Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2014 Issue 12
nian zhong pan dian
ben kan bian ji bu ;
..............page:1
Practice and the Technology of Intelligent IT Operation Monitoring Management Platform
YANG Zhi-nong;Chengdu Medium People’s Law Court;
..............page:2-4
Research and Design on Security Architecture of Device-to-Device Communication in LTE-A
Xu Xiang-bin;ZHANG Jing-sheng;HUANG Zhong-Yuan;Institute of Data Recovery;Beijing Information Science and Technology University;
..............page:5-9
Researching on Security Framework for Cloud Computing Server Platforms
WANG Guan;SHAN Fu-yuan;College of Computer;Beijing University of Technology;
..............page:10-12
Local Certifi cation and Local Certifi cation Management System based on Linux Security Module
LU Nan-qiong;ZU Yan;Shanghai Culture and Broadcasting Inspection Center;
..............page:13-16
Log Analysis of AAA System based on Event Clustering
LUO Wei;ZHUO Lin;Sun Xu-hui;College of Computer;National University of Defense Technology;Department of Computer;Changsha University;The 71155th Forces;
..............page:17-20
Improvement and Realization of HDFS Load Balance based on Real-time Load
CHEN Chen;ZHANG Dong;Sichuan University;
..............page:21-25
Research and Application of IDC Gigabit networking and virtualization technology
TAN Xiong-hua;CSG Guangdong Power Grid Dongguan Power Supply Bureau;
..............page:26-28
The Safety Strategy Deployment on the DHCP Service Attack
ZHANG Tao;Zhengde polytechnic College Department of Electronics and Information Technology;
..............page:29-32
xin xi yin cang gai lun
lu zhe ming ; nie ting yuan ; ji ai guo ;
..............page:32
The Research Of The University Unifi ed Backup System based On SAN
LIU Guo-ying;ZAN Lin-ping;Information center;Xi’an University of Posts and Telecommunications;School of computer science;Xi’an University of Posts and Telecommunications;
..............page:33-36
Remote management of Linux based SSH protocol
ZHANG Guo-fang;Hainan college of software technology;
..............page:37-39
Exploration of Security Mechanism in Internet of Things Sensing Layer
LI Chun-yan;Engineering Institute Honghe University;
..............page:40-43
hei ke da zhui zong : wang luo qu zheng he xin yuan li yu shi jian
Sherri Davidoff;Jonathan Ham;
..............page:43
Cloud Computing Information Security Application Development
ZHU Yu;Taiyuan Police Vocational College;
..............page:44-46
The Research of User Behavior Security Authentication Mechanism in Cloud computing environment
TIAN Jing;Liaoning Police Academy;Department of Vocational Education;
..............page:47-49
Overall Explanation for Database Audit Productions
ZHANG Ke-xian;HUANG Li-ya;TAN Chi;Guizhou Power Grid Corp;
..............page:50-52
Research of Computer Information Security Risks Prevention Methods
LIN Yong-feng;WANG Ying;ZHANG Guo-qiang;Tianjin Electric Power Research Institute;Tianjin Streetlights Management Office;
..............page:53-57
Analysis of The Information Security Protection System for Banking Internet Finance
SHI Xiang-dong;Electronics & Information Engineering;Tongji University;
..............page:58-60
Construction of Proactive Defense System for Network Terminals of Power Supply Enterprises
LIU Hui-zhou;State Grid Tongling Power Supply Company;
..............page:61-64
Discussion for Free WiFi Security
LU Xiu-chang;Guizhou Power Grid Corp;
..............page:65-67
The Construction of Digital Campus based on the Cloud Architecture
GAO Jian-hua;Hunan Biological and Electromechanical Polytechnic;
..............page:68-70
feng he ying dui a&d shi chang xin tiao zhan
duan hong ;
..............page:81-82
an quan xin chang tai
qu ding ;
..............page:86
yan lun
..............page:87