Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2014 Issue 8
zi ben de sheng yan
ji suan ji an quan bian ji bu ;
..............
page:1
The Anti-Spambot Module based on the Frameworks of Information Secretary Level Protection
LI Jian;,LI Qin-nian;,REN Qi-da;,ZHOU Hua-gang;
..............
page:2-7
The Research and Design of a Model of Non_line Boolean Function Processing
JI Xiang-jun;,LI Li;,SONG Huai-gang;,XU Kun;
..............
page:8-11
Elementary Exploration on Risk Assessment Mechanism for Development and Application of Information Security Chip
GUO Jian-jun;,LIU Wen-ping;,LUO Yun-feng;,XU Kun;
..............
page:12-16
Research on Information Engineering Security Surveillance Risk Assessment based on PageRank Algorithm
LIU Hong-Zhi;,PANG Hong-Mei;
..............
page:17-20
A DDoS attack Detection Algorithm based on MMTD
ZHU Li-zhi;
..............
page:21-24
Research of WLAN DoS Attack Defense Strategy about University Campus
PU Zai-yi;
..............
page:25-29
Security Problems Analysis and Defend Measure for Server Virtualization
DENG Gao-feng;,GAO Si-liang;,LI Yu-long;
..............
page:30-32
Researching On Security Strategies of Hybrid Cloud
DUAN Zhi-qiang;
..............
page:33-37
Research on Active Security Model based on Fingerprint Technology
LIU Yan;,MA Fang;,WANG Zheng;
..............
page:38-40
Study on Extraction and Recovery of Intelligent Mobile Phone Data
GAO Jian-hua;,LU En-ming;
..............
page:41-43
The Design and Validation of Short-Message Safely Communication Platform
JIN Guo-dong;,YU Qing-feng;,ZHU Zhi-yong;
..............
page:44-47
Computer Network Security Vulnerability Analysis and Preventive Measures
GUO Yi;,HUANG Jun-qiang;,SONG Chao-chen;,WANG Xi-zhong;
..............
page:48-50
Application of MD5 in Web Exploitation
LIU Xiao;
..............
page:51-54
A Comparative Analysis of Motivations for E-government Information Security Incidents
Chen Zhao;,Huang Shao-qing;,Liu Guo-wei;,Yue You-bao;
..............
page:55-57
Design of Fire Fighting and Rescue Mobile Command System
HOU Zhong-hui;
..............
page:58-61
yi liao xing ye yun wei an quan jie jue zhi dao qian xi
xi an jiao da jie pu wang luo ke ji you xian gong si ;
..............
page:62-63
qu shi ke ji 2014 nian gao duan cio feng hui zai jing zhao kai
..............
page:64-65
shan shi wang ke yu qu shi ke ji da cheng zhan lue he zuo
..............
page:66
an quan jiu shi gang xu
qu ding ;
..............
page:67
xin xi dong tai
..............
page:68