Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2011 Issue 5
A multi-function network monitoring and prevention design and implementation
..............
page:67-70
Application and Research of Web Log Mining
Hu Hongzhi;Wang Hua
..............
page:77-78
Campus Network Security Configuration Assessment Base on Network Security Situation Awareness
Zhuge Tao
..............
page:37-38,24
The Security Protection Mechanism Design of Application System
Li Xiao
..............
page:18-20
Spectrum Allocation Based on Auction Theory in WRAN
..............
page:44-47
Computational Soundness of Public Encryption in the Presence of Active Adversary
Wang Wentao
..............
page:28-30
dong tai fu za de wei xie xu yao shi shi wang luo an quan fang yu
..............
page:9
The Development of Broadband Network
Yang Wei
..............
page:4-5
"2011 fang xin an quan yong wang yin lian he xuan chuan nian " zai jing qi dong
..............
page:6
The Research of Hybrid Encryption in DNSSEC
Shan Kangkang;Jiang Xiaoqiang
..............
page:48-50
A Simple Analysis of the Administration and Maintenance of Higher Vocational Institutes Computer Laboratories
Cheng Huaping
..............
page:53-55
RFID System Security Research
Li Zhenshan
..............
page:61-63
Analysis and Reasearch of Digital Signature Technology
Yang Liguo;Ou Funa;Zhao Jing;Wu Shangqing
..............
page:64-66
The Analysis and Implementation of PKI Trust Model Based on LAN
Ji Xiaoyu;Xiao Feng
..............
page:25-27
The Study of Campus Network Security Based on IPv6 Protocol
Lu Jinjun
..............
page:34-36
xin xi dong tai
..............
page:79-80,封4
dong ruan an quan zhang men ren zhao zuo long : cong da guai de " yun " mo shi shuo kai qu
..............
page:8,12
Research of Using Thread Pool Technique
He Jie
..............
page:58-60
blue coat tui chu yun fu wu he wang luo an quan mo kuai
..............
page:7
Analysis of computer network security applications and preventive measures
Zhou Chunxia
..............
page:15-17
Study on Colonel Selection Principle of Immune Recognition Algorithm
Fu Hui
..............
page:51-52
Research on Technology of Cell Phone Forensic
Liu Yangyang
..............
page:31-33
Reflection on "ghost" system security
Zhang Jianwei
..............
page:56-57,20
Safety isolation under identification the and fine-grained access control
Liu Lina
..............
page:10-12
Design and Research of Autonomous Network System Trusted Protect
Liu Anzhan
..............
page:39-41
The Security Framework about the Internet of Things
Peng Chunyan
..............
page:13-14
Structure and application of VPN based on MPLS in e-government outer net
Zhang Zhangyong
..............
page:71-73
Detection of illegal AP campus WLAN
Zhong Jiuzhou
..............
page:42-43,70
Research on Standardization of Information Security Incident Based on IDMEF
Tang Xianyan;Zhu Xinghui;Sheng Lixin;Chen Xiaozhen;Cheng Jieren
..............
page:21-24
Research and Implementation of Uniform Identity Authentication based on SOA
Liu Richu;Jiang Rong;Zhang Yihao
..............
page:74-76