| |
| Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services |
| CAO Chen, GAO Neng, XIANG Ji and LIU Peng |
| 2016,1(1):1-11 [Abstract] [View PDF(433.02 K)] |
| |
| Cross-Organizational Secure Object Tracking |
| HAN Weili, WANG Wei, ZHANG Yin, YUAN Lang, SHEN Sean and WANG X. Sean |
| 2016,1(1):12-23 [Abstract] [View PDF(747.58 K)] |
| |
| Scalable Detection of Unknown Malware from Millions of Apps |
| CHEN Kai, WANG Peng, Yeonjoon Lee, WANG Xiaofeng, ZHANG Nan, HUANG Heqing, ZOU Wei and LIU Peng |
| 2016,1(1):24-38 [Abstract] [View PDF(729.99 K)] |
| |
| Swarm Intelligence Algorithms and Study on its Application in Information Security |
| YANG Yixian, LI Lixiang, PENG Haipeng, YUAN Jing, CHEN Yonggang and ZHANG Hao |
| 2016,1(1):39-49 [Abstract] [View PDF(666.05 K)] |
| |
| Radio Fingerprint Extraction based on Constellation Trace Figure |
| PENG Linning, HU Aiqun, ZHU Changming and JIANG Yu |
| 2016,1(1):50-58 [Abstract] [View PDF(801.13 K)] |
| |
| Analysis of Links between Different Types of Cryptanalytic Methods for Block Cipher |
| WANG Meiqin, SUN Ling, CHEN Huaifeng and LIU Yu |
| 2016,1(1):59-74 [Abstract] [View PDF(1.04 M)] |
| |
| Trusted Virtual Domain based on Virtual Machine Introspection Technology |
| XING Bin, HAN Zhen, CHANG Xiaolin and LIU Jiqiang |
| 2016,1(1):75-94 [Abstract] [View PDF(663.53 K)] |
| |