Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2011 Issue 1
Security Risks and Measures of Opening Computer Laboratory
Qin yi
..............
page:62-64
Campus Natwork Safety Analysis and Procation
Zhang Li
..............
page:51-54
A Method of Requirement Analysis for the Small and Medium-sized Software
Liai Juan;Ji Juan
..............
page:58-61
Asymmetric confidential transmission security gateway research
Wang Junmin
..............
page:21-24
The Application of Neural Notwork Model in Financial Risk Early Warning
Ji Juan
..............
page:48-50
cfca fa bu 2010 zhong guo dian zi yin xing diao cha bao gao
..............
page:7-8
Design of Group Server Status Monitoring System Based on SNMP
Wei Gang;Zhao Jie
..............
page:25-28
Design and Analysis of the Safety of Linux System Based on System call Replacing
Xing Liu
..............
page:35-36,76
GSN scheme in canpus notwork on the interaction with Firewalls and IDS
Liu Jing
..............
page:12-14
Virtual Private Network and Applications within the Enterprise Network
Hu Jing
..............
page:74-76
Construct a cloud framework safety monitoring warning plat form
Liu Peng;Wu Yangyan;Meng yan
..............
page:77-79
Research on gray Theory In Time series Forecast Model
Zhao Shiyang;Zhou Xinzhi
..............
page:65-67
The system of video conference management based on VC++.NET
Song dongmin;Wu Ruihui
..............
page:71-73
zhou yong lin zhong guo hu lian wang an quan xing shi yi ran yan jun
..............
page:封2-1
Research on garbage pages of agriculutre wobsites filting method
Zhang Xiaoyu;Wu Xiangqian;Zhang Pingyang
..............
page:55-57
Research on Key Magnagement schemes in wireless sensor networks
Liang Beniai;Jin Zhiping;Liang Zhibia
..............
page:15-17
Analysis of Windows Shortcuts Vulnerability
Zhang Wei;Li Ning;Yang Kang
..............
page:29-31
The Design of Fingerprint Authentication System
Zhang Ronglin
..............
page:40-43
The simulation study of Ad Hoc network supports multi-rate transmission communication
Chen Haili
..............
page:18-20
The Exploration of Solving Campus Network Security base on 802.1X rotocol
Tong Zifang;Li Yijie
..............
page:37-39
The Research on Network Intrusion Detection Method Based on RBF-HMM
Chen Xiaoli;Wen Zhicheng
..............
page:9-11
System of Files Protection Based on Filter Driver
Wang Chuan
..............
page:68-70
xin xi shi dai de " zhi hui jing wu "
qiao zhi
..............
page:4-6
Research and Implementation of AKA Authentication Processing in MS Network
Han Qingmian
..............
page:32-34
The studies of the solution for entity bean in MIS
Yan Baohua
..............
page:44-47
xin xi dong tai
..............
page:80