Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2014 Issue 1
an quan da nian
ji suan ji an quan bian ji bu ;
..............
page:1
Analysis and Model for NCS with Estimator for Data Packet Dropout Compensation
FENG Hong-wei;,Liu Yuan-yuan;
..............
page:2-5
English Title IDS based on Feature-sifting and Weighted SVM
PAN Xiao-zhong;,WANG Yao-pu;
..............
page:6-10
xin xi dong tai
..............
page:10,24,53
Research of Intrusion Detection System based on the Quasi-Newton Algorithm in Neural Networks
CHEN Gui-Yun;,ZHANG Jiang;
..............
page:11-15
Fast DCA algorithm in TD-SCDMA system research
DU Shu-wei;,WANG Mei;,WU Ya-nan;,ZHAO Jun-na;
..............
page:16-19
Research and Implement of VPN Key Technology-based OpenVPN
GUI Zuo-qin;,ZHU Ye;
..............
page:20-24
GPS Signal Processing and Analysis based on LabView
DU Shu-wei;,WANG Mei;,WU Xing-yue;,WU Ya-nan;
..............
page:25-27
The Projection Construction of Measurement Matrix based on Optimal Grassmannian Frames
WANG Li-xin;,XIAO Chao;,XING Jia-jun;
..............
page:28-31
A Modified Sparsity Adaptive Variable Step Regularized Matching Pursuit Algorithm
REN Yuan;,Zhao Yi-zhi;
..............
page:32-35
Research on Clustering Analysis and Application
YANG Sen;
..............
page:36-39
Research Mechanism for Virtualization Security Service
PU Jing;,XU Kun;,ZHOU Xuan;
..............
page:40-43
Using Trace for Analysis and Obtain Evidnce System of Computer
FEI Feng;,KANG Xiao-feng;,LI Kang;,ZHANG You-le;
..............
page:44-47
File Integrity Detection Technology based on Filter Drivers
LI Sen;
..............
page:48-50
GET VPN Technology and It's Application
YIN Shu-ling;
..............
page:51-53
Research on Risk Assessment of Power Supply Enterprise Information Operation
FENG You-jun;,LI Han-chen;,LIANG Wan-long;,YIN Zhi-ling;
..............
page:54-59,64
Information System Classified Protection Rectification Construction
XIA Guo-guang;,ZHANG Wei;,ZHOU Cheng-bing;
..............
page:60-64
The Application of Firewall Technology in Office Network
YE Jian-long;
..............
page:65-67
Analysis of Network Security Threats and Protection
FAN Zhan-jun;,ZHAO Yu-peng;
..............
page:68-71
Network Information Security and Response Mechanism to Explore Colleges and Universities
WANG Guo-zhen;
..............
page:72-74
jiao yu wang mian lin de tiao zhan ji jie jue fang an chu tan
li pin gao ;
..............
page:75-76
check point yu ce 2014 nian an quan qu shi
..............
page:77
2014 xin xi an quan zhan wang
xi an jiao da jie pu wang luo ke ji you xian gong si ;
..............
page:78
jin shan an quan : ba an quan zuo wei wei yi jia zhi ti gong gei ke hu
duan hong ;
..............
page:79-81
di shi yi jie zhong guo ruan jian ji shu da hui yuan man luo mu
..............
page:82
almost huan shi nearly?
qu ding ;
..............
page:83-84