Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2014 Issue 12
xin xi dong tai
..............page:1,封2-封3
Research on Yi Language Web Information Acquisition Technology
Hu Gang;,Tang Xue;,Wang Jiamei;,Zhang Jianying;
..............page:6-8
Design and Realization of Remote Access Control System Based on SIM900A Module
Guan Shaohua;,He Wencai;,Liu Peihe;,Tian Chuanfeng;,Xue Han;,Yang Wei;
..............page:12-13
Learning Neural Network Application in Speech Recognition Deeply
Liu Yujun;,Xia Cong;
..............page:28,30
Experimental Study of Cloud Computing-Based Data Processing Platform
Li Li;,Liu Dan;,Sui Xin;
..............page:32-33
Detective MMTD Algorithms and Binary Watermark Image
Zhu Lizhi;
..............page:34,36
Study on SQL Server Database Performance Optimization
Chen Linlin;
..............page:37,39
Problems and Solutions Encountered Macro Applications
Wei Lishuang;
..............page:38-39
VLAN Technology Application in Campus Network Sharing
Guo Hongyi;
..............page:40,42
The Key Technology of Wireless Sensor Network Security
Tao Shihuai;
..............page:47-48
Study on Concurrent Programming Complexity of Internet
Gao Wei;,Zhang Xuehong;
..............page:49,51
Design of User Behavior Analysis System Based on DPI
Chen Sijie;,Jiang Hehua;,Shu Xinfeng;,Wang Jietai;
..............page:52,54
Research on Planar Multipath Routing Protocol in Wireless Sensor Network
Liu Zhitao;,Ren Jiyong;
..............page:53-54
Design of Jiujiang College Hospital Drug Management System Based on Campus Network
Chen Xueming;,Guo Li;,Xie Huicheng;
..............page:55,57
One-Way File Transmission System Based on UDP Protocol
Fang Lu;,Hu Yong;
..............page:56-57
IT Management Focused on Service-the ITSM
Jia Rui;,Zhang Ruijuan;
..............page:58,62
LAN Neighbors Work Principle and Usage Online Analysis
Lu Mingxing;
..............page:60,62
Analysis of the Application of Computer Remote Control
Liang Hongjie;,Ma Li;
..............page:63,66
Software Architecture Style and Its Application
Qi Jihong;
..............page:65-66
Design of College Office Automation Security System
Du Jun;,Ji Jun;,Yu Jingyu;
..............page:69,71
Construction and Application of Computer Local Area Network
Liu Guangjin;
..............page:70-71
Shallow Discussion on Router Application in Campus Network
Ma Shanghui;
..............page:73,75
Virtual Machine Software in Network Security Teaching
Wu Jianye;
..............page:77,79
Image Enhancement Technology in the Application of Security Monitor System
Li Mingzhen;,Luo Fugui;,Qin Yunchu;
..............page:78-79
Trust Model of Wireless Sensor Network Based on Indirect Trust Table
Liu Jianxue;,Tan MinSheng;,Wang Shu;,Zhou Huan;
..............page:82-83
The Design and Realization of an Encryption or Decryption System Based on the Newly-invented USB Key
Guan Shaohua;,He Wencai;,Liu Peihe;,Xue Han;
..............page:84-85,88
The Metrix Encoding Method for Security Codes
Pan Fei;,Shi Yun;,Tang Jie;,Wen Hong;,Xiang Da;
..............page:91-92
Research on CrackingJstegSteganography AgorithmBased on Chi-Square Statistic
Wang Ying;,Wang Yufang;,Xie Qingsong;,Yuan Quan;
..............page:95,98
Food Safety Intelligent Tracing Technical Difficulties and Solutions
Tan Chao;,Ye Yongjian;
..............page:96,98
Based on Oralce database SQL query optimization research
Liu Wenjing;
..............page:97-98
A Data Aggregation Scheme of ZigBee Wireless Sensor NetworksIn Cluster
Gong Deliang;,Li Yumin;,Lv Hong;
..............page:99-100,104
Analysis of the Application of Clustering in Data Mining
Zhang Jun;
..............page:101,104
Critical Technology and Applied Research Motion Analysis System
Guo Xiaowei;,Wang Gaohui;,Zhang Hongming;
..............page:102-104
A Novel Encoding Method of Security Codes Based on the Resilient Functions
Pan Fei;,Shi Yun;,Tang Jie;,Wen Hong;,Xiang Da;
..............page:106-107
Risk Management of Electronic Documents
Wu Xiaoyan;
..............page:108,110
Research on Multi-faceted Security Defense System of WEB Site
Wen Zhihua;,Zhou Xusheng;
..............page:115-116
Mobile Intelligent Terminal Detection Method Based on Event Overview
You Xiaodong;,Zhao Li;
..............page:118-119
PHP Webshell Real-Time Dynamic Detection
Du Haizhang;,Fang Yong;
..............page:120-121,125
Network Security Implementation of VPN Technology Strategy
Zheng Ruiyin;
..............page:122,125
The Safety Deployment Based on IIS Server
Qiao Xiaogang;
..............page:124-125
The Attacks and Defenses for Memcache's Injection
Fang Yong;,Wang Mingjun;
..............page:126,129
Computer Network Security Precautions
Qi BiXiang;
..............page:130,134
Analysis of Computer Network Management and Security
Wu Yetong;
..............page:131,134
Analysis of Computer Network Security Issues Under the Media
Su Guobing;
..............page:132,134
Problems and Countermeasures of Computer Information Security
Liu Pengyu;
..............page:133-134
Research on Security Architecture of Financial System
Zhao Xiaowei;
..............page:135-136,139
Analysis of Computer Network Security Technology
Lei Ming;,Yang Xuelin;
..............page:137,139
Information Security in the Big Data times
Ma Yanjun;,Zhang Yu;
..............page:140,144
Campus Network Security Reform Analyses Based on the Core Router
Gong Shaoqing;,Pei Chun;
..............page:141,144
Network Security Evaluation Methods
Wu Shang;
..............page:145,149
A Comparative Study of Network Storage Solution
Yang Yan;,zhou fang;
..............page:146,149
A Network Security System Based on UML Modeling Analysis Method
Gong Xiaoman;,Wei Binfeng;
..............page:147,149
Research on the Smart Grid Communication Security Technology
Zhu Wenhao;
..............page:150,152
Brief Analysis of Security in Wireless Sensor Networks
Su Hongjing;
..............page:151-152
Campus Network Settings Based on DCRS-7508
Li Jianguang;
..............page:153-154
Analysis of Network Illegal Behavior
Han Zhenglin;
..............page:155-156
Study on the Application of Dynamic Linked List in C Language
Tan Chao;,Ye Yongjian;
..............page:167,169
The Design of the Multimedia Teaching Service System
Guo Kuo;,Wu Lina;
..............page:173,175
To Explore Higher Vocational Computer Education Evaluation System and Methods
Zhang Shaoai;,Zhang Yunfei;
..............page:179,182
Effective ways and Means of Teaching Basic Computer Courses
Zhou Qiao;
..............page:181-182
Problems and Countermeasures of Computer Room Management
Du Jianxia;,Zhai Yufeng;
..............page:188-189
Technology and Management of Network Security
Li Gang;
..............page:190,192
Task-Driven Teaching Method in Vocational Computer Teaching
Cheng Rongrong;
..............page:193,195
The Application of Digital Signature in Electronic Commerce
Pan Lihong;
..............page:197-198
Research on Mathematical Method in Extraction Algorithms
Zhang Lin;
..............page:200-201
Research on Construction Category of Hospital Information Security System
Cao Lijun;,Tong Qingshan;
..............page:206,208
Based on Modern Mobile Library Service Under the Network Environment
Bo Zengru;,Shi Tao;
..............page:207-208
Application of PLC Technology in the Coal Mine Electromechanical Devices
Chao Lin;,Luo Xiaoni;,Tian Zhanjun;
..............page:209,211
Research on the Highway Communication Network Technology
Chen Ke;
..............page:213-214
Discussion on How to Improve the Reliability of Computer Networks
Guo Chunlu;,Lu Huadong;
..............page:215,218
Security Exploration on Big Data Applications
Lai Cuijun;
..............page:217-218
Research on Higher Vocational Colleges Teaching System Software
Liu Qiaojia;,Wei Ning;
..............page:219,222
Reform on Java Program Design Course Teaching
Bai Xiao;
..............page:221-222
Teaching Reform on Computer in Higher Vocational Colleges
Mao Junhong;
..............page:228,230
New Method Based on the Simulation of the Electric System Diagnostic Technique
Ai ChunYu;,Gong Lin;,Meng Xiangqiu;,Yu Jinzhao;
..............page:229-230
MOOC and Its Effects on Higher Education
Jiang Jing;,Xu Jinsong;,Yu Yonghong;,Zhao Weibin;
..............page:243,246