| Volume 2,Issue 2,2017 Table of Contents
Contents | | | Research on Car Information Security Attack and Protection Technology | | FENG Zhijie, HE Ming, LI Bin and DENG Ming | | 2017,2(2):1-14 [Abstract] [View PDF(1.95 M)] | | | | System and Approach of Security Testing and Evaluation for In-Vehicle Information Systems | | CHEN Xiuzhen, WU Yue and LI Jianhua | | 2017,2(2):15-23 [Abstract] [View PDF(3.06 M)] | | | | A Measurement and Analysis Study on Mainline DHT Network for Management and Control | | TIAN Zhihong, ZHANG Xinxing, LOU Fang and LIU Yuan | | 2017,2(2):24-32 [Abstract] [View PDF(891.00 K)] | | | | “Star Drawing Operation”: A Method to Identify HF RFID Cloning Card Based on RF Fingerprinting | | ZHANG Guozhu, XIA Luning, JIA Shijie and JI Yafei | | 2017,2(2):33-47 [Abstract] [View PDF(2.51 M)] | | | | Survey on Sentiment Orientation Analysis and Its Applications | | LI Jianhua, LIU Gongshen and LIN Xiang | | 2017,2(2):48-62 [Abstract] [View PDF(1.14 M)] | | |
|