Most Download articles

    Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

    Most Downloaded in Recent Year
    Please wait a minute...
    For Selected: Toggle Thumbnails
    “Internet +”Power: Overview of AsiaInfo Secruity’s Cyber Security
    Journal of Information Security Research    2016, 2 (8): 670-684.  
    Abstract371)      PDF (1873KB)(1714)       Save
    Related Articles | Metrics
    Security-Development Road of National E-Gov Network in the “Internet +” Era
    Zhou Min
    Journal of Information Security Research    2015, 1 (2): 98-104.  
    Abstract366)      PDF (2278KB)(2108)       Save
    Related Articles | Metrics
    Artifcial Intelligence Promotes the Paradigm Shift of Information Security —A Case Study of Driverless Car by Baidu
    Journal of Information Security Research    2016, 2 (11): 958-968.  
    Abstract260)      PDF (2086KB)(1420)       Save
    Related Articles | Metrics
    SURFILTER, Insisting on the Road of Independent Innovation of Information Security -- Review of the Information and Network Security Strategy of SURFILTER
    Journal of Information Security Research    2016, 2 (12): 1054-1067.  
    Abstract153)      PDF (5217KB)(1122)       Save
    Related Articles | Metrics
    Journal of Information Security Reserach    2023, 9 (E2): 4-.  
    Abstract100)      PDF (2945KB)(912)       Save
    Related Articles | Metrics
    Meiya Pico,Innovation to Enhance the Core Technology of Cybersecurity
    Journal of Information Security Research    2017, 3 (9): 770-780.  
    Abstract361)      PDF (1952KB)(1084)       Save
    Related Articles | Metrics
    TOPSEC, Leading Brand of Independent Innovation, Supporting Cyberspace Power Strategy
    Journal of Information Security Research    2018, 4 (9): 774-782.  
    Abstract93)      PDF (1579KB)(847)       Save
    Related Articles | Metrics
    Trend on Cybersecurity Policy Risks of the Trump Administration and China Countermeasures
    Journal of Information Security Research    2018, 4 (10): 870-880.  
    Abstract129)      PDF (1337KB)(1011)       Save
    Reference | Related Articles | Metrics
    PeopleNet, Independently Developing Core Technology of Cyber Information Security
    Journal of Information Security Research    2017, 3 (7): 578-588.  
    Abstract248)      PDF (1448KB)(838)       Save
    Related Articles | Metrics
    “Internet Plus” Mobile Power: Analysis the Network Security of ZTE
    Journal of Information Security Research    2016, 2 (4): 288-298.  
    Abstract896)      PDF (1637KB)(1324)       Save
    Related Articles | Metrics
    Leveraging “Internet Plus” and Big Data for the Improvement of Services Supervision
    Cui Chuanzhen
    Journal of Information Security Research    2016, 2 (2): 98-106.  
    Abstract230)      PDF (1159KB)(1044)       Save
    Related Articles | Metrics
    Three-Dimensional Way of Acorn Network in Industrial Control Cybersecurity
    Journal of Information Security Research    2017, 3 (8): 0-0.  
    Abstract384)      PDF (3703KB)(787)       Save
    Related Articles | Metrics
    Research of Threat Intelligence Sharing and Using for Cyber Attack Attribution
    Yang Zeming, Li Qiang, Liu Junrong, and Liu Baoxu
    Journal of Information Security Research    2015, 1 (1): 31-36.  
    Abstract1011)      PDF (5527KB)(1556)       Save
    With the increasingly complexity of cyberspace security, the attack attribution has become an important challenge for the security protection system. The emergence of threat intelligence provided plentiful data source support for the attack attribution, which makes large-scale attack attribution became possible. To realize effective attack attribution, based on the structure expression of the threat information, a light weight framework of threat intelligence sharing and utilization was proposed. It included threat intelligence expression, exchange and utilization, which can achieve the attack attribution result. Take the case of C2 relevant information, we described the expression of threat intelligence sharing and utilization, and verified the framework. Results show that the framework is practical, and can provide new technical means for attack attribution. In addition, based on the understanding of threat intelligence, several thinking about the construction of sharing and utilization mechanisms were promoted in the end.
    Related Articles | Metrics
    Research on Security Protection of High RealTime Metro Integrated Supervisory and Control System
    Journal of Information Security Research    2019, 5 (8): 691-695.  
    Abstract83)      PDF (1098KB)(709)       Save
    Integrated Supervisory and Control System (ISCS) is one of the necessary automatic systems for efficient and safe operation of urban rail transit automation. The integrated monitoring system is a largescale integrated system with high integration of informationization and automation. The system integrates multiple automation and information subsystems in urban rail transit stations, tunnels, depots, parking lots, control centers, etc, and performs unified monitoring, control and management of subsystems on the same software platform, realizing the information sharing of each specialty system and the linkage control function between the systems. In this paper, the ISCS security protection solution for rail transit under the requirement of high realtime performance is studied, the typical security protection design concept is given, and the equal guarantee evaluation method is put forward.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2024, 10 (E2): 105-.  
    Abstract491)      PDF (929KB)(318)       Save
    Reference | Related Articles | Metrics
    VEDA, Establishing the AI Dynamic Defense System for Cyber Security
    Journal of Information Security Research    2017, 3 (12): 1058-1066.  
    Abstract330)      PDF (1526KB)(917)       Save
    Related Articles | Metrics
    Journal of Information Security Research    2016, 2 (11): 969-971.  
    Abstract428)      PDF (726KB)(1374)       Save
    Related Articles | Metrics
    The Review of Information Hiding Technology Based on GAN Image Generation
    Journal of Information Security Research    2019, 5 (9): 771-777.  
    Abstract800)      PDF (630KB)(1034)       Save
    The traditional steganography is facing more and more threats, and the steganographic analysis technology is gradually mature. To solve this problem, the Generative Adversarial Networks is introduced into the steganography, which can reduce the traces of carrier modification and improve the concealment of steganography. This paper introduces the basic structure of the Generative Adversarial Networks, summarizes, compares and classifies the research results of the steganography based on GAN image generation. According to the existing technical means, the shortcomings of the current Generative Adversarial Networks in the development of steganography are proposed, and the future research directions are prospected.
    Reference | Related Articles | Metrics
    Cracking the Hard Mathematical Problems of Cryptographic Algorithm
    Cui Chuanzhen
    Journal of Information Security Research    2015, 1 (1): 92-96.  
    Abstract343)      PDF (1027KB)(1022)       Save
    Related Articles | Metrics
    Blockchain and Quantum Computing
    Journal of Information Security Research    2018, 4 (6): 496-504.  
    Abstract185)      PDF (1390KB)(682)       Save
    In recent years, the emerging of digital encryption currency such as bitcoin, blockchain as its key technology has caused the government, technology companies, financial institutions and capital market great attention and wide public concern. Blockchain is a new kind of distributed, decentralized or centralized mechanism, has high distributed redundant storage, go to the center of the credit, automatic intelligent contract execution, timeseries data, not tampered with, the advantages of security and privacy. However, with the development of quantum computer, some advantages of blockchain will be challenged. By analyzing the core technology of the blockchain and combining the advantages of quantum computing, we could analyze the problems that the blockchain system will face in the future. We could work to provide effective guidance and reference to relevant researches of blockchain in the future.
    Reference | Related Articles | Metrics
    An Overview of Application and Technology of Artificial Intelligence in Cybersecurity
    Journal of Information Security Reserach    2022, 8 (2): 110-.  
    Abstract1836)      PDF (1142KB)(1357)       Save
    Compared with the developed countries, the basic research and technology application in the field of artificial intelligence in China started later, especially the application of artificial intelligence in the important field of network security. Domestic and abroad disparity is still very obvious, which seriously affects the improvement of China's cybersecurity capability. This paper elaborates the relationship between artificial intelligence, network attack and network defense, and widely investigates the application status of artificial intelligence in major information security companies at home and abroad. It points out that APT detection, 0day vulnerability mining and cloud security are three core areas that affect the level of cybersecurity capability, This paper deeply analyzes the key technologies of artificial intelligence technology applied in these three fields, and puts forward the safety risks of artificial intelligence technology, and points out that artificial intelligence technology is not a panacea for all diseases, This Paper provides a scientific reference for the further research and application of artificial intelligence technology in China's information security industry.
    Reference | Related Articles | Metrics
    Building Cyber Security Defense by Trusted Computing 3.0
    Journal of Information Security Research    2017, 3 (4): 290-298.  
    Abstract334)      PDF (1075KB)(1780)       Save
    Related Articles | Metrics
    “Internet +”Power: Overview of Westone Secruity’s Cyber Secruity
    Journal of Information Security Research    2016, 2 (10): 862-875.  
    Abstract230)      PDF (2788KB)(1101)       Save
    Related Articles | Metrics
    The Construction and Application of the Cloud Authentication Service Mode on Chinese Center for Disease Control and Prevention Information System
    Journal of Information Security Research    2017, 3 (6): 554-559.  
    Abstract212)      PDF (2121KB)(549)       Save
    This paper provides twofactor login authentication method based on digital certificate for Chinese center for disease control and prevention information system registered users, based on digital certificate, establishes a highsecurity and highly reliable identity authentication management mechanism through the establishment of cloud electronic authentication service platform. Thus it can prevent the hidden dangers of account information leakage. At the same time, it also describes how to build multi CA mutual trust mechanism. In order to solve the problem of mutual recognition of digital certificates in different CA institutions to achieve cross regional data transmission and sharing issues, support the analysis of different CA certificates, certificate file storage, certificate query verification of the unity.
    Reference | Related Articles | Metrics
    Privacypreserving Federated Learning Research Based on #br# Confused Modulo Projection Homomorphic Encryption#br#
    Journal of Information Security Reserach    2025, 11 (3): 198-.  
    Abstract144)      PDF (1298KB)(129)       Save
    In the current era of big data, deep learning is booming and has become a powerful tool for solving realworld problems. However, traditional centralized deep learning systems are at risk of privacy leakage. To address this problem, federated learning, a distributed machine learning approach, has emerged. Federated learning allows multiple organizations or individuals to train models together without sharing raw data, by uploading local model parameters to the server, aggregating each user’s parameters to construct a global model, and returning it to the user. This approach achieves global optimization and avoids private data leakage. However, even with federated learning, attackers may still be able to reconstruct user data by obtaining the model parameters uploaded by users, thus violating  privacy. To address this issue, privacy protection has become the focus of federated learning research. In this paper, we propose a federated learning scheme FLFC (federated learning with confused modulo projection homomorphic encryption) based on confused modulo projection homomorphic encryption to address the above issues. This scheme adopts a selfdeveloped modular fully homomorphic encryption algorithm to encrypt user model parameters. The modular fully homomorphic encryption algorithm has the advantages of high computational efficiency, support for floatingpoint operations, and localization, thus achieving stronger protection of privacy. Experimental results show that the FLFC scheme exhibits a higher average accuracy and good stability compared to the FedAvg scheme in experiments.
    Reference | Related Articles | Metrics
    AI and Data Privacy Protection: The Way to Federated Learning
    Journal of Information Security Research    2019, 5 (11): 961-965.  
    Abstract1205)      PDF (1395KB)(1290)       Save
    With the tremendous advance in computing, algorithms and data volume, artificial intelligence ushered in the third development climax, and began to gain a foot hold in exploring various industries. However, as the emergence of “big data”, more “small data” or “poorquality data”, and “data silos” exist in industry applications. For example, in the information security realm, it is difficult for enterprises who provide security services such as content security auditing and intrusion detection based on artificial intelligence technology to exchange raw data due to the consideration of user privacy and trade secrets protection. The services between enterprises are independent, and the overall development of cooperation and technology is difficult to make a breakthrough in a short period of time. How to promote greater cooperation on the premise of protecting the privacy of organizations? Will there be any chance for technical means to solve the data privacy protection problems? Federated Learning is an effective way to solve this problem and achieve acrossenterprise collaborative governance.
    Reference | Related Articles | Metrics
    “Internet +”Power: The Information Security and Strategic Layout of Huawei on the Basis of “Internet +” Background
    Journal of Information Security Research    2016, 2 (6): 478-489.  
    Abstract406)      PDF (930KB)(997)       Save
    Related Articles | Metrics
    A Review of Adversarial Attack on Autonomous Driving Perception System
    Journal of Information Security Reserach    2024, 10 (9): 786-.  
    Abstract360)      PDF (1560KB)(277)       Save
    The autonomous driving perception system collects surrounding environmental information through various sensors and processes this data to detect vehicles, pedestrians and obstacles, providing realtime foundational data for subsequent control and decisionmaking functions. Since sensors are directly connected to the external environment and often lack the ability to discern the credibility of inputs, the perception systems are  potential targets for various attacks. Among these, adversarial example attack is a mainstream attack method characterized by high concealment and harm. Attackers manipulate or forge input data of the perception system to deceive the perception algorithms, leading to incorrect output results by the system. Based on the research of existing relevant literature, this paper systematically summarizes the working methods of the autonomous driving perception system, analyzes the adversarial example attack schemes and defense strategies targeting the perception system. In particular, this paper subdivide the adversarial examples for the autonomous driving perception system into signalbased adversarial example attack scheme and objectbased adversarial example attack scheme. Additionally, the paper comprehensively discusses defense strategy of the adversarial example attack for the perception system, and subdivide it into anomaly detection, model defense, and physical defense. Finally, this paper prospects the future research directions of adversarial example attack targeting autonomous driving perception systems.
    Reference | Related Articles | Metrics
    To Create a Positive Cyberspace by Safeguarding Network Security with Active Immune Trusted Computing 3.0
    Journal of Information Security Research    2018, 4 (4): 282-302.  
    Abstract197)      PDF (2291KB)(968)       Save
    Related Articles | Metrics
    Secboot’s AI Technology Pushes Identif cation Security to the Cusp of a New Era
    Journal of Information Security Research    2018, 4 (7): 582-587.  
    Abstract127)      PDF (1248KB)(582)       Save
    Related Articles | Metrics
    Research on Cyber-Attack Defense System Based on Big Data and Threat Intelligence
    Journal of Information Security Research    2019, 5 (5): 383-387.  
    Abstract324)      PDF (1670KB)(1345)       Save
    Cyber-attacks are the use of network vulnerabilities and security flaws to attack the hardware, software and data of a cyber system. The earlier a cyber-attack is identified, the less adverse effect it has. The traditional network intrusion detection system (IDS) has some limitations in detecting cyber-attacks, such as passive protection and limited capability of threat identification. Threat intelligence technology provides a more scientific and effective method for identifying potential or actual cyber-attacks by using big data analysis,and provides a comprehensive and relevant cyber-attack defense model.
    Reference | Related Articles | Metrics
    Dean, the Pioneer and Guardian of Network Security for 20 Years Dean Group's Information Security and Strategy Based on a Network Powerful Nation
    Journal of Information Security Research    2017, 3 (10): 0-0.  
    Abstract118)      PDF (2297KB)(686)       Save
    Related Articles | Metrics
    Research on Security Protection of Typical Government Affairs Application Platform
    Journal of Information Security Research    2018, 4 (7): 662-667.  
    Abstract124)      PDF (1634KB)(436)       Save
    China, as the largest developing country in the world, is also the country with the largest number of Internet users in the world. Facing the increasingly complicated network security situation in the international community, it is urgent to maintain our cyberspace security. Among them, how to properly prevent malicious network attacks faced by a large number of government websites and effectively and ensure the safe operation of various government application platforms is even more important. We have legally authorized Infiltration of a provinciallevel GovernmentNetwork data exchange platform in both directions of entry and exit. Through the prevention issues found in the infiltration process, combined with our many years of network security work experience, we have proposed a closedloop security management and protection network technology in place. In order to be different from the general model of general cyber security type technical articles, we try to restore the actual penetration scenarios in the text, and from the point of view of the attacker, express important protection ideas in the most concise language and conclude 6 types of typical network protection work. I hope to be able to help network security attack and defense technology enthusiasts and government website administrators.
    Reference | Related Articles | Metrics
    Promoting “Internet+”Action: Explanation to Cyber Security of JD
    Journal of Information Security Research    2016, 2 (1): 2-11.  
    Abstract332)      PDF (1695KB)(1020)       Save
    Related Articles | Metrics
    Design and Implementation of Dark Net Data Crawler Based on Tor
    Journal of Information Security Research    2019, 5 (9): 798-804.  
    Abstract1172)      PDF (3976KB)(1445)       Save
    tWith the development of anonymous communication technology, more and more users begin to use anonymous communication to protect personal privacy. Tor, as the most popular application of anonymous communication system, can effectively prevent behavior such as traffic sniffing, eavesdropping and other behaviors. While protecting the privacy of users from being stolen, “dark net” is also used by many criminals. Thus, this has brought great challenges to the supervision of public security. How to strengthen the regulation and crackdown on illegal information of dark network websites is an urgent problem to be solved. Therefore, the data of crawling anonymous websites is an important basis for supervising those websites effectively. The most mainstream dark network anonymous communication system Tor was introduced briefly, its technical principles were analyzed, and a dark network data crawler program was designed, which mainly use Selenium to enter the Tor network, bulk crawl the dark Web pages and save the data to the local. It will help the public security department to further monitor and analyze the relevant content in the dark network, and also propose a feasible technical means for the police department to supervise the dark network.
    Reference | Related Articles | Metrics
    Research and Design of E-Government Authentication Service System Interconnection Platform
    Journal of Information Security Research    2017, 3 (6): 548-553.  
    Abstract157)      PDF (2089KB)(515)       Save
    At present, Chinas egovernment network has the problems of poor connectivity and low sharing, in order to strengthen the interconnection and intercommunication in the egovernment field, this paper puts forward the idea of construction and improvement of accelerated electronic certification mutual recognition platform. It can be regarded as one of the effective paths to improve the credible network space in China. On the basis of explaining the present situation of our countrys electronic certification service industry, and combining the basic situation of our country, the construction form and method of electronic certification mutual recognition platform are studied and analyzed, to improve the quality of electronic authentication services system interconnection platform.egovernment; electronic authentication; interconnection; mutual recognition platform; CA
    Reference | Related Articles | Metrics
    Cultivation of Cyber Security Talents Should Be Developed in Practical Training
    Journal of Information Security Research    2018, 4 (12): 1062-1065.  
    Abstract80)      PDF (1423KB)(544)       Save
    Related Articles | Metrics
    Construction and Practice of Emergency Plans for Cyber Security Events in E-Government Institutes
    Journal of Information Security Research    2019, 5 (5): 377-382.  
    Abstract152)      PDF (2124KB)(538)       Save
    With the frequent occurrence of various types of security risks in recent years, cyber security is becoming more and more serious. Once the critical information systems such as core business systems and goverment portals been attacked, will be having a wide range of impacts, endangering nation security, national economy and people's life and public interests.. In order to reduce the losses caused by cyber security incidents, it is very necessary for E-Government institutes to establish standardized and efficient emergency plan. Due to the limitations of consciousness, technology and resources, E-Government institutes have common problems in the construction and practice of common emergency plans. In view of this, it's necessary to put forward some suggestions for the optimization of emergency plans, which can help the information security staff of E-Government institutes to standardize the response process of cyber security incidents.
    Reference | Related Articles | Metrics
    The Reasearch of Internet Identity System Based on eID and Personal Information Protection Legal System
    Journal of Information Security Research    2019, 5 (5): 440-447.  
    Abstract178)      PDF (1072KB)(665)       Save
    The identity of users in cyberspace is virtual and difficult to determine, which makes it difficult to effectively manage the disordered state of cyberspace virtual society. The Internet real-name system is an Internet management method based on the real name of the user. It is an important means and system for restraining, guiding and protecting Internet users. However, with the arrival of big data era, more and more information exist in the cyberspace, and personal information leakage incidents are common. The Internet identity management system based on the Internet electronic identity (eID) can ensure that the Internet service agencies can effectively identify users' real identity without disclosing their personal information, which provides a good solution to the conflict between the Internet real-name system and personal information protection. At present, China's Internet electronic identity management is still in the preliminary development and pilot application stage, and relevant legal system is still not perfect, which must be explored.
    Reference | Related Articles | Metrics
    Application of Network Security Situational Awareness Platform Based on Big Data in the Field of Private Network
    Journal of Information Security Research    2019, 5 (2): 168-175.  
    Abstract175)      PDF (1678KB)(533)       Save
    In order to improve the information security defense capability of the private network, the institutions with private network pay more and more attention to the information network security situational perception technology to realize the prediction and prevention of security events. Based on the brief introduction of situational awareness and related technologies, this paper puts forward a set of applicable network security situational awareness functional architecture targeting industryspecific network needs. This paper details the functional elements contained in each system from the functional level, which would provide reference for relevant institutions to build a network security situational awareness platforms.
    Reference | Related Articles | Metrics