| Issue | Title | |
| Vol 1, No 1 | A simple realization of the computer virus | Abstract PDF | 
| Qinghong Liang, Shangying Cao, Zhengan Qi | ||
| Vol 1, No 1 | Analysis of Network Security in Daily Life | Abstract PDF | 
| Jinliang Shen, Shiming Gong, Wencong Bao | ||
| Vol 1, No 1 | Analysis on Network Security and Its Countermeasures | Abstract PDF | 
| Qinghua Jiang, Lilin Lin, Yanhong He | ||
| Vol 1, No 1 | Computer Network Attack and Defense Technology | Abstract PDF | 
| Xinyue Yang, Shujun Zhou, Guanghui Ren, Yaling Liu | ||
| Vol 1, No 1 | Facial Authentication as A Possible Solution to the Challenges in User’s Security and Privacy in Web Applications | Abstract PDF PDF | 
| Francisco D. Guillén-Gámez1, Iván García-Magariño2,3 | ||
| Vol 1, No 1 | Hiding image into another meaningful images using Richardson-Lucy algorithm with data authentication | Abstract PDF PDF | 
| Ali Sheidaee, Leyli Mohammad Khanli | ||
| Vol 1, No 1 | Multi-Agent System for an Image Steganalysis | Abstract PDF | 
| Akram Boukhamla | ||
| Vol 1, No 1 | Quantitative Methods for IT Risk Management - A Roadmap | Abstract PDF | 
| Volker Frehe1, Dominik Kopp2, Frank Teuteberg2 | ||
| Vol 1, No 1 | Research on Data Encryption Technology | Abstract PDF | 
| Hongjiang Duan, Weilong Huang, Guangxu Zhu | ||
| Vol 1, No 1 | The method of false vortices in designation problems of targets, road signs, facial features and real vortices in space images | Abstract PDF | 
| Evgeni Nikolaevich Terentiev1, I. García-Magariño2, N. E. Shilin-Terentyev3, I. N. Prikhodko1, I. I. Farshakova1 | ||
| 1 - 10 of 10 Items | ||
  
	
	
	