Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2012 Issue 9
A Hierarchical Network Security Situational Awareness Model Based on Information Fusion
zhang xin gang ; wang bao ping ; cheng xin dang
..............page:72-74,49
A One-hop Broadcasting Protocol for Vehicular Safety Message Dissemination
cao wen jing ; li wen qiang ; han qing tian ; xu sheng hong
..............page:32-34
Research and Implement on the Innovative Teaching Mode of of Computer Networks
zhang xin gang ; wang bao ping
..............page:67-69
The discussion of techniques on cross certification of digital certificate
zhang bo ; zhu zuo ; gao chi yang
..............page:35-37
Blind Multiuser Detector Based on Variable Forgetting Factor RLS
hu li ; zhang li wei ; zhou xi yuan
..............page:14-17
On construction of network legalization
wang dai
..............page:78-79
Vector method in wireless network application of the loation of counterfeit AP
zhang xue feng ; zhuo jian jun
..............page:60-63
The Reform of MCU teaching
he qiu yan ; du xiao jing
..............page:70-71
Data Distribution approach for 3G Core Network Intrusion Detection
cheng mian ; tang yong ; su jin shu ; chen shu zuo
..............page:18-21
Research of security policy for access layer of the campus network
shen ji nian ; li yi zhi ; xing xue mei
..............page:29-31
Analysis of how the grass-roots forces the implementation of the paperless office
wang hong juan ; zuo hai yang
..............page:44-46
xin wen ji zuo
..............page:80-80
Analysis and Proving of the Security on Public Key Scheme Based on RO Model
huang zuo wang ; yuan ke ; yang ying jie
..............page:11-13
Wireless sensor network gateway design on multi-network convergence
sun peng ; sun li juan ; huang jun jie ; wang ru chuan ; huang hai ping
..............page:8-10