| |
| Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services |
| | CAO Chen, GAO Neng, XIANG Ji and LIU Peng |
| | 2016,1(1):1-11 [Abstract] [View PDF(433.02 K)] |
| | |
| Cross-Organizational Secure Object Tracking |
| | HAN Weili, WANG Wei, ZHANG Yin, YUAN Lang, SHEN Sean and WANG X. Sean |
| | 2016,1(1):12-23 [Abstract] [View PDF(747.58 K)] |
| | |
| Scalable Detection of Unknown Malware from Millions of Apps |
| | CHEN Kai, WANG Peng, Yeonjoon Lee, WANG Xiaofeng, ZHANG Nan, HUANG Heqing, ZOU Wei and LIU Peng |
| | 2016,1(1):24-38 [Abstract] [View PDF(729.99 K)] |
| | |
| Swarm Intelligence Algorithms and Study on its Application in Information Security |
| | YANG Yixian, LI Lixiang, PENG Haipeng, YUAN Jing, CHEN Yonggang and ZHANG Hao |
| | 2016,1(1):39-49 [Abstract] [View PDF(666.05 K)] |
| | |
| Radio Fingerprint Extraction based on Constellation Trace Figure |
| | PENG Linning, HU Aiqun, ZHU Changming and JIANG Yu |
| | 2016,1(1):50-58 [Abstract] [View PDF(801.13 K)] |
| | |
| Analysis of Links between Different Types of Cryptanalytic Methods for Block Cipher |
| | WANG Meiqin, SUN Ling, CHEN Huaifeng and LIU Yu |
| | 2016,1(1):59-74 [Abstract] [View PDF(1.04 M)] |
| | |
| Trusted Virtual Domain based on Virtual Machine Introspection Technology |
| | XING Bin, HAN Zhen, CHANG Xiaolin and LIU Jiqiang |
| | 2016,1(1):75-94 [Abstract] [View PDF(663.53 K)] |
| | |