Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2013 Issue 10
hu lian wang jin rong de an quan shang ji
ben kan bian ji bu ;
..............
page:1
Computer Virus Signature Automatic Extraction Method based on N-Gram
ZENG Jian;ZHAO Hui;Dept. of Computer Science;Sichuan University;
..............
page:2-5
An Introduction of an Adaptive Cascaded Intrusion Detection Model
ZHAO Lan;CHEN Wen;ZHAO Hui;Dept. of Computer Science;Sichuan University;
..............
page:6-11
Design and Implementation of Disaster Tolerant System Supporting Clustered Storage
LIU Xin-guo;YUE Hong-chao;Dept. of Computer Science;Sichuan University;
..............
page:12-14
Design and Implementation of an Oracle Remote Backup and Recovery System
YAN Zhou-bin;HU Xiao-qin;Computer Department;Sichuan University;
..............
page:15-20
shan shi wang ke can jia di er shi jie cernet xue shu nian hui zuo shi zhi neng an quan wei lai
..............
page:20
ji yu cdp ji shu de rong zai xi tong she ji
liu jia jun ; liu shun ;
..............
page:21-24
catchpoint kuo da quan qiu xing neng jian ce neng li
..............
page:24
Identification and Risk Analysis of Sensitive Data in Commercial Banks
WANG Yan-feng;CHEN Dian-you;JIANG Fan;GUAN Lei;FAN Jin-hui;Agricultural Bank of China;
..............
page:25-30
liao ning li fa gui ding qie qu qq deng zhang hao ke zhui jiu xing ze
..............
page:30
Research and Implementation of Elliptic Curve Cryptography System
ZHANG Jing;School of computer and communication engineering;Zhengzhou Institute of Light Industry;
..............
page:31-34
The Improving of Security Authentication Mechanism in Wireless Sensor Networks Reprogramming
LIU Hong;ZHANG Yong;WANG Zhi-li;College of Computer Science and Technology;Nanjing University of Aeronautics & Astronautics;
..............
page:35-38
rsa fa bu qi ye chuang xin xin xi an quan wei yuan hui (sbic) quan xin yan jiu cheng guo
..............
page:38
Research on the Network Security Authentication Mechanism Across the Wireless Local Area Network
ZHOU Ming-kuai;Zhejiang Vocational College of Commerce;
..............
page:39-42
wang luo fan zui zhi chu cheng ben lian xu 4 nian chu xian zeng chang
..............
page:42
A Fusion based Night Image Enhancement Algorithm
TIAN Wang;TAO Qing-chuan;College of Electronics and Information Engineering;Sichuan University;
..............
page:43-46
Malicious Backdoor Code Audit Analysis
YUAN Bing;LIANG Geng;LI Zu-feng;GUI Yong-hong;WANG Rui;China Mobile Group Guangxi Company Limited;
..............
page:47-49
The Application of Active Defense Technology in the Network Banks
CHENG Yu-jun;ZHANG Xue-feng;Department of Mathematics;Huizhou University;
..............
page:50-53
jin ya tuo zai xiang gang bu shu shang ye yi dong nfc jiao tong ji zhi fu fu wu
..............
page:53
Research of Data mining in Traffic Management
HU Peng;Department of Traffic management;Hunan Police Academy;
..............
page:54-57
”Prism” kam: Thoughts on Strengthening the Network Information Security
YAN Guang-jie;TIAN Zhi-yong;JIZHONG ENERGY GROUP;Cotton Handan Golden Lion Co. Ltd.;
..............
page:58-60
Digital Certificate in the Application of the Secondary Electric Power System Research
ZHOU Peng;XU Jin-chao;JIANG Chun-lin;Electric Power Research Institute of Guangdong Power Grid Corporation;Security Product R&D Center of China Standard Software Co. Ltd;
..............
page:61-66
Application and Exploration of Smart IT operation and Maintenance Management Platform in Court
ZHANG Bao-chuan;YANG Yong;IT management office of the Chengdu Medium People’s Law Court;
..............
page:67-70
fu lu ke wang luo tui chu airmagnet spectrum es
..............
page:70
hua wei zhong xin ding yi ngfw, zhang kong xia yi dai an quan
duan hong ;
..............
page:71-72
ying te er 2000 wan shou gou wang luo an quan gong si sensory networks
..............
page:72
web ying yong an quan fang hu ke bu rong huan
..............
page:73-74
adobe yuan dai ma xie lu kong yin fa an quan wei ji qu shi ke ji xie zhu yong hu dong cha wei xie zhu si ma ji
..............
page:74
mai ke fei : da shu ju chu li neng li shi siem de he xin
..............
page:75-76
tian rong xin fa bu gao xing neng yun shu ju zhong xin bian jie fang hu jie jue fang an
..............
page:77
rui xing tui chu xu ni hua xi tong xin xi an quan jie jue fang an
..............
page:78
wang yu xing yun : jie du shu ju an quan
..............
page:79-80
ren min zhan zheng de wang yang da hai
qu ding ;
..............
page:81
yan lun
..............
page:82
di 15 jie guo ji xin xi yu tong xin an quan hui yi (icics 2013) zheng gao tong zhi
..............
page:83