Threat Analysis and Detection Techniques of Hardware Trojans
ZHOU Yu;YU Zongguang;No.58 Research Institute;China Electronic Technology Group Corporation;China Academy of Electronics and Information Technology;School of Microelectornics;Xidian University;
Analysis of Model of QQ Forensic in Android System
LI Qiang;LIU Baoxu;JIANG Zhengwei;YAN Jian;Institute of Information Engineering;Chinese Academy of Sciences;University of Chinese Academy of Sciences;