Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2011 Issue 9
Detecting Rebound Port Trojan Based on Network Behavior Analysis
ZHAO Tian-fu;ZHOU Dan-ping;WANG Kang;ZHANG Bo
..............page:80-83
An Expert System Based on Network Security Event Correlation
WANG Wen-xia;JIA Yan;HAN Wei-hong;XU Jing-hu;ZHENG Li-ming
..............page:97-100
Research on Access Control Mechanisms in Cloud Storage
WANG Ping-jian;JING Ji-wu;WANG Qiong-xiao;WANG Zhan
..............page:41-43
Android\'s Security Mechanism Analysis
FU Yi-yang;ZHOU Dan-ping
..............page:23-25
Forensic Investigation of Vsphere Structure in Private Cloud Computing Systems
TIAN Qing-yi;WANG Lin;HUANG Dao-li
..............page:44-46
Analysis of Online Banking Customs\' Identification Security
CAO Yue;YOU Yang
..............page:208-210
The Research of Business-oriented Security Management Architecture
MA Lin;LIU Fu-qiang;LIU Song
..............page:188-190
A Method of Remote Secure Certification Based on PKI Technology
HU Yong-tao;HU Shan-xue;YAO Jing-jing
..............page:138-139,187
A Propagation Model for Stealth Worm
ZHENG Li-ming;ZOU Peng;JIA Yan;HAN Wei-hong
..............page:9-12,18
A Multi-stages Control Method Applied on the Phishing Attack
LI Chen;CHEN Xing-lin
..............page:145-148
The Discussion of Killing Cloud and Active Defense
GAO Jing-feng
..............page:47-49,87
Research on Universal and Efficient Storage Encryption of Database
SONG Yan;KONG Zhi-yin;MA Jing;LIU Jian-hui
..............page:13-15
Application Research of Data Mining Technology in Computer Forensics
QI Zhan-sheng;GAO Feng;TENG Da
..............page:163-166,177
Design and Implementation of One-way Data Transmission System Based on Optical Fibre
WANG Hai-yang;MENG Fan-yong
..............page:107-109
qian yan
fang bin xing
..............page:前插1
Design and Implementation of HTTPS Server Cryptographic Algorithm Testing Tool
TU Chen-yang;JING Ji-wu;WANG Lei;XIANG Ji
..............page:84-87
Research on Parallel Processing for Networking Security Protocol Based on Multi-core Processors
LIU Lei;ZHOU Qing;JING Wei;LIU Bing
..............page:226-229
Trojan Detection Method Based on Attacking Tree Model
YANG Wei-jun;ZHANG Shu;HU Guang-jun
..............page:170-172
RSA Verifiable Signature Sharing Scheme for General Mixed Access Structures
HUANG Li-wei;CAO Jing-long;LV Ke-wei
..............page:173-177
Multi-pattern Matching Technology Based on CUDA
ZHANG Guang-bin;XIE Wei-sheng;WU Hong-wei
..............page:126-128
Recover the Deleted Video Data from SANYO Camera
HUANG Bu-Gen;HUANG Zheng;LIU Jian-Jun
..............page:143-144,155
Research of Cloud Computing Data Secure
WU Xu-dong
..............page:38-40
The Design and Implementation of a Honey-net Based Monitoring System
GAO Feng;DU De-hui
..............page:64-65,69
Research on Technology and Security of Server Virtualization
GUO Chun-mei;MENG Qing-sen;BI Xue-yao
..............page:35-37
Research on Configuration of Index System of E-government Extranet Security
LI Yuan-zheng;HAN Wei-hong;ZHANG Jian-feng
..............page:66-69
Research on Security Samples of National Domain Name System
CHEN Ming-qi;MA Xiao-li;LI Xiao-dong
..............page:215-218
Computer Virus Analysis of 2011 August
LIU Wei;MENG Bin
..............page:233
Implementation of SM3 HASH Function on FPGA
LIU Zong-bin;MA Yuan;JING Ji-wu;XIA Lu-ning
..............page:191-193,218
Using Machine Learning Techniques to Identify Drive-by-download
CHEN Shi-min;HAN Xin-hui
..............page:74-76
Intelligent Repair System for NTFS Boot Sector Based on Complementary Structure of File System
GAO Zhi-peng;WU Shi-xiong;XU Zhi-qiang
..............page:197-200
The Research of Extracting the Phishing Web Features Vector
SI Xiang;LI Qiu-rui;SONG Shi-chao
..............page:201-203
Mobile Payment Security Analysis and Security Research
HAO Wen-jiang;WU Jie
..............page:19-22
The Situation and Development of Anti-virus Product in China
CAO Peng;ZHANG Jian;CHEN Jian-min
..............page:116-119
Design ana Implementation of Secure Access Gateway of IOT
SUN Lun-qiang;QIN Hai-quan;YIN Dan
..............page:16-18
MAC is an Effective Means of Protection Against Malicious Code
LU Bao-hua;LI Ke
..............page:133-134
Design and Implementation of Security Event Detection in Large- scale Network
WANG Jin-song;LU Qiang;ZHANG Hong-hao;SHI Kai;ZHANG Long
..............page:77-79
Design and Implementation of NFS-based Storage Encryption Agent
WANG Lei;XIANG Ji;JING Ji-wu;GAO Neng;ZHANG Ling-chen
..............page:194-196,214
Study on Criminal Responsibility of Property Violation by Electronic Agent
WANG Dan-xia;ZHANG Ji-hong
..............page:149-151,158
Research on the Security of the Twitter Industry
LI Dong;MA Yong;ZHANG Xin
..............page:88-90
How to Promote Network Real-name System
YANG Zhi-yong
..............page:140-142
Discussing on Cryptography Application Schema in Cloud Computing
LI Feng-hai;ZHANG Bai-long
..............page:53-55
The Perspective of Stuxnet Viru
LI Zhan-bao;PAN Zhuo
..............page:230-232
New Features of Malicious Code in 2010 in China
LIU Wei;LIU Xin;DU Zhen-hua
..............page:222-225
Research on Security Technology Architecture of EPCglobal Network
FAN Hong;SHAO Hua;LI Cheng-yuan;HU Zhi-ang
..............page:5-8
Research on Destributed Text Data Filtering Model Based on Mapredu Ce
LI Hu;ZOU Peng;JIA Yan;ZHOU Bin
..............page:91-93,119
Research on the Method of Attributes-based Cross-domain Access
WANG Fu;ZHOU Jia-jing
..............page:123-125,132
Discussion of Evolving from Network Security to \'Secure Network\'
XIAO Zhi-hui
..............page:219-221,229
Analysis the Performance of Data Protection in Mobile Cloud Computing
LU Hong-liang;XIA Xiao;WANG Xiao-dong
..............page:1-4
Coding-based Document Recovery Technology
ZHANG Xue-feng;HUANG Zhi-wei
..............page:156-158
The Security and Technical Countermeasures in Research Informationization
WU Li-hui;LIAO Fang-yu
..............page:178-180,184
Research on Trusted Security Virtual Machine Platform
DUAN Yi-zhen;WANG Xiao-cheng
..............page:129-132
xin xi dong tai
..............page:237
AHP Based Information System Security Evaluation Method
XU Yun-feng
..............page:120-122