Volume 1,Issue 3,2016 Table of Contents

   
Other Issues:  
  

Contents

Cyber Ranges: state-of-the-art and research challenges
  FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
  2016,1(3):1-9 [Abstract]  [View PDF(394.10 K)]
  
Network Security Visualization: A Survey
  YUAN Bin, ZOU Deqing and JIN Hai
  2016,1(3):10-20 [Abstract]  [View PDF(7.66 M)]
  
Survey of Insider Threat Detection
  YANG Guang, MA Jiangang, YU Aimin and MENG Dan
  2016,1(3):21-36 [Abstract]  [View PDF(1.16 M)]
  
Research on Digital Forensics of Smart Devices
  JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
  2016,1(3):37-51 [Abstract]  [View PDF(1.64 M)]
  
Software Plagiarism Detection: A Survey
  TIAN Zhenzhou, LIU Ting, ZHENG Qinghua, TONG Feifei, WU Dinghao, ZHU Sencun and CHEN Kai
  2016,1(3):52-76 [Abstract]  [View PDF(869.30 K)]
  
Chinese Morphs Identification and Normalization
  SHA Ying, LIANG Qi and WANG Bin
  2016,1(3):77-87 [Abstract]  [View PDF(682.44 K)]