Volume 2,Issue 2,2017 Table of Contents

Other Issues:  


Research on Car Information Security Attack and Protection Technology
  FENG Zhijie, HE Ming, LI Bin and DENG Ming
  2017,2(2):1-14 [Abstract]  [View PDF(1.95 M)]
System and Approach of Security Testing and Evaluation for In-Vehicle Information Systems
  CHEN Xiuzhen, WU Yue and LI Jianhua
  2017,2(2):15-23 [Abstract]  [View PDF(3.06 M)]
A Measurement and Analysis Study on Mainline DHT Network for Management and Control
  TIAN Zhihong, ZHANG Xinxing, LOU Fang and LIU Yuan
  2017,2(2):24-32 [Abstract]  [View PDF(891.00 K)]
“Star Drawing Operation”: A Method to Identify HF RFID Cloning Card Based on RF Fingerprinting
  ZHANG Guozhu, XIA Luning, JIA Shijie and JI Yafei
  2017,2(2):33-47 [Abstract]  [View PDF(2.51 M)]
Survey on Sentiment Orientation Analysis and Its Applications
  LI Jianhua, LIU Gongshen and LIN Xiang
  2017,2(2):48-62 [Abstract]  [View PDF(1.14 M)]