Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2013 Issue 7
The Network Risk Calculation Model based on Attack Graph
HUANG Yang;CHEN Wen
..............page:7-10
Research on City Emergency Logistics Storage Based on ExtendSim
Liu Hong-zhi;LIu Zhao;Wei Xiao-bing
..............page:52-57
Public Security Network Video Monitor System Data Mining
TANG De-quan;Shi Wei-qi
..............page:11-14,20
The Study of Computer Network Security Status
WANG Qi
..............page:44-49
Brief Analysis Cloud Computation Safety Work
ZHANG Yuan-jin;CAI Jun-jie
..............page:75-77
Design and Implementation of the Adaptive Host Intrusion Prevention System
LV Bin;GUAN Shuang-cheng;LIU Xiao-hong;ZHANG Yan-yan
..............page:21-24
The Analysis of Cloud Computing Security Issues
ZHANG Jian-li
..............page:71-74
the Realization of Security for E-mail on PGP System
YANG Liu
..............page:40-43
Research of Remote Meter Reading System
ZHU Lin-jie;LI lan
..............page:86-88
Analyse and Simulation of the Bayes based Trust Model for Peer-to-Peer Network
GAO Kun-lun;ZHAO Bao-hua;ZHAO Dong-yan;SUN Xin;YUAN Jin-feng;HAN Lan-sheng
..............page:15-20
Network Information Security and Protection Policies
WANG Yue-hua;HU Mei;XIAO Jie
..............page:78-80
A Zero-watermarking Algorithm based on Image Normalization and Fractal Coding
LI Chun-yan;LI Ying-jiang;LIU Jing-ping
..............page:29-32
Research of Data Transmission Security Technology for Smart Grid
XIAO Zhen-qiu;LUO Yu-dong
..............page:50-51,57
Design and Implementation of Remote Backup System based on HDFS
YUE Hong-chao;ZHAO Hui
..............page:2-6
A Broadcasting Multi-digital Signature Scheme based on RSA
WU Shu-min;WEI Li-li
..............page:25-28
ji yu linux de xiao yuan wang liu liang jian kong xi tong she ji
long chao zhong
..............page:36-39
gou jian an quan huan jing cu jin xin xi xiao fei
ben kan bian ji bu
..............page:1-1
In-depth Analysis of Virtualization Security
HE Wei-hua
..............page:63-66
Analysis and improvement of a proxy signature based on elliptic curve
WANG Yu-qi;LI Lang;ZOU Yi
..............page:33-35