Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2013 Issue 1
The Detecting-Mode Research based on Cohen-Sutherland
ZHAO Ge;LU Tao;REN Jun-bo
..............page:49-51
2012 nian 11 yue wang luo an quan jian ce shu ju fen xi
wang xiao qun
..............page:88-89
Research on the Game Theory based Network Attack-Defense and its Application
GU Qiao-yun;SUN Yu-long;GAO Feng
..............page:52-54
The Extraction Technology of Browser's History Traces
ZHU Xiao-long;SUN Guo-zi
..............page:19-21
The Research and Development of Youth Network Behavior Monitoring Software
KONG Xiang-rui;YE Jun;XIANG Da-wei;MAI Yong-hao
..............page:75-78
Research on Auto-Attack System based on Agent and Attack Tree
FENG Fan;LUO Sen-lin
..............page:44-48
Acceleration of Field Multiplication on Graphics Hardware
ZENG Qing-yi;ZHANG Ming-wu;ZHANG Jin-shuang
..............page:22-26
xin xi dong tai
..............page:90-92,前插1-前插7
A Network Security Management Process System Design and Research
HUANG Geng-xing;YE Xiao-ping;ZHENG Huan-xin
..............page:68-70
Trojan Horse's Hiding and Detecting Technique of Android OS
LIU Hao-chen;LUO Sen-lin
..............page:33-37
Provably Secure ID-based Generalized Signcryption Scheme
XIANG Shun-bo
..............page:58-60
An Anonymous Wireless Healthcare Monitoring System based on the Tate Pairing
WU Hao;SHAO Jie;WANG Juan;ZHU Hui
..............page:61-64
shen tou gong ji xing wei an li fen xi
fu kui ; yuan ming kun
..............page:82-83
wi-fi wps an quan qian xi
fang jun tan ; xu zhi qiang ; ye chun min
..............page:84-85
Research on the Anti-stealth Strategy of Trojan Horse Prevetion
YIN Xiao-tian;YANG Yong
..............page:65-67
Research and Implementation of Packing Technology for PE Files
JIAO Long-long;LUO Sen-lin
..............page:38-43
Implementation of a Malware Detect Tool on Android
ZHANG Wen;YAN Han-bing;WEN Wei-ping
..............page:27-32
Discussion on the Limits of Automated Web Security Testing Tools and Manual Testing Method
SUN Xin;HAN Jia-jia;TANG Qiu-hang
..............page:79-81
2012 nian 11 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan yan jiu sheng yuan guo jia ji suan ji wang luo ru qin fang fan zhong xin
..............page:87,89
2012 nian 11 yue ji suan ji bing du yi qing fen xi
meng bin ; liu wei
..............page:86
Network Security Event Analysis based on Hadoop
WANG Hong-yan
..............page:55-57
Research on Trust Measurement of Cloud Computing Platform
HE Fang;LIU Yi;ZHUANG Lu
..............page:5-7
An Active Anti-Phishing Solution based on Semi-Fragile Watermark
HUANG Hua-jun;JIANG Li-qing;XIE Li-li;WANG Yao-jun
..............page:8-11