Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2012 Issue 11
kai qi xin shi dai
..............
page:1
2011 nian quan guo xin xi wang luo an quan zhuang kuang zuo ji suan ji ji yi dong zhong duan bing du yi qing diao cha fen xi bao gao
liang hong ; tan zi jian ; meng bin ; zhang jian
..............
page:2-10
A Balancing Algorithm of Markov-based State
chen min ; gong xun
..............
page:11-14
Against Geometrical Attacks Digital Watermarking Algorithm based on Multiwavelet
yang qing hua ; zhou shu chen
..............
page:15-18
The Application of Neural Networks In Intrusion Detection
ma li fang ; shi yu hao
..............
page:19-23
Overview of Security in Wireless Sensor Networks
zuo li ping
..............
page:24-29
Solution of IS for Cloud Computing Environment
wang yi shen
..............
page:30-32
Research of Database Security Testing
zhang yan
..............
page:33-36
Application of Digital Signature in the Project Rating System
xiao lei
..............
page:37-39
CAPTCHA Identification based on Image Denoising with PIL Filter
yao zuo zhan ; chen li ; wang yu ; tian yong xing
..............
page:40-45
Improving the Traffic Storage based on Time Ime Machine for Network Traffic
xu shan ; zhang jia
..............
page:46-50
IPSec Performance monitoring and Simulation based on OPNET
cheng long ; zhang xue ping ; wang hai tao
..............
page:51-55
Storage Resource Integration and High Usability rResearch base on SAN
li chun mei
..............
page:56-59
Measures based on the Safety Factors of the Network Security
zhang xue feng ; he jin fang
..............
page:60-63
Mangement of Network Security
wang wei jie
..............
page:64-67
Design of Public Security Platform of WanJiang Demonstration Zone based on Internet of Things
liu yang
..............
page:68-71
Network Security Management Software in Hospital Application Research
fu yi
..............
page:72-74
xia yi dai fang huo qiang : bao zhang an quan jian gu xing neng
..............
page:75
wang yu xing yun tui chu yi liao fang tong fang jie jue fang an
..............
page:76
sai men tie ke fa bu 2012 nian shu ju zhong xin diao cha bao gao
..............
page:77-78
qi ye zhong de iphone 5: shi li huan shi bi
matt hamblen
..............
page:79-80
men jin ji shu de wei lai
tam hulusi
..............
page:81-82
an quan zhi neng jie jue fang an : xiao ruo wang luo fan zui ying xiang de guan jian
..............
page:83
qu shi ke ji jie lu :apt gong ji chang yong de san zhong dian zi you jian yan hu ji qiao
..............
page:84
feng he tui xing quan mian zhi neng hua , kai tuo qian ru shi wei lai
..............
page:85
xin xi an quan wei xie jin hua lun -- wang shen secav bing du yu jing jie jue fang an
..............
page:86
si you yun ru he an quan
xi an jiao da jie pu wang luo ke ji you xian gong si
..............
page:87-88
di san jie yun an quan lian meng gao feng lun tan zai bei jing zhao kai
..............
page:89
an quan bao zou jie jing hua jie wang zhan kun jing
..............
page:90
xin ban ca arcserve: jian hua yun he chuan tong ping tai de duan dao duan bao hu
..............
page:91
ye nei dong tai
..............
page:92-93
cong deng ji bao hu dao iso 27001 biao zhun
..............
page:94
yan lun
..............
page:95