Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2014 Issue 3
wang an sheng ji
ben kan bian ji bu ;
..............
page:1
Design and Implementation of an Asynchronous Logging Intrusion Prevention System
AI Lei;CHEN Wen;Dept.of Computer Science;Sichuan University;
..............
page:2-6
A Traffi c-balancing Method based on Real-time Load
ZHOU Ji;LIANG Gang;Dept.of Computer Science;Sichuan University;
..............
page:7-11
Tape-based Tiered Storage File Backup and Recovery System Design and Implementation
WANG xiao-ran;HU xiao-qin;HUANG chuan-bo;College of Computer Science;Sichuan University;
..............
page:12-17
A Framework of Cluster Decision Tree in Data Stream Classifi cation
WU Xiao-zhi;HU Jian;ZHU Guang-xin;RU Meng;Information system integration company Nari Group Cooperation;
..............
page:18-22
he xin chuang tian shou yao chu xi 2014 zhong guo it shi chang nian hui
..............
page:22
The Usage of Software Testing Management tools in Military Software Test
WANG Wei;WANG Li;LI Da;91550 Unit;Jiangsu Automation Research Institute;
..............
page:23-27
xin xi an quan ji shu gai lun ( di 2 ban )
feng deng guo ; zhao xian feng ;
..............
page:27
Research and Implementation of Minifi lter Driver File Transparent Encryption and Decryption System
WANG Quan-min;HE Ming;MIAO Yu;College of Computer Science;Beijing University of Technology;
..............
page:28-32
rsa lian shou pivotal ti gong an quan fen xi he da shu ju zhi nan
..............
page:32
Design of Workfl ow Exception Handling Model based on CPN
ZHANG Ting;ZHANG Xin;DUAN Xin-dong;LIN Yu-xiang;College of Computer and Information Technology;Nanyang Normal University;School of Software Nanyang Institute of Technology Nanyang;
..............
page:33-37
geng zheng
..............
page:37
The Formal Verifi cation of OpenFlow Protocol using SPIN
SHI Ying;92723 PLA troops;
..............
page:38-43
The Impact of Nnoise or Noiseless on Cellular Neural Network to Detect Image Edge
TONG Zhen;LI Guo-dong;The Applied Mathematics;Xinjiang University of Finance & Economics;
..............
page:44-48
Comparison of Wireless Network Authentication Encryption Methods
ZHANG Shao-fang;LI Ji-dong;LI Xian-jun;Shijiazhuang Vocational Technical College of Posts & Telecommunications;
..............
page:49-52
chuan tong wang luo yu xian dai wang luo an quan
liu hua qun ;
..............
page:52
Analysis and Discussion of Information Security Issues in Cloud Computin
GAO Jian-hua;Hunan Biological and Electromechanical Polytechnic;
..............
page:53-56
shu ju zhong xin zi yuan you hua diao du : li lun yu shi jian
tian wen hong ; zhao yong ;
..............
page:56
A Fusion of PKI and VPN IPSec Technology Improvement Scheme
PENG Wei;Computer Department of Chongqing University;
..............
page:57-59
Analysis and Research of IPv6 Security Mechanisms-IPSec Protocol
LI Hao-guang;Guangdong Polytechnic College;
..............
page:60-63
wang shen wei liang hui ti gong si wei an quan fang hu bao zhang
..............
page:63
The State of the Art and Development Outlook of Secure Data Exchange
XIA Feng;Science and Technology Department of Shanghai Public Security Bureau;
..............
page:64-68
c he c++ an quan bian ma ( yuan shu di 2 ban )
robert c.seacord;
..............
page:68
Research and Implementation of Web-based Network Topology Discovery Algorithm
SUN Yuan-hui;Staff Office;Chinese People’s Armed Police Force Academy;
..............
page:69-72
gou jian fu wu qi de quan mian an quan fang hu ti xi
..............
page:73-77
sai men tie ke xuan bu ji xu wei windows xp de yong hu bao jia hu hang
..............
page:77
rsa zhi xing zhu xi ya se ke wei luo hu yu : ge guo ji an quan jie xu jia qiang guo ji he zuo yu an quan zhi li
..............
page:78
rui jie wang luo 2014 chan pin zhan lue zuo xin pin zai jing fa bu
..............
page:79
jing ti zhi neng she bei an quan yin huan bing xiang ye ke fa song la ji you jian
..............
page:80
xp tuo gu
qu ding ;
..............
page:81
yan lun
..............
page:82
di 29 ci quan guo ji suan ji an quan xue shu jiao liu hui zheng wen tong zhi
..............
page:83
di san jie quan guo xin xi an quan deng ji bao hu ji shu da hui (icsp 2014) zheng wen tong zhi
..............
page:84