Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2011 Issue 7
sonicwall jie meng jin shan ding jian zhu li neng yuan xing ye wang luo an quan
..............
page:90-91
The Design and Achieve base on Behavior Character of Security Operation Monitoring Platform
SHANG Gao-feng
..............
page:64-65
SQL Server Database Backup System based on Data De-duplication
DENG Liang;HU Xiao-qin;LIANG Gang
..............
page:9-12
liang zi mi yue fen pei xie yi
luo yun mei
..............
page:58-60
The Research of Social Security Institutional Net Trust Evaluation System
LUo Guo-hai;WANG Zhi;ZHAO Yan-hong;TIAN Wen-jin
..............
page:81-84
wang shen : you zhong guo zhi zao xiang zhong guo zhi zao fei yue
..............
page:88-89
ye nei dong tai
..............
page:16,32,96-97,99
The Research and Application of ARP Spoofing Detection based on Snort in Campus Network Environment
LIU Kun
..............
page:61-63
Discussion on ARP Attack Principle Analysis and Defensive Measure Of enterprise network
LIU Ya-li;DENG gaofeng
..............
page:66-68
Small and Medium Enterprises Network Control Program Analysis and Design
YU Ben-cheng;MU Dong-zhou;LU Yu-yang
..............
page:72-74
Analysis and Simulation on Routing Protocols of Ad Hoc Networks
ZHAO Xin-wei;ZHENG Hong-fei
..............
page:40-43
SAS Discriminant Analysis Applied in Credit risk Management of the Banks
LI Jun-yi;LIANG Zhi-cheng
..............
page:13-16
Ajax and its Security Analysis
YANG Zhen-hua
..............
page:48-50
Host Anomaly Detection Based on Bayesian Tree
CHEN Wen
..............
page:51-53
Power Plant Information Security Management Overview
SHI Qiang
..............
page:78-80
The Application Research of Virtual Machine in Packers
YAO Wei-guang;CHEN Wen-yu
..............
page:36-39
The Recovery of Password on Common Cisco Routers
CHEN Xiao-hong
..............
page:75-77
yi zhong ti gao qi ye nei bu wen dang shu chu an quan xing de tu jing wen dang shu chu jian kong yu shen ji xi tong zong shu
yuan meng
..............
page:92-93
mian fei sha ruan de cheng gong xue
..............
page:98
Concept on Configurable Three-dimensional Network Security Operation Management System
WANG Fei
..............
page:69-71
The New Generation Backbone Network\'s Security Architecture
ZHAO Yi
..............
page:29-32
Research on a DCT Image Watermarking Algorithm based on Block Classification
JIN Can1,2
..............
page:17-19
How to Strengthen the Security of Our Computer Software Patent Protection
PIAO Jing-shun
..............
page:85-87
A New IDS based on Multi-Agent System
PENG Bin
..............
page:54-57
Research and Realization of the Technology Real-time Fusing Alerts Information
DUAN Xiang-wen;YANG Bing;ZHANG Yi
..............
page:2-8
Design and Implementation of DNS Server
WU Qing-xiu;Ou Jun
..............
page:44-47
shi wen xuan yi
..............
page:94-95
Research and Implementation of Host Security Protection System based on Cloud
LIU Ke
..............
page:24-28
A Mutual Authentication Protocol based on Key for RFID
LI Zhong-yang;LIU Jin-ping;LI Ting-ting
..............
page:20-23
bao yu yan cheng de si kao
..............
page:1
Web3.0 Password Protection Management Strategy
XU Feng
..............
page:33-35