Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2010 Issue 5
it fa zhan qu shi qu dong quan xin an quan fang fa
..............
page:93
A Digital Signature Based Secure Accounting Model in P2P
zhang cheng bin ; liao zhen song
..............
page:27-29
An Analysis of Distributed Alarm Integration Model
wang jing
..............
page:56-58,63
Research on Technology of Watermark
wang li xia
..............
page:71-73,77
Research on the Secure Transmission Mechanism of Active Network
zuo di ; jin yi fu ; zhu qi zuo
..............
page:68-70
The Model of Assessment Based on Credibility of the Hierarchy
fang juan ; zeng hong li
..............
page:74-77
check point ren ming bei ya qu xin zong jian tui dong ye wu peng bo fa zhan
..............
page:89
zhan bo wang luo :cloud ready zhu li qi ye zheng he shu ju zhong xin
..............
page:90
Unknown Trojan Linux-based Detection System Research and Realization
zhang zhu ; fan ming zuo
..............
page:1-3
Using Reverse Agent Technology to Protect the Web Server
zheng guang yong ; yin jun ; zhu xian you
..............
page:30-32
The Implementation and Design of PKI Authentication System on Scoring System
liu bo ; liu zhi gui ; ren li xue
..............
page:83-85
Desing and Implement of An Source Structure Independent Database Disaster Tolerant System
shen fei ; guo dan ; lin han zuo ; liu zhe zuo
..............
page:18-20
Approach of Covert Channel Based on TCP Protocol
lv tao ; cao tian jie
..............
page:51-52,55
Reversible Watermarking Algorithm of SVG Vectorgraph\'s High Capacity
ding zuo ; zuo zheng ding ; zhang chun e
..............
page:24-26
Research and Improvement on ID3 Algorithm in Intrusion Detection System
liu chun yan ; di guang qun
..............
page:41-44
With Regard to the Status of the Database System Security Research
jiao yan
..............
page:45-47
yan lun
..............
page:108
Unknown Computer Virus Detection Based on Its Behavior Sequence
zheng zhong ; wang zhi ying ; chen zuo zuo ; huang yu
..............
page:4-5
Research of Internet Worm Scanning Strategies and Detection Technologies
zuo zuo ; wu hai feng ; di peng ; xu xiang tao
..............
page:11-13
fu zao
..............
page:107
The Design and Implementation of Network Security Management System
huang yu zuo ; zhang jian ping ; ma li
..............
page:78-79,82
Identification of P2P Traffic Using Statistics Method and Neural Network
zhang lei
..............
page:48-50
Application Layer Filtration Research Based on Expand Function of Iptables
hu chao qiang ; huang li bin
..............
page:35-37
Creation for Firewall of Laboratory Network Using Iptables
zeng shu hong
..............
page:103-104
Based on SSL Digital Certificates in the Stand-alone Computer Simulation Environment Implementation
ma xiao yu ; chen fei yan
..............
page:53-55
shi wen xuan yi
..............
page:94-95
Based on the Balance Thought to Implement the Classification Protection Project of Information System Involved State Secret
chen yang huai
..............
page:61-63
hu lian wang jian guan ti xi yan jiu
chen min
..............
page:80-82
jie pu fu wu qi qun zu fang hu jie jue fang an
xu jing
..............
page:91-92
Research on Management of Information Security and Confidentiality in the Process of Audit Informatization
ma ying bin ; xu dong hua
..............
page:86-88
On the Security and Attack & Defense of Site Servers under Windows Environment
jiang bo
..............
page:96-98
Brought about by the Pointer and an Array of Software Security Flaws
lv jin he
..............
page:64-67
ye nei dong tai
..............
page:105-106
Design and Realization of Traffic Statistics and Anomaly Detecting System based on Linux
luo chuan ; xin kun tang ; xin zuo ting
..............
page:21-23
Digital Document Download Traffic Statistics and Monitoring System
chen mo
..............
page:59-60
Design and Implementation of Web Server Deception System Based on Honeypot
wu liang yuan ; huang wen pei
..............
page:33-34
Research on the Internet Viruses Defensive Strategy
jiang guo song ; gao yong mei ; wu gong cai ; liu jie
..............
page:6-10
Digital Image Information Hiding Preprocessing Technology
liao zuo nan
..............
page:38-40
Prevention of Cross-Site Request Forgery attacks
zhou an hui
..............
page:99-102
MPEG Video Encryption Algorithm Based on Gray Code Transformation and M-sequence Xor
wang dong
..............
page:14-17