| | Volume 1,Issue 1,2016 Table of Contents
Contents | | | Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services | | | CAO Chen, GAO Neng, XIANG Ji and LIU Peng | | | 2016,1(1):1-11 [Abstract] [View PDF(433.02 K)] | | | | | Cross-Organizational Secure Object Tracking | | | HAN Weili, WANG Wei, ZHANG Yin, YUAN Lang, SHEN Sean and WANG X. Sean | | | 2016,1(1):12-23 [Abstract] [View PDF(747.58 K)] | | | | | Scalable Detection of Unknown Malware from Millions of Apps | | | CHEN Kai, WANG Peng, Yeonjoon Lee, WANG Xiaofeng, ZHANG Nan, HUANG Heqing, ZOU Wei and LIU Peng | | | 2016,1(1):24-38 [Abstract] [View PDF(729.99 K)] | | | | | Swarm Intelligence Algorithms and Study on its Application in Information Security | | | YANG Yixian, LI Lixiang, PENG Haipeng, YUAN Jing, CHEN Yonggang and ZHANG Hao | | | 2016,1(1):39-49 [Abstract] [View PDF(666.05 K)] | | | | | Radio Fingerprint Extraction based on Constellation Trace Figure | | | PENG Linning, HU Aiqun, ZHU Changming and JIANG Yu | | | 2016,1(1):50-58 [Abstract] [View PDF(801.13 K)] | | | | | Analysis of Links between Different Types of Cryptanalytic Methods for Block Cipher | | | WANG Meiqin, SUN Ling, CHEN Huaifeng and LIU Yu | | | 2016,1(1):59-74 [Abstract] [View PDF(1.04 M)] | | | | | Trusted Virtual Domain based on Virtual Machine Introspection Technology | | | XING Bin, HAN Zhen, CHANG Xiaolin and LIU Jiqiang | | | 2016,1(1):75-94 [Abstract] [View PDF(663.53 K)] | | | |
|