Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2015 Issue 4
xin xi dong tai
..............page:10-15,75-78
wang luo an quan lou dong fa lv wen ti yan jiu
zhang heng ;
..............page:20-24
neng yuan xing ye gong kong xi tong xin xi an quan fen xi yu fang hu
zhang wu yi ;, li sheng quan ;
..............page:41-44
dian li xin xi xi tong shu ju an quan fang hu
nie yuan ming ;, zhu wei guo ;, liu shi dong ;
..............page:45-47
mei guo que bao neng yuan xing ye xin xi an quan de zhu yao ju cuo tan xi
zhou ji li ;, song wen ying ;
..............page:53-58
cong hai kang wei shi shi jian kan an quan yi shi yu ze ren
lu bao hua ;, bi ning ;
..............page:59
xin xi an quan fu wu de gai nian yu fen lei
liu xiang ;, luo zuo ;, jiang lei ;
..............page:62-65,69
che liang wang luo an quan kai fa ti xi yan jiu
wu yue ;
..............page:71-74
Buffer Overflow Vulnerability Detection Technology based on Dynamic Instrumentation
LIU Lu-ping;,FANG Yong;,LIU Liang;,LONG Gang;
..............page:80-82,87
Android Malicious Behavior Detection based on Reverse Engineering
LOU Yun-cheng;,SHI Yong;,XUE Zhi;
..............page:83-87
Drive-by-Download Attack Deobfuscation based on AST
XIANG Jia-qi;,WANG Yi-jun;,XUE Zhi;
..............page:88-92
Discussion on System Operation and Maintenance Security Audit in Banking Data Center
YUAN Hui-ping;,DONG Zhenliang;
..............page:93-95,100
PublicOpinions Event Extraction based on Language Feature
JING Yue-cheng;,HUANG Zheng;
..............page:96-100
Reliability Analysis of Intelligent Mobile Terminal System based on SFMEA/SFTA Method
XIE An-ming;,HU Chun-hui;,ZHANG Meng-yang;,HE Xin;
..............page:101-104