128
..............page:129-136
..............page:137-143
..............page:144-153
User social influence analysis based on constrained nonnegative tensor factorization
WEI Jing-jing;CHEN Chang;LIAO Xiang-wen;CHEN Guo-long;CHENG Xue-qi;College of Physics and Information Engineering;Fuzhou University;College of Electronics and Information Science;Fujian Jiangxia University;College of Mathematics and Computer Science;Fuzhou University;Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing;Fuzhou University;Institute of Computing Technology;Chinese Academy of Sciences;
..............page:154-162
..............page:163-168
Survey of security for Android smart terminal
XU Yan-ping;MA Zhao-feng;WANG Zhong-hua;NIU Xin-xin;YANG Yi-xian;Information Security Center;Beijing University of Posts and Telecommunications;National Computer Network Emergency Response Technical Team;Coordination Center of China;
..............page:169-184
..............page:185-191
Adaptive steganography algorithm in digital image based on Arnold transform
LI Qi;LIAO Xin;QU Guo-qing;CHEN Guo-yong;DU Jiao;College of Computer Science and Electronic Engineering;Hunan University;Institute of Software Chinese Academy of Sciences;Institute of Information Engineering Chinese Academy of Sciences;Software Institute;Nanjing University;College of Mathematics and Information Science;Henan Normal University;
..............page:192-198