Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2010 Issue 4
Application of Group Policy to Deploy and Manage Software
tang deng ping
..............
page:42-44
Gigabit Intrusion Prevention System Based on OCTEON
li qing ; feng zuo ; lin wei
..............
page:21-23
Survey of P2P File Pollution end Anti-pollution
luo yi jun ; liu qiang
..............
page:29-33
yan lun
..............
page:96
Data Security in Publishing Edit System
kang zhao hua
..............
page:78-79
The Research of Digital Signature Technology Based on Observer Synchronization with Hyperchaotic Systems
lu hui bin ; zhong xiao qing ; wang qiang ; xia cui ling
..............
page:10-12
ji nian wang jiang min xian sheng
..............
page:95
Analysis of Countermeasures for GPS Signal Spoofing
cui ming ; liu rui hua
..............
page:55-56,59
ye nei dong tai
..............
page:93-94
Discussion on the Design of Enhanced USB Key in Online Banking
he yong fu
..............
page:75-77
The Research on Construction of Wireless LAN and It\'s Security Technology
zhu guo chao
..............
page:66-68
Research and Application of Association Rule in Computer Forensics
wang yan
..............
page:45-47
jiao da jie pu xin xi shen ji chan pin jie jue fang an
xu jing
..............
page:86-87
shi wen xuan yi
..............
page:91-92
An Efficient Regular Expression Grouping Algorithm
xiao wu de
..............
page:57-59
Technology and Security of Cloud Computing
lei lei ; he ming ; yao jian wen
..............
page:1-3
Research on Application of a High-speed Network Intrusion Detection System
li zhi qing ; jiang ming liang
..............
page:18-20
E-government Information System\'s Security Protection System
yang yu hong ; hu
..............
page:72-74
Based on Risk-driven Construction of Information Security Management System in Enterprise
xiao zuo
..............
page:39-41
Summary of Defense Mechanism on DDoS Attack
hu zun mei
..............
page:64-65
wei rui xin fa bu shou fen hu lian wang xin ren zhi shu bao gao
..............
page:84
A Time-stamping Application Project for Undependable-networks
chen jun feng ; chang chao wen
..............
page:51-54
2009 nian zhong guo wang min wang luo xin xi an quan zhuang kuang xi lie bao gao fa bu
..............
page:83
Study on Security Protection System of Enterprise Network based on Security Domain
zhang zuo ; feng mei ; jing xiao wei ; liu ming xin
..............
page:36-38
Intrusion Detection System Based on Science Information Network System
zhu ya xing
..............
page:27-28,33
dong ruan kan shi :2010 ji cheng an quan yan yi jing pen xing qing
..............
page:85
The Design and Analysis for an Improved Routing Protocol S-DSR in Ad Hoc Network
ji zu qin
..............
page:60-63
A Trust Evaluation Model Based on Chinese Trust Pattern for Non-center Network Computing Environment
xu xiao long ; cheng chun ling ; chen dan wei ; xiong zuo yi
..............
page:48-50,54
ji you xi tong gou jian ke xin ji suan ping tai yan jiu
chen xu
..............
page:13-14,17
Key Technologies of P2P Network & Safety Discussion
li yin yin ; wu xiu lan ; gu tao feng
..............
page:34-35
Design and Implementation Based on NDIS Intermediate Layer Packet Classification System Under Windows Platform
pei lin
..............
page:24-26
Research on NAS Stratum Security of EPS System
zuo guo dong ; wang qiong
..............
page:7-9
lian xiang wang yu quan wang shen ji jie jue fang an
..............
page:89-90
qu shi ke ji fang bing du zheng ti wai bao fu wu zai guang da yin xing de ying yong
..............
page:88,90
Applications Security Implementation with Agent Technology
wu ze jun
..............
page:80-82
A Threat Factors Analysis Method of Information System Based on Cloud Model
li qi zeng ; xie zan fu
..............
page:4-6
An Improved Scheme of Segmented CRL
wang qing sheng ; chen shui xia
..............
page:15-17
Application of Ameliorated Ant Colony Algorithm in QoS Multicast Routing
sun zuo ; wang xin hua ; xu jing cai
..............
page:69-71