Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2009 Issue 11
Security of XML Parse Based on DOM and Its Solution
GU Yun-hua;LIU Dan;WANG Xing
..............
page:50-52
Random Forests Algorithm with Feature Grouping in Network Intrusion Detection
LI Sheng;SONG Shun-hong
..............
page:23-25,28
si ke : xia yi dai fang huo qiang jin ru yun shi dai
..............
page:90-91
A Study and Implementation of Campus Network Security Monitoring System
LIU Hai-ying;FENG Wen-xiu
..............
page:79-82
Design of Embeded Video System Based on Bluetooth Wireless Network
LI Jian;CHEN Gao-yun;CHEN Yong-bin
..............
page:32-34
dian zi zheng ju si fa jian ding cheng wei wang luo fan zui ke xing
..............
page:88
A Text Watermarking Based on the Dilation Operation of Mathematical Morphology
BIN Xi-chuan;QIU Zheg-ding;ZHANG Chun\'e;ZENG Gao-rong
..............
page:4-6,10
shi yi zheng wu zhuan wang da gui mo bu shu de an quan chan pin
..............
page:91
Design and Analysis of a Security E-commerce Framework Based on PKI
ZHANG Xiao-dan
..............
page:68-69
ji yu duo he de ru qin fang yu yin qing she ji yu shi xian
wei zuo
..............
page:14-15,19
Analysis Technology of Anti-leech and Anti Illegally-Downloading
WU Guang-ming;TANG Bin;CHEN Hai-hang
..............
page:53-55
po jie ruan jian bao hu wu da wu qu
..............
page:89
cpk jian bie xie yi (v1.0)
..............
page:3
The Application of Bayesian Method in Computer Virus Detection
WANG Hui-huan
..............
page:11-13
Safety Strategy of Based on the ASP.NET and IIS Web Talent
CUI Song-jian
..............
page:62-64
IDS Model Designing Based on Optimize Apriori Algorithm
LI Yang;ZHU Zong-sheng
..............
page:20-22
The Technical Analysis of By-pass Block in Intranet Security
JIA Da-zhi
..............
page:29-31
Security Payment Scheme Based on Electronic Commerce
YUAN Yu-qing;KUANG Xiang-ling
..............
page:70-72
shan shi wang ke tui chu duo he plus g2 xin yi dai an quan jia gou
..............
page:86
tai shan hong ri chu duo he xin gao du wang yu shen zhou duo he ac xin jia gou fang huo qiang qi jian chan pin long zhong shang shi
..............
page:93
Detection of Internet Worm
WANG Fen-fen;ZHOU Deng;XIE Yun
..............
page:96-98,101
Implementation of Integrated Data Network Security Area Based on MPLS VPN
HU Jian-an;ZHANG Hai-rong
..............
page:59-61
ye nei dong tai
..............
page:105-106
The Principle of ARP Cheating and Defense Measure
XUE Qin
..............
page:99-101
xin xi an quan ji shu ping gu de xian zhuang yu fa zhan
zhou ying hong
..............
page:73-74
The Application of Physical Isolate GAP System
LIU Dong-mei
..............
page:83-85
Implementation of Customerized RBAC Model in Multi-domains Collaborative Environment
LU You;ZHANG Ni
..............
page:39-43
A Way of Robust Digital Watermark Based on Wavelet Transformation
TANG Ning;ZHAO Jing-xiu
..............
page:44-46
CPK-Cryptosystem Standard(V3.0)
..............
page:1-2
Loopholes in Computer Security and Response Measures
SONG Qing-da;YAN Ding-jun
..............
page:102-104
A Certificateless Proxy Ring Signature Scheme
SHI Hong-yan
..............
page:47-49
fortinet utm yu dns feng bao fang hu
..............
page:92
yan lun
..............
page:插4
mian fei yao kan jin que wu
..............
page:107
Intrusion Detection Technology Based on Data Mining
TAN Xiao;YUAN Chang-an;LONG Long
..............
page:16-19
The Total Solution and Policy of Network and Information Security and Secret for Large Enterprise Group
CHUN Zen-jun;SHI Guang
..............
page:75-78,82
The Research of Three Typical Electronic Voting System Models
FAN Xi
..............
page:65-67
check point zhuan zhu duan dian an quan
..............
page:87
shi wen xuan yi
..............
page:94-95
Analysis and Solution to Routing Black Hole in AODV
WEN De-long;MEI Su-ping;PENG Tao
..............
page:7-10
Research on Secure Routing Protocols for Wireless Sensor Networks
BI Jun-lei;LI Zhi-yuan
..............
page:35-38
Research of the Encrypted Character Data in Database
LI Wei-yong
..............
page:56-58
Brief Discussion on the Information Opening and Information Security
NIU Hua-wei;YU Jing
..............
page:26-28