Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2014 Issue 11
yi fa zhi wang
ben kan bian ji bu ;
..............
page:1
Constructing a Trusted Booting Strategy of the Native Cipher Algorithm in Xen Virtual Enviroment
ZHAO Yu-jie;WEN Nan;CHEN Guan-zhi;Beijing JN TASS Technology Co. Ltd.;
..............
page:2-7+14
Intelligent Event Analysis and Risk Analysis of the IT Integrated Monitoring and Management Platform
LIU Qing-hua;ZHU Chuan-sheng;YANG Yong;IT management office of the Chengdu Medium People’s Law Court;
..............
page:8-10
From the Perspective of the China Economy to See China Industrial Development Prospects of Industrial Control Systems Securit
DU Jing-Zhe;China Industrial Sofeware Promotion Association;
..............
page:11-14
The Application of Ring Signature in E-Signature System
JIANG Hua;LI Hao-liang;Xidian University;Beijing Electronic Science and Technology Institute;
..............
page:15-17
Based on Singular Value Decomposition Method of Binary Matrix Clustering Algorithm Research
HOU Lei;LIU Pei-qiang;XIAO Jin-jie;School of Computer Science and Technology;Shandong Institute of Business and Technology;School of Information Science and Engineering;Shandong Normal University;
..............
page:18-23
guo wai wang luo yu xin xi an quan zhan lue yan jiu
cheng gong ;
..............
page:23
Based on the SVM Classifier for Software Reliability Analysis
YAN Zi-ji;Jiangsu Institute of Automation;
..............
page:24-27
ruan jian bu he gui reng ran shi yin du cio zui da de dan you
..............
page:27
Method and Thought for Security Analysis based on Big Data
QING Song;State Grid Xinjiang Electric Power Company;
..............
page:28-33
The Research of Key Technologies of Multi-tenancy Realization in SaaS Mode
PEI Hua-yan;WANG Huan-min;Office of Academic Affairs;Gan Su Radio and TV University;Mechatronic Technology Institute;Lanzhou Jiaotong University;
..............
page:34-39
shu ju zhong xin she ji yu yun ying shi zhan
luiz andr barroso;jimmy clidaras;urs h zuo lzle;
..............
page:39
Building Trusted Website IaaS Cloud
HAN Jie;FENG Jun;XIAO Yan-jun;China Mobile Group Guangdong Company Limited;Information System Department;
..............
page:40-44
Design of Interaction Based on Firewall and Intrusion Detection System
YANG Yang;HUAN Shu-he;nan tong shipping college;
..............
page:45-47
How to Protect DDoS Attack for Data Centre
MA Yan-jie;WU Yang;Guizhou Power Grid Corp;
..............
page:48-50
Practice and Discussion on Security Management of Virtual Hosts of Server
ZHOU Feng;Shanghai Electric Power Company Limited;
..............
page:51-55
shan shi wang ke liang xiang shou jie guo jia wang luo an quan xuan chuan zhou
..............
page:55
Discussion on the basic Unit of Network and Information Security Emergency Classification
HUANG Shao-qing;LIU Guo-wei;YUE You-bao;CHEN Zhao;Beijing Government Computer Emergency Response Center;
..............
page:56-58
Discussion on the Confidential Network Management of "SAN-YUAN"
ZHAO Wei-dong;DING Xian-hua;The Shaanxi radio Monitoring Station of the State Radio Monitoring Center;
..............
page:59-62
hua san mou ding da an quan , shi jie hu lian wang da hui shou liang xiang
..............
page:62
lang chao : jiang ye wu zhong dian chi xu ju jiao yu yun zhu ji ling yu
duan hong ;
..............
page:63-64
hid global: shan jian , zhi rong , shen hua an quan shen fen shi bie ying yong
duan hong ;
..............
page:65-66
da shu ju : an quan ji shu sheng ji de chong dong
qu ding ;
..............
page:67
yan lun
..............
page:68