| |
| Cyber Ranges: state-of-the-art and research challenges |
| FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe |
| 2016,1(3):1-9 [Abstract] [View PDF(394.10 K)] |
| |
| Network Security Visualization: A Survey |
| YUAN Bin, ZOU Deqing and JIN Hai |
| 2016,1(3):10-20 [Abstract] [View PDF(7.66 M)] |
| |
| Survey of Insider Threat Detection |
| YANG Guang, MA Jiangang, YU Aimin and MENG Dan |
| 2016,1(3):21-36 [Abstract] [View PDF(1.16 M)] |
| |
| Research on Digital Forensics of Smart Devices |
| JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong |
| 2016,1(3):37-51 [Abstract] [View PDF(1.64 M)] |
| |
| Software Plagiarism Detection: A Survey |
| TIAN Zhenzhou, LIU Ting, ZHENG Qinghua, TONG Feifei, WU Dinghao, ZHU Sencun and CHEN Kai |
| 2016,1(3):52-76 [Abstract] [View PDF(869.30 K)] |
| |
| Chinese Morphs Identification and Normalization |
| SHA Ying, LIANG Qi and WANG Bin |
| 2016,1(3):77-87 [Abstract] [View PDF(682.44 K)] |
| |