Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2014 Issue 9
hu lian wang da hui di yi ci
ben kan bian ji bu ;
..............
page:1
Detecting Temporal Association Rules of Attack Activities based on Apriori Algorithm
Yin Qi-lei;Wu Ping-ping;Dept. of Computer Science;Sichuan University;
..............
page:2-7
ban quan sheng ming
..............
page:3
information network security and defense technology
lan ju long ; cheng dong nian ; liu wen fen ; hu yu xiang ; yu hong tao ; li yu feng ; chen yue ;
..............
page:7
Information Hiding Based on Windows Portable Executable
YANG Xiao-long;ZHAO Hui;Dept. of Computer Science;Sichuan University;
..............
page:8-12
A PSO Algorithm in the Application of the Sliding Mode Control
YI Zhi-wei;ZHANG Min;ZHANG Jun-yue;School of Information and Electrical Engineering;Hunan University of Science and Technology;
..............
page:13-16+20
Ant Colony Algorithm Applied to the Detection of the Virus
ZU Li-zhi;Nanjing University of Aeronautics and Astronautics information center;
..............
page:17-20
A Scheme based on Predicted Difference Expansion for Data Integrity of WSN
MA Hao-jie;YU Wen-ding;Dept. of Computer Science;Sichuan University;
..............
page:21-25
Design of Campus Security Management Pattern Based on ITIL——Taking the case of the Fourth Military Medical University
ZHANG Ying;NING Yu-wen;LIU Jian;SHEN Xia-juan;GAO Dong-huai;The fourth military medical university network center;
..............
page:26-31
Research on Wireless Lan for Wireless RFID Technology
YE Hui-Xian;Fujian Vocational College Of Agriculture;
..............
page:32-36
Information Security Risk Assessment of Cloud Computing
WANG Xi-zhong;MA Yao;Heilongjiang Province Electronic Information Products Supervision and Inspection Institute;
..............
page:37-40
web penetration testing with kali linux
Joseph Muniz Aamir Lakhani;
..............
page:40
Application Research of Network Security Policies based on ACL
WANG Tan;XU Ai-chao;GUO Xue-yi;ZHANG Ya-long;Taiyuan Satellite Lunch Center;
..............
page:41-44
Analysis on the security of next generation Internet based on IPv6
DING Wen-fei;SUN Hui-nan;XING Yan-chen;MA De-Zhong;Harbin Huade University;Harbin University of Science and Technology;
..............
page:45-48
Denial of Service Attack Smurf Related Characteristics of the Property
ZHENG Ji-gang;ZANG Jing-mei;Department of Mathmatic;Baoshan College;Library of Baoshan College;
..............
page:49-50
Design of a High Security Level Operating System
WANG Zhi-gang;No.92723 Troops of PLA;
..............
page:51-55
Enterprise Cloud Computing and Implementation Plan
MIAO Pei;JIA Dai-ping;SHI Hui;Department of Information Science and Technology;Shandong Normal University;Department of Computer Science and Technology;Shandong Institute of Business and Technology;
..............
page:56-58
Application of WLAN Technology in Campus Network
YANG Yun-tao;Yunnan Vocational and Technical College of Agriculture;
..............
page:59-63
jie pu gou jian quan xin yi ti hua yun an quan ti xi
..............
page:64-66
wu lian wang an quan huan you duo yuan ?
qu ding ;
..............
page:67
yan lun
..............
page:68