Volume 1,Issue 1,2016 Table of Contents

Other Issues:  


Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services
  CAO Chen, GAO Neng, XIANG Ji and LIU Peng
  2016,1(1):1-11 [Abstract]  [View PDF(433.02 K)]
Cross-Organizational Secure Object Tracking
  HAN Weili, WANG Wei, ZHANG Yin, YUAN Lang, SHEN Sean and WANG X. Sean
  2016,1(1):12-23 [Abstract]  [View PDF(747.58 K)]
Scalable Detection of Unknown Malware from Millions of Apps
  CHEN Kai, WANG Peng, Yeonjoon Lee, WANG Xiaofeng, ZHANG Nan, HUANG Heqing, ZOU Wei and LIU Peng
  2016,1(1):24-38 [Abstract]  [View PDF(729.99 K)]
Swarm Intelligence Algorithms and Study on its Application in Information Security
  YANG Yixian, LI Lixiang, PENG Haipeng, YUAN Jing, CHEN Yonggang and ZHANG Hao
  2016,1(1):39-49 [Abstract]  [View PDF(666.05 K)]
Radio Fingerprint Extraction based on Constellation Trace Figure
  PENG Linning, HU Aiqun, ZHU Changming and JIANG Yu
  2016,1(1):50-58 [Abstract]  [View PDF(801.13 K)]
Analysis of Links between Different Types of Cryptanalytic Methods for Block Cipher
  WANG Meiqin, SUN Ling, CHEN Huaifeng and LIU Yu
  2016,1(1):59-74 [Abstract]  [View PDF(1.04 M)]
Trusted Virtual Domain based on Virtual Machine Introspection Technology
  XING Bin, HAN Zhen, CHANG Xiaolin and LIU Jiqiang
  2016,1(1):75-94 [Abstract]  [View PDF(663.53 K)]