| |
| Cyber Ranges: state-of-the-art and research challenges |
| | FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe |
| | 2016,1(3):1-9 [Abstract] [View PDF(394.10 K)] |
| | |
| Network Security Visualization: A Survey |
| | YUAN Bin, ZOU Deqing and JIN Hai |
| | 2016,1(3):10-20 [Abstract] [View PDF(7.66 M)] |
| | |
| Survey of Insider Threat Detection |
| | YANG Guang, MA Jiangang, YU Aimin and MENG Dan |
| | 2016,1(3):21-36 [Abstract] [View PDF(1.16 M)] |
| | |
| Research on Digital Forensics of Smart Devices |
| | JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong |
| | 2016,1(3):37-51 [Abstract] [View PDF(1.64 M)] |
| | |
| Software Plagiarism Detection: A Survey |
| | TIAN Zhenzhou, LIU Ting, ZHENG Qinghua, TONG Feifei, WU Dinghao, ZHU Sencun and CHEN Kai |
| | 2016,1(3):52-76 [Abstract] [View PDF(869.30 K)] |
| | |
| Chinese Morphs Identification and Normalization |
| | SHA Ying, LIANG Qi and WANG Bin |
| | 2016,1(3):77-87 [Abstract] [View PDF(682.44 K)] |
| | |