Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2014 Issue 4
zou zhong guo te se guo jia an quan dao lu
ben kan bian ji bu ;
..............
page:1
Research on Cognitive Engine and its Security in Cognitive Radio Networks
LI Ya-lun;WANG Xian-rong;School of electronic and information engineering;Tianjin polytechnic University;School of information science and engineering;Henan University of technology;
..............
page:2-4
qu shi ke ji wei xie fa xian she bei tda rong huo nss labs ping bi di yi
..............
page:4
A Neural Network Training Algorithm based on Dynamic Weight
SHEN Jun;Central China Photoelectric Technology Institute;
..............
page:5-8
A Virus Detection Method based on PSO
ZHU Li-zhi;Nanjing University of Aeronautics and Astronautics;information center Nanjing;
..............
page:9-13
An Intelligent Detection Algorithm based on Text Virus
ZHU Li-zhi;Nanjing University of Aeronautics and Astronautics;information center;
..............
page:14-17
The Evolution Mechanism of Microblog Public Opinion and Its Empirical Analysis
ZHANG Xin-gang;WANG Yan;WANG Bao Ping;CHENG Xin Dang;College of Computer&Information Technology;Nanyang Normal University;
..............
page:18-21
An Improved Algorithm based on Authentication Mechanism of ARP Protocol
HONG Xin-jian;HONG Xin-hua;Dept.of Information technology;Hunan Vocational technological academy of Creature and equipment and electric power equipment;
..............
page:22-24
shan shi wang ke gao xiao ipv6 an quan jie jue fang an
..............
page:24
Implement and Research of Policy Confi guration based on Separation of the Three Powers Mechanism in SecEOS
ZHANG Jian-biao;LIU Bao-kuang;LIU Peng-fei;Computer Department of Beijing University of Technology;
..............
page:25-28
Application Research of Information System Security Assessment based on Neural Network
GU Lei;WANG Xi-Zhong;HUANG Jun-Qiang;HLJ Province Electronic & information Products Supervision Inspection Institute;
..............
page:29-32
Design of Secure Cloud Storage Architecture of Metadata and Data Separated System
LV Xiao-xia;WANG Li-xuan;ZHANG Yan;The Fourth Military Medical University Department of training;The army’s Logistics Information Center;The general headquarters of the Political Department;
..............
page:33-37
Implement and Analysis of Text Filtering Technique based on BHO
GUO Zheng;DENG Xing;Computer Department of Huazhong Normal University;
..............
page:38-39
Research on Security Technology of E-government System Software Application
XU Rao-shan;Nanjing college of information technology;
..............
page:40-43
An Analysis of Information Security Technology in Application of Secret Offi ce Network
WANG Dan-ning;CHENG Chen;WANG Wen-qing;XIAO Jian-jun;Second Monitoring and Application Center;CEA;Institute of Seismology;CEA;
..............
page:44-46+51
Research on Integration of IT Operation Control Technology and Management
LIANG Hao-bo;FENG You-jun;LIN Hao-zhao;Guangdong Power Grid Company Dongguan Power Supply Bureau;
..............
page:47-51
A New Multicast Key Management Scheme Suited for Wireless Network
LIU Shu-ying;Xu Yong;YANG Fan;Anhui Normal University Mathematics and Computer Science Department;
..............
page:52-56
Research on Security Scheme of Telecommuting based on VDI
DENG Xiao-xiao;HAN Wei-jie;XU Shi-bo;Academy of Equipment graduate faculty;Academy of Equipment Department of Information Equipment;
..............
page:57-61
Research on the virtual technology under Network Environment
ZHAO Kai;Beijing vocational college of electronic science;
..............
page:62-64+70
Research on the Database Security under the Condition of Cloudy Computing
WANG Qing-fu;Liaoning School of Administration;
..............
page:65-67
Cloud Computing and Information Security
ZHANG Bao-sheng;ZOU Ben-na;Information Administration Center;Municipal Party School of Huludao;
..............
page:68-70
wang luo an quan tai shi gan zhi zuo yi
wang xu ;
..............
page:71-75
si ke tui chu ke tuo guan shi wei xie fang yu fu wu jie jue fang an
..............
page:75
Enhance the Security of Access Databases
Wang Zhi-chao;Liu Zhan-Jiang;China Unicom Chifeng Branch Information Service Center;
..............
page:76-78
The Design of the Campus Network Data Storage System based on IP-SAN
MAO Jing;The department of electronic and information engineering;Ankang University;
..............
page:79-83
Research on Security Management Strategy of Big Data for Medical Information
LI Zhi-qiang;KANG Li-jun;WANG Wen-cui;Joint Logistics Department of Shenyang Military Area;Information Center;The General Hospital of Shenyang Military Area;Information Section;
..............
page:84-86
hui pu : ju jiao xie zuo shi fang yu sheng tai xi tong
duan hong ;
..............
page:87-88
bai du shou ji wei shi tui yi yuan bao pei ji hua
duan hong ;
..............
page:89-90
bu rong hu shi de web an quan wen ti
..............
page:90
shui qu dai shui
qu ding ;
..............
page:91
yan lun
..............
page:92