Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2013 Issue 10
hu lian wang jin rong de an quan shang ji
ben kan bian ji bu ;
..............page:1
Computer Virus Signature Automatic Extraction Method based on N-Gram
ZENG Jian;ZHAO Hui;Dept. of Computer Science;Sichuan University;
..............page:2-5
An Introduction of an Adaptive Cascaded Intrusion Detection Model
ZHAO Lan;CHEN Wen;ZHAO Hui;Dept. of Computer Science;Sichuan University;
..............page:6-11
Design and Implementation of Disaster Tolerant System Supporting Clustered Storage
LIU Xin-guo;YUE Hong-chao;Dept. of Computer Science;Sichuan University;
..............page:12-14
Design and Implementation of an Oracle Remote Backup and Recovery System
YAN Zhou-bin;HU Xiao-qin;Computer Department;Sichuan University;
..............page:15-20
ji yu cdp ji shu de rong zai xi tong she ji
liu jia jun ; liu shun ;
..............page:21-24
Identification and Risk Analysis of Sensitive Data in Commercial Banks
WANG Yan-feng;CHEN Dian-you;JIANG Fan;GUAN Lei;FAN Jin-hui;Agricultural Bank of China;
..............page:25-30
Research and Implementation of Elliptic Curve Cryptography System
ZHANG Jing;School of computer and communication engineering;Zhengzhou Institute of Light Industry;
..............page:31-34
The Improving of Security Authentication Mechanism in Wireless Sensor Networks Reprogramming
LIU Hong;ZHANG Yong;WANG Zhi-li;College of Computer Science and Technology;Nanjing University of Aeronautics & Astronautics;
..............page:35-38
Research on the Network Security Authentication Mechanism Across the Wireless Local Area Network
ZHOU Ming-kuai;Zhejiang Vocational College of Commerce;
..............page:39-42
A Fusion based Night Image Enhancement Algorithm
TIAN Wang;TAO Qing-chuan;College of Electronics and Information Engineering;Sichuan University;
..............page:43-46
Malicious Backdoor Code Audit Analysis
YUAN Bing;LIANG Geng;LI Zu-feng;GUI Yong-hong;WANG Rui;China Mobile Group Guangxi Company Limited;
..............page:47-49
The Application of Active Defense Technology in the Network Banks
CHENG Yu-jun;ZHANG Xue-feng;Department of Mathematics;Huizhou University;
..............page:50-53
Research of Data mining in Traffic Management
HU Peng;Department of Traffic management;Hunan Police Academy;
..............page:54-57
”Prism” kam: Thoughts on Strengthening the Network Information Security
YAN Guang-jie;TIAN Zhi-yong;JIZHONG ENERGY GROUP;Cotton Handan Golden Lion Co. Ltd.;
..............page:58-60
Digital Certificate in the Application of the Secondary Electric Power System Research
ZHOU Peng;XU Jin-chao;JIANG Chun-lin;Electric Power Research Institute of Guangdong Power Grid Corporation;Security Product R&D Center of China Standard Software Co. Ltd;
..............page:61-66
Application and Exploration of Smart IT operation and Maintenance Management Platform in Court
ZHANG Bao-chuan;YANG Yong;IT management office of the Chengdu Medium People’s Law Court;
..............page:67-70
ren min zhan zheng de wang yang da hai
qu ding ;
..............page:81
yan lun
..............page:82