Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2016 Issue 3
xin xi dong tai
..............page:3,5,10-15,22-23,84-87
e yi mu ma cheng xu trojan_generic
..............page:24
er yue re dian yu qing top10
..............page:25
jie du rsa da hui de qian shi jin sheng
wei yang ;
..............page:26-39
gong kong an quan di diao er bu shi zhong yao
chen zuo zhi ;
..............page:42-43
jiao zhu chuang xin sha he jue sai phantom yi jun tu qi duo guan
wo long chuan shuo ;
..............page:48-49
rsa2016 wang an da ka men de si xiang yu huo hua
wu xiao zuo ;
..............page:52-54
rsa2016 da hui shang de zhong guo li liang
jun fang ;
..............page:55-61
tai qian mu hou jie an quan
..............page:62-65
na shi me bao hu ni , wo de ping guo zhi fu ?
mu xu ;
..............page:66-67
ping guo ceo ku ke si ke mei guo zheng fu
wu xiao zuo ;
..............page:68-69
hui feng yin xing ddos gong ji shi jian shi mo
sophia;
..............page:70-71
mei guo dui yi wang luo an zhan ji hua bei pu guang
chen zuo zhi ;
..............page:74-75
zhi neng sheng huo chao liu xia de an quan wu zuo
qi yue ;
..............page:76-77
an quan shen qi bu zai an quan hai zi geng wei xian ?
an sheng ;
..............page:78-79
jing ti ! yi liao jian kang zao yu an quan wei xie
jun fang ;
..............page:80-81
quan qiu wang luo an quan zhuan ye shi li zui qiang da xue top10
zheng xiao xiao ;
..............page:88-89
ba sai luo na fa xian yi shu de ji zhi biao da
zheng xiao xiao ;
..............page:90-91
An Efficient Method for Secret Key Establishmentbased on Uncoordinated Frequency-Hopping
DAI Ya-nan;,ZHANG Chi;,YU Neng-hai;
..............page:93-97,102
Game and Evolution Analysis on Mobile Malware Industrial Chain
WANG Xiu-li;,ZHU Jian-ming;
..............page:98-102
Crypto Technology for Cloud Computing
ZHAO Yun;,PANG Zhen-jiang;,XIA Xin;,WANG Feng-long;,WANG Yu-bo;
..............page:103-105,109
Security Monitoring and Defense Technology of Wireless Network
YANG Nan;,JI Lei;
..............page:106-109
A Packet-Sending Rate Learning Algorithm for Web Scanning
HUANG Wei-wu;,YAN Zhao-teng;,ZHU Hong-song;,SUN Li-min;
..............page:110-114,117
Phishing-Website Detection based on Image Similarity
LU Kang;,ZHOU An-min;
..............page:115-117
Abnormality Detection of Program Behavior by Using VMM
JIANG Chuang-yong;,YAO Li-hong;,PAN Li;
..............page:118-122
Data Recovery Technology of Nand-Flash-based Storage
LIN Chen;,WANG Xiao-hai;,YUAN Jian-guo;,ZHANG Xi;
..............page:123-125,128
A System-Level Dual-Domain Isolation based on Linux Container Mechanism
LIU Gang;,REN Fei;,PENG Yuan-zhi;
..............page:126-128