Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2009 Issue 11
Security of XML Parse Based on DOM and Its Solution
GU Yun-hua;LIU Dan;WANG Xing
..............page:50-52
Random Forests Algorithm with Feature Grouping in Network Intrusion Detection
LI Sheng;SONG Shun-hong
..............page:23-25,28
A Study and Implementation of Campus Network Security Monitoring System
LIU Hai-ying;FENG Wen-xiu
..............page:79-82
Design of Embeded Video System Based on Bluetooth Wireless Network
LI Jian;CHEN Gao-yun;CHEN Yong-bin
..............page:32-34
A Text Watermarking Based on the Dilation Operation of Mathematical Morphology
BIN Xi-chuan;QIU Zheg-ding;ZHANG Chun\'e;ZENG Gao-rong
..............page:4-6,10
Analysis Technology of Anti-leech and Anti Illegally-Downloading
WU Guang-ming;TANG Bin;CHEN Hai-hang
..............page:53-55
cpk jian bie xie yi (v1.0)
..............page:3
Safety Strategy of Based on the ASP.NET and IIS Web Talent
CUI Song-jian
..............page:62-64
IDS Model Designing Based on Optimize Apriori Algorithm
LI Yang;ZHU Zong-sheng
..............page:20-22
Security Payment Scheme Based on Electronic Commerce
YUAN Yu-qing;KUANG Xiang-ling
..............page:70-72
Detection of Internet Worm
WANG Fen-fen;ZHOU Deng;XIE Yun
..............page:96-98,101
Implementation of Integrated Data Network Security Area Based on MPLS VPN
HU Jian-an;ZHANG Hai-rong
..............page:59-61
ye nei dong tai
..............page:105-106
The Principle of ARP Cheating and Defense Measure
XUE Qin
..............page:99-101
xin xi an quan ji shu ping gu de xian zhuang yu fa zhan
zhou ying hong
..............page:73-74
The Application of Physical Isolate GAP System
LIU Dong-mei
..............page:83-85
A Way of Robust Digital Watermark Based on Wavelet Transformation
TANG Ning;ZHAO Jing-xiu
..............page:44-46
CPK-Cryptosystem Standard(V3.0)
..............page:1-2
Loopholes in Computer Security and Response Measures
SONG Qing-da;YAN Ding-jun
..............page:102-104
A Certificateless Proxy Ring Signature Scheme
SHI Hong-yan
..............page:47-49
yan lun
..............page:插4
mian fei yao kan jin que wu
..............page:107
Intrusion Detection Technology Based on Data Mining
TAN Xiao;YUAN Chang-an;LONG Long
..............page:16-19
shi wen xuan yi
..............page:94-95
Analysis and Solution to Routing Black Hole in AODV
WEN De-long;MEI Su-ping;PENG Tao
..............page:7-10
Research on Secure Routing Protocols for Wireless Sensor Networks
BI Jun-lei;LI Zhi-yuan
..............page:35-38
Research of the Encrypted Character Data in Database
LI Wei-yong
..............page:56-58
Brief Discussion on the Information Opening and Information Security
NIU Hua-wei;YU Jing
..............page:26-28