Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2014 Issue 3
wang an sheng ji
ben kan bian ji bu ;
..............page:1
Design and Implementation of an Asynchronous Logging Intrusion Prevention System
AI Lei;CHEN Wen;Dept.of Computer Science;Sichuan University;
..............page:2-6
A Traffi c-balancing Method based on Real-time Load
ZHOU Ji;LIANG Gang;Dept.of Computer Science;Sichuan University;
..............page:7-11
Tape-based Tiered Storage File Backup and Recovery System Design and Implementation
WANG xiao-ran;HU xiao-qin;HUANG chuan-bo;College of Computer Science;Sichuan University;
..............page:12-17
A Framework of Cluster Decision Tree in Data Stream Classifi cation
WU Xiao-zhi;HU Jian;ZHU Guang-xin;RU Meng;Information system integration company Nari Group Cooperation;
..............page:18-22
The Usage of Software Testing Management tools in Military Software Test
WANG Wei;WANG Li;LI Da;91550 Unit;Jiangsu Automation Research Institute;
..............page:23-27
xin xi an quan ji shu gai lun ( di 2 ban )
feng deng guo ; zhao xian feng ;
..............page:27
Research and Implementation of Minifi lter Driver File Transparent Encryption and Decryption System
WANG Quan-min;HE Ming;MIAO Yu;College of Computer Science;Beijing University of Technology;
..............page:28-32
Design of Workfl ow Exception Handling Model based on CPN
ZHANG Ting;ZHANG Xin;DUAN Xin-dong;LIN Yu-xiang;College of Computer and Information Technology;Nanyang Normal University;School of Software Nanyang Institute of Technology Nanyang;
..............page:33-37
geng zheng
..............page:37
The Formal Verifi cation of OpenFlow Protocol using SPIN
SHI Ying;92723 PLA troops;
..............page:38-43
The Impact of Nnoise or Noiseless on Cellular Neural Network to Detect Image Edge
TONG Zhen;LI Guo-dong;The Applied Mathematics;Xinjiang University of Finance & Economics;
..............page:44-48
Comparison of Wireless Network Authentication Encryption Methods
ZHANG Shao-fang;LI Ji-dong;LI Xian-jun;Shijiazhuang Vocational Technical College of Posts & Telecommunications;
..............page:49-52
chuan tong wang luo yu xian dai wang luo an quan
liu hua qun ;
..............page:52
Analysis and Discussion of Information Security Issues in Cloud Computin
GAO Jian-hua;Hunan Biological and Electromechanical Polytechnic;
..............page:53-56
shu ju zhong xin zi yuan you hua diao du : li lun yu shi jian
tian wen hong ; zhao yong ;
..............page:56
A Fusion of PKI and VPN IPSec Technology Improvement Scheme
PENG Wei;Computer Department of Chongqing University;
..............page:57-59
Analysis and Research of IPv6 Security Mechanisms-IPSec Protocol
LI Hao-guang;Guangdong Polytechnic College;
..............page:60-63
The State of the Art and Development Outlook of Secure Data Exchange
XIA Feng;Science and Technology Department of Shanghai Public Security Bureau;
..............page:64-68
c he c++ an quan bian ma ( yuan shu di 2 ban )
robert c.seacord;
..............page:68
Research and Implementation of Web-based Network Topology Discovery Algorithm
SUN Yuan-hui;Staff Office;Chinese People’s Armed Police Force Academy;
..............page:69-72
xp tuo gu
qu ding ;
..............page:81
yan lun
..............page:82