Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2015 Issue 2
Security Protection of Critical Infrastructure
QING Si-han;Institute of Software;Chinese Academy of Sciences;State Key Laboratory of Information Security;School of Software & Microelectronics;Peking University;
..............page:1-6
Research and Implementation on Information Security Risk Assessment Key Technology
WEN Wei-ping;GUO Rong-hua;MENG Zheng;BAI Xiao;School of Software & Microelectronics;Peking University;LEETC;
..............page:7-14
Research on Network Intrusion Detection Using Support Vector Machines Based on Principal Component Analysis
QI Ming-yu;LIU Ming;FU Yan-ming;Software College;University of Science and Technology of China;School of Computer;Electronics and Information;Guangxi University;
..............page:15-18
A Privacy-Preserving Public Auditing Mechanism for the Date with Large Groups Users in the Cloud Computing
TANG Chun-ming;ZHENG Xiao-long;School of Mathematics and Information Science;Guangzhou University;
..............page:19-25
Analysis and Research on Network Security for Open Flow-based SDN
ZUO Qing-yun;ZHANG Hai-su;PLA Academy of National Defense Information;
..............page:26-32
Research on Lightweight Cryptography of Interplanetary Backbone Networks
HOU Yu-ling;BIAN Yang-dong;HU Guang-yue;WANG Chao;Key Lab of Specialty Fiber Optics and Optical Access Network;Shanghai University;Information Security Assessment Center of Shanghai;
..............page:33-39
System Design for Ocean Sensor Data Transmission Based on Wireless Networks
QU Le-cheng;LI Xin;SUN Fa-jiang;Department of Information Science and Engineering;Ocean University of China;
..............page:40-45
Analysis and Experiment of Kad Network Protocol
XIONG Mei;ZHOU An-ming;College of Electronics and Information;Sichuan University;
..............page:46-50
A Routing Algorithm of Opportunistic Social Networks Based on Network Coding
QI Feng;MA Chun-guang;ZHOU Yong-jin;MIAO Jun-feng;College of Computer Science and Technology;Harbin Engineering University;College of National Secrecy;Harbin Engineering University;
..............page:51-56
Research and Implementation on Unknown Trojan Detection System Based on Feature Analysis and Behavior Monitoring
HAO Zeng-shuai;GUO Rong-hua;WEN Wei-ping;MENG Zheng;School of Software & Microelectronics;Peking University;LEETC;
..............page:57-65
Research on Digital Fingerprinting Generation Scheme and Key Algorithm
LIU Wen-long;LI Hui;JIN Dong-xun;School of Information and Communication Engineering;Beijing University of Posts and Telecommunications;
..............page:66-70
Research on Multiple Watermarking and Application in Digital Works Transaction System
SU Jiao-rao;Information Department of PLA Beijing Military General Hospital;
..............page:71-76
Research on Improved Slope One Recommendation Algorithm
CHAI Hua;LIU Jian-yi;School of Computer Science;Beijing University of Posts and Telecommunications;
..............page:77-81
2014 nian 12 yue ji suan ji bing du yi qing fen xi
xu shuang shuang ; meng bin ;
..............page:82
2014 nian 12 yue wang luo an quan jian ce shu ju fa bu
wang shi wen ; xu xiao yan ;
..............page:85-86