Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2012 Issue 9
hang tian xin xi lian xu liu nian chan lian zhong guo zhu ban shang shi gong si jia zhi bai ruan jian ye wu shou ru chi xu zeng chang
..............
page:F0002-F0002,1
A Hierarchical Network Security Situational Awareness Model Based on Information Fusion
zhang xin gang ; wang bao ping ; cheng xin dang
..............
page:72-74,49
An algorithrn for detecting struCture in complex networks based on clustering coefficient
wang xue kai ; ma ying hong
..............
page:53-55,46
The Research of Phishing means analysis and Prevention Countermeasures
yang ming
..............
page:22-24,7
Experience in the use. of dual-factor dynamic-password technique
guan xiao ming
..............
page:47-49
A One-hop Broadcasting Protocol for Vehicular Safety Message Dissemination
cao wen jing ; li wen qiang ; han qing tian ; xu sheng hong
..............
page:32-34
Research and Implement on the Innovative Teaching Mode of of Computer Networks
zhang xin gang ; wang bao ping
..............
page:67-69
The discussion of techniques on cross certification of digital certificate
zhang bo ; zhu zuo ; gao chi yang
..............
page:35-37
Blind Multiuser Detector Based on Variable Forgetting Factor RLS
hu li ; zhang li wei ; zhou xi yuan
..............
page:14-17
Discussion on The Campus Network Security and Safety Strategy
li chun qing
..............
page:64-66
On construction of network legalization
wang dai
..............
page:78-79
Vector method in wireless network application of the loation of counterfeit AP
zhang xue feng ; zhuo jian jun
..............
page:60-63
Design and Realization for Performance Testing Platform of Domestic Foundational Software Integration
chen lei ; gao chi yang
..............
page:50-52,77
The Reform of MCU teaching
he qiu yan ; du xiao jing
..............
page:70-71
Data Distribution approach for 3G Core Network Intrusion Detection
cheng mian ; tang yong ; su jin shu ; chen shu zuo
..............
page:18-21
Research of security policy for access layer of the campus network
shen ji nian ; li yi zhi ; xing xue mei
..............
page:29-31
Analysis of how the grass-roots forces the implementation of the paperless office
wang hong juan ; zuo hai yang
..............
page:44-46
xin wen ji zuo
..............
page:80-80
Analysis and Proving of the Security on Public Key Scheme Based on RO Model
huang zuo wang ; yuan ke ; yang ying jie
..............
page:11-13
Traceback Algorithm Based On Semantic Thought For E-Commerce Goods In Internet Of Things
zhang zuo zuo ; ge jing
..............
page:75-77
Building a Secure Information Network within the Modern Enterprise
yang yao ji
..............
page:38-39,59
The Research of Phishing means analysis and Prevention Countermeasures
peng jia rong
..............
page:4-7
Stability Analysis of Novel Delayed Projection Neural Networks for Quadratic Programming Problems
chen shan shan ; lou xu yang
..............
page:56-59
Shortcomings of Snoop protocol and algorithm improvement in wireless networks research
chen hai li
..............
page:25-28
Research and Realization of A Reliable IP Multicast Communication Middleware
li lei ; chen jing
..............
page:40-43
Wireless sensor network gateway design on multi-network convergence
sun peng ; sun li juan ; huang jun jie ; wang ru chuan ; huang hai ping
..............
page:8-10