Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2013 Issue 7
Research on Networked Robot Control System based on Iterative Learning Control
ZHU Jie-ying
..............
page:58-62
The Network Risk Calculation Model based on Attack Graph
HUANG Yang;CHEN Wen
..............
page:7-10
Research on City Emergency Logistics Storage Based on ExtendSim
Liu Hong-zhi;LIu Zhao;Wei Xiao-bing
..............
page:52-57
fu lu ke wang luo chan pin tui chu onetouch at di er ban
..............
page:24-24
Based on Trusted Network Connect (TNC) Access to E-government Network Security Architecture Research
LI XIAO-ming;lIU Fang;HOU Gang
..............
page:81-85
Public Security Network Video Monitor System Data Mining
TANG De-quan;Shi Wei-qi
..............
page:11-14,20
wang shen qi nian chan lian soc shi chang zhan you lv di yi
..............
page:28-28
The Study of Computer Network Security Status
WANG Qi
..............
page:44-49
mou shi xin xi zhong xin wang luo she ji fang an
..............
page:90-92
suo zi yu tui chu barracuda backup 5.2 ban
..............
page:6-6
Brief Analysis Cloud Computation Safety Work
ZHANG Yuan-jin;CAI Jun-jie
..............
page:75-77
Design and Implementation of the Adaptive Host Intrusion Prevention System
LV Bin;GUAN Shuang-cheng;LIU Xiao-hong;ZHANG Yan-yan
..............
page:21-24
The Analysis of Cloud Computing Security Issues
ZHANG Jian-li
..............
page:71-74
wang yu xing yun wan zhao fang huo qiang zhu li shen shi he tian gong yi hao dui jie cheng gong
..............
page:74-74
the Realization of Security for E-mail on PGP System
YANG Liu
..............
page:40-43
Research of Remote Meter Reading System
ZHU Lin-jie;LI lan
..............
page:86-88
Analyse and Simulation of the Bayes based Trust Model for Peer-to-Peer Network
GAO Kun-lun;ZHAO Bao-hua;ZHAO Dong-yan;SUN Xin;YUAN Jin-feng;HAN Lan-sheng
..............
page:15-20
qu shi ke ji deep security 9.0 zheng shi fa bu shi fang yun de zhen zheng li liang
..............
page:88-88
Network Information Security and Protection Policies
WANG Yue-hua;HU Mei;XIAO Jie
..............
page:78-80
A Zero-watermarking Algorithm based on Image Normalization and Fractal Coding
LI Chun-yan;LI Ying-jiang;LIU Jing-ping
..............
page:29-32
Research of Data Transmission Security Technology for Smart Grid
XIAO Zhen-qiu;LUO Yu-dong
..............
page:50-51,57
Design and Implementation of Remote Backup System based on HDFS
YUE Hong-chao;ZHAO Hui
..............
page:2-6
A Broadcasting Multi-digital Signature Scheme based on RSA
WU Shu-min;WEI Li-li
..............
page:25-28
ji yu linux de xiao yuan wang liu liang jian kong xi tong she ji
long chao zhong
..............
page:36-39
hua wei anti-ddos fang an fu wu zhong xiao qi ye qiang shi ju ji ddos
..............
page:89-89
gou jian an quan huan jing cu jin xin xi xiao fei
ben kan bian ji bu
..............
page:1-1
In-depth Analysis of Virtualization Security
HE Wei-hua
..............
page:63-66
Analysis and improvement of a proxy signature based on elliptic curve
WANG Yu-qi;LI Lang;ZOU Yi
..............
page:33-35
The Research of Cloud Computing Security Authentication Platform based on Digital Certificate
XU Qi
..............
page:67-70