Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2014 Issue 12
nian zhong pan dian
ben kan bian ji bu ;
..............
page:1
Practice and the Technology of Intelligent IT Operation Monitoring Management Platform
YANG Zhi-nong;Chengdu Medium People’s Law Court;
..............
page:2-4
Research and Design on Security Architecture of Device-to-Device Communication in LTE-A
Xu Xiang-bin;ZHANG Jing-sheng;HUANG Zhong-Yuan;Institute of Data Recovery;Beijing Information Science and Technology University;
..............
page:5-9
Researching on Security Framework for Cloud Computing Server Platforms
WANG Guan;SHAN Fu-yuan;College of Computer;Beijing University of Technology;
..............
page:10-12
Local Certifi cation and Local Certifi cation Management System based on Linux Security Module
LU Nan-qiong;ZU Yan;Shanghai Culture and Broadcasting Inspection Center;
..............
page:13-16
Log Analysis of AAA System based on Event Clustering
LUO Wei;ZHUO Lin;Sun Xu-hui;College of Computer;National University of Defense Technology;Department of Computer;Changsha University;The 71155th Forces;
..............
page:17-20
Improvement and Realization of HDFS Load Balance based on Real-time Load
CHEN Chen;ZHANG Dong;Sichuan University;
..............
page:21-25
Research and Application of IDC Gigabit networking and virtualization technology
TAN Xiong-hua;CSG Guangdong Power Grid Dongguan Power Supply Bureau;
..............
page:26-28
The Safety Strategy Deployment on the DHCP Service Attack
ZHANG Tao;Zhengde polytechnic College Department of Electronics and Information Technology;
..............
page:29-32
xin xi yin cang gai lun
lu zhe ming ; nie ting yuan ; ji ai guo ;
..............
page:32
The Research Of The University Unifi ed Backup System based On SAN
LIU Guo-ying;ZAN Lin-ping;Information center;Xi’an University of Posts and Telecommunications;School of computer science;Xi’an University of Posts and Telecommunications;
..............
page:33-36
Remote management of Linux based SSH protocol
ZHANG Guo-fang;Hainan college of software technology;
..............
page:37-39
Exploration of Security Mechanism in Internet of Things Sensing Layer
LI Chun-yan;Engineering Institute Honghe University;
..............
page:40-43
hei ke da zhui zong : wang luo qu zheng he xin yuan li yu shi jian
Sherri Davidoff;Jonathan Ham;
..............
page:43
Cloud Computing Information Security Application Development
ZHU Yu;Taiyuan Police Vocational College;
..............
page:44-46
The Research of User Behavior Security Authentication Mechanism in Cloud computing environment
TIAN Jing;Liaoning Police Academy;Department of Vocational Education;
..............
page:47-49
Overall Explanation for Database Audit Productions
ZHANG Ke-xian;HUANG Li-ya;TAN Chi;Guizhou Power Grid Corp;
..............
page:50-52
Research of Computer Information Security Risks Prevention Methods
LIN Yong-feng;WANG Ying;ZHANG Guo-qiang;Tianjin Electric Power Research Institute;Tianjin Streetlights Management Office;
..............
page:53-57
guo jia xin xi zhong xin yu guo xin ling tong qian shu zhan lue he zuo xie yi
..............
page:57
Analysis of The Information Security Protection System for Banking Internet Finance
SHI Xiang-dong;Electronics & Information Engineering;Tongji University;
..............
page:58-60
Construction of Proactive Defense System for Network Terminals of Power Supply Enterprises
LIU Hui-zhou;State Grid Tongling Power Supply Company;
..............
page:61-64
Discussion for Free WiFi Security
LU Xiu-chang;Guizhou Power Grid Corp;
..............
page:65-67
The Construction of Digital Campus based on the Cloud Architecture
GAO Jian-hua;Hunan Biological and Electromechanical Polytechnic;
..............
page:68-70
di shi san ci quan guo xin xi wang luo an quan zhuang kuang zuo ji suan ji he yi dong zhong duan bing du yi qing diao cha huo dong fen xi bao gao
liang hong ; liu yan ; yang ren zuo ;
..............
page:71-79
hui pu : zhong xin ding yi da ji wang luo wei xie de zhu dong fang yu
..............
page:80+82
feng he ying dui a&d shi chang xin tiao zhan
duan hong ;
..............
page:81-82
check point jie shi yi dong an quan shi chang wu da tai shi
duan hong ;
..............
page:83
hua wei yu an quan fu wu ling dao zhe black lotus zhan kai quan qiu he zuo
..............
page:84-85
qu shi ke ji quan mian ti sheng qi ye yong hu fang hu zu duan gao ji wei xie
..............
page:84
hua san fa bu xiao bei xi lie wlan she bei
..............
page:85
tian rong xin fa bu ngfw quan xin di liu dai lie bao
..............
page:85
an quan xin chang tai
qu ding ;
..............
page:86
yan lun
..............
page:87
ji suan ji an quan 2014 quan nian zong mu ci
..............
page:88-92