Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2014 Issue 11
yi fa zhi wang
ben kan bian ji bu ;
..............page:1
Constructing a Trusted Booting Strategy of the Native Cipher Algorithm in Xen Virtual Enviroment
ZHAO Yu-jie;WEN Nan;CHEN Guan-zhi;Beijing JN TASS Technology Co. Ltd.;
..............page:2-7+14
Intelligent Event Analysis and Risk Analysis of the IT Integrated Monitoring and Management Platform
LIU Qing-hua;ZHU Chuan-sheng;YANG Yong;IT management office of the Chengdu Medium People’s Law Court;
..............page:8-10
From the Perspective of the China Economy to See China Industrial Development Prospects of Industrial Control Systems Securit
DU Jing-Zhe;China Industrial Sofeware Promotion Association;
..............page:11-14
The Application of Ring Signature in E-Signature System
JIANG Hua;LI Hao-liang;Xidian University;Beijing Electronic Science and Technology Institute;
..............page:15-17
Based on Singular Value Decomposition Method of Binary Matrix Clustering Algorithm Research
HOU Lei;LIU Pei-qiang;XIAO Jin-jie;School of Computer Science and Technology;Shandong Institute of Business and Technology;School of Information Science and Engineering;Shandong Normal University;
..............page:18-23
Based on the SVM Classifier for Software Reliability Analysis
YAN Zi-ji;Jiangsu Institute of Automation;
..............page:24-27
Method and Thought for Security Analysis based on Big Data
QING Song;State Grid Xinjiang Electric Power Company;
..............page:28-33
The Research of Key Technologies of Multi-tenancy Realization in SaaS Mode
PEI Hua-yan;WANG Huan-min;Office of Academic Affairs;Gan Su Radio and TV University;Mechatronic Technology Institute;Lanzhou Jiaotong University;
..............page:34-39
shu ju zhong xin she ji yu yun ying shi zhan
luiz andr barroso;jimmy clidaras;urs h zuo lzle;
..............page:39
Building Trusted Website IaaS Cloud
HAN Jie;FENG Jun;XIAO Yan-jun;China Mobile Group Guangdong Company Limited;Information System Department;
..............page:40-44
Design of Interaction Based on Firewall and Intrusion Detection System
YANG Yang;HUAN Shu-he;nan tong shipping college;
..............page:45-47
How to Protect DDoS Attack for Data Centre
MA Yan-jie;WU Yang;Guizhou Power Grid Corp;
..............page:48-50
Practice and Discussion on Security Management of Virtual Hosts of Server
ZHOU Feng;Shanghai Electric Power Company Limited;
..............page:51-55
Discussion on the basic Unit of Network and Information Security Emergency Classification
HUANG Shao-qing;LIU Guo-wei;YUE You-bao;CHEN Zhao;Beijing Government Computer Emergency Response Center;
..............page:56-58
Discussion on the Confidential Network Management of "SAN-YUAN"
ZHAO Wei-dong;DING Xian-hua;The Shaanxi radio Monitoring Station of the State Radio Monitoring Center;
..............page:59-62
yan lun
..............page:68