Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2008 Issue 5
jin ya tuo : zhang duo shou ji an quan zhi fu de xin shu zi shi dai
..............
page:81
shui lai bao hu ni de ruan jian cheng guo
safenet gong si
..............
page:82
wang ba ye zhe de hao bang shou ai tai ke ji quan qian zhao wang ba wang luo jie jue fang an
..............
page:83
guan li zhu jiu an quan rui xing sha du ruan jian 08 wang luo ban xin pin fa bu
..............
page:84
e yi ruan jian yin cang wei xian duo duo
qian dui zhan
..............
page:85
The Research of Windows virus Detection Based on Neural Network Ensembles
ZHAO Jie;GONG Wen-ke
..............
page:86-88
da zao ke gong guan li de wang luo shen xin fu shang wang xing wei guan li she bei zou jin nan jing zheng quan
wang dun
..............
page:80
xin yi dai ru qin jian ce xi tong
liu tao
..............
page:78-79
he gui xing guan li zai shui dian chang it zhi li zhong de ying yong ji qi xiao guo
wei jin mao
..............
page:75-77
lian xiang wang yu : zi ben li liang zheng he xin xi an quan
duan hong
..............
page:74
wei ruan de fu wu zhan lue
lei ao zi
..............
page:73
unisys jie shi : sheng wu shi bie ji shu zai shen fen an quan guan li zhong ri qu zhong yao
unisys gong si
..............
page:72
Application of Disaster Backup Technology Based on Network Cooperative in the Library
HE Tie-zu
..............
page:70-71
Solid Security System of Campus Network
CHEN Yi-jun;ZHANG Xiao-rong
..............
page:67-69
Network security and control strategies of the Aluminium Industrial PCS
CHEN Wan-hong
..............
page:64-66
The Design and Implementation of Bank Video Monitoring System
HUI Wei-jun;JI Shan-bing
..............
page:61-63
Identity authentication technology of e-business based on dynamic password
LIN Cong;HEI Xia-li
..............
page:58-60
ji yu ce lue lu you de xiao yuan wang shuang chu kou gou jia zhong vpn yu fu wu qi fang wen de lu you jie jue fang an
yan xiao ying ; wen chuan zuo
..............
page:56-57
Brief analysis the security development of web application
ZHU Yan-hua
..............
page:54-55
First step research of network's Safety
XU Jia-rui
..............
page:51-53,55
chang jian de ji zhong wang luo an quan jie ru ji shu fen xi
yang fei
..............
page:48-50
A Study on Image Digital Watermark and Its Application Techniques
PENG Yu-zhong;WANG Jin-cai
..............
page:45-47
guo jia jin ka gong cheng duo gong neng ka ying yong lian meng tan suo xing ye fa zhan xin mo shi
..............
page:1
fa zhan ke xin ji suan , ti sheng an quan he xin jing zheng li zhong guo ke xin ji suan lian meng zai jing cheng li
..............
page:2
Design and Implementation of a Multi-point Remote Backup System
PI Lu-lin;LIU Xiao-jie;LI Tao;ZHANG Hong-liang
..............
page:3-5
Periodicity and Security Analysis of Arnold Mapping
XIE Jian-quan;XIE Qing;HUANG Da-zu
..............
page:6-8
The research of SQL injection attack and prevention method in Web application
JIANG Ji-ya;LIU Tong;WANG Shu-wei
..............
page:9-12
Spatial Watermarking Algorithm Based on Scrambling and Amalgamation
ZHANG Xiao-fei;WANG Jie-song
..............
page:13-16
Building distributed campus network's borderline routing system based on the policy of security
ZHUANG Yong-long
..............
page:39-41,44
Research and Realization based on the identity authenticity of arbitration in real-time verification mechanism
yang zheng ; ji zuo qin
..............
page:42-44
The Analysis of the Working Process and Hiding of Computer Virus and its Solutions
Liu Yan-ming
..............
page:89-91
Discuss the Comprehensive Prevention of the network worm virus
BAI Li-mei
..............
page:92-93,95
dan wei ju yu wang zhong arp gong ji de gu zhang chu li
zhu jiang
..............
page:94-95
Establishing the seven levels security protection architecture of campus net
ZHAN Yan-jie
..............
page:96-98
info
..............
page:99-103
fang du zhe shuo
qu ding
..............
page:104-105
yan lun
..............
page:106
xin xi
..............
page:8,12,23,30,35,57,69,77,80,84
A Research of Insect Encryption Technology of VPN tunnel based one FreeBSD UNIX
KOU Hai-zhou;FENG Wan-li
..............
page:17-20
Study On Hybrid Authentication of Mobility IP network Based on Host Identity
CAO Min;CHENG Dong-nian;WU Xi;MAO Wen-tao
..............
page:21-23
Application of improved k-means clustering algorithm in intrusion detection
GU Bao-ping;GUO Hong-yan
..............
page:24-26
Alarm clustering for intrusion detection systems in network
QIN Zi-yan;ZHAO Zeng-yi
..............
page:27-30
Automated Intrusion Response System Based on Risk Evaluation
YAN Qing-hua
..............
page:31-33
Application of intrusion detection in firewall system
ZHANG Jing
..............
page:34-35
A Firewall System Based on Content-Addressable Memory and ARM
LUO Hui-qian;LIU Kai
..............
page:36-38