Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2014 Issue 6
Methods traces of Windows 7 USB device using survey-based and Implementation
Chen Huazhi;,Li Jing;,Sun Xin;
..............page:7-8
Research of Human Action Recognition Based on Monitoring System
Han Junhao;,Zhao Huaixun;
..............page:23-24,26
Mobile LTE new new idea far form a complete set of base station transmission scheme
Feng Qingxun;,Liu Yuansheng;
..............page:28-29
One Trusted Operating System Model Based on Virtual Machine
Dai Wen;,Lv Hanfei;
..............page:35-36
B/S based on Linux platform used in router video monitoring system
Huang Qiqing;,Sun Changfeng;,Zhang Yunhang;
..............page:41,43
The information query system based on B/S mode application in baihe forecast
Hong Weishan;,Huang Jun;,Luo Zhongwei;,Nie Zhenzhen;,Zhou Nianhua;
..............page:42-43
Study on the Key Technology of Data Security Protection in Cloud Storage
Chen Zhijie;,Huang Kun;,Wang Huimei;
..............page:44,46
Study on Server Push Technology of WebSocket
Li Xihui;,Yang Li;
..............page:45-46
The design and application of Putian lightning protection business management system
Lin Fa;,Lin Yongqiang;,Xu Ronghua;
..............page:47-48,50
Algorithm for detecting Internet worms
Zhu Lizhi;
..............page:54-55
Design and Implementation of Collaborative Plotting System Based on QT
Hao Ting;,Sui Yuan;,Xue Wen;
..............page:57-58
Multiple Sequence Similarity Analysis Based on Pattern Matching
Li Xihui;,Wang Ying;
..............page:59,61
The computer technology application in office automation
Luo Sheng;
..............page:65,67
Definition of Vague set distance
Gao Jingli;,Shi Yuqiang;,Zeng Xiangui;
..............page:66-67
The design of remote fault diagnosis system in computer
Tian Qingbo;,Zhang Dongfang;
..............page:68,70
Design and Implementation of Campus Network Security System Based on Honeypot
Cui Wei;,Liu Wei;,Xu Xiaoling;
..............page:71,73
The botnet traffic detection technology based on IRC protocol research
Cheng Jingjing;,Wu Yehong;,Xu Jian;
..............page:75-77
Be based on TCP/IP Design of topology generator agreement
Wang Xiuyan;
..............page:78,80
Secure Demarcation Method based on Rapid Information Configuration
Xu Guiming;,Zhao Shulin;
..............page:79-80
Shenzhou Electronic Seal Management System
Jiang Lei;
..............page:92,95
Algorithm in the program code similarity metrics
Yu Yandong;
..............page:93,95
Hospital Internet data safety monitoring technology
Zhang Peng;
..............page:101,103
Sequence of query optimization of multiple filtering algorithms
Liao Li;,Wu Shaojia;
..............page:104,109
Based on the e-government service innovation and construction of an APP
Chen Cheng;,Li Xueqi;,Wan Zhijinyun;,Xu Rui;
..............page:105-107,109
Research and Application on Sea Battle-field Integrated Situation System based on WebGIS
Hao Ting;,Jiang Chunjuan;,Li Ruyi;,Zhang Hongyu;
..............page:108-109
Research on Unified Authentication Scheme for WLAN and WCDMA
Luan Jie;,Zhang Xiaoping;
..............page:110-111
Reliability Technology for C4I System
Jiang Chunjuan;,Mao Jie;,Zhang Yao;,Zhou Yong;
..............page:115-116
An image encryption algorithm based on bit-plane
Zhang Xiaofei;,Zhong Houqiao;
..............page:117-118
4G network security analysis of wireless communication system
Huang Zongwei;
..............page:119,121
Computer network security analysis and research
Cai Youfang;
..............page:120-121
Computer lab network troubleshooting and prevention
Li Guangyong;
..............page:123-124
Computer network security precautions
Hu Jian;
..............page:125,127
The computer data recovery analysis
Guo Dinglong;
..............page:126-127
Computer network technology and the safety management of maintenance analysis
Wang Zhen;,Yang Junpeng;
..............page:129-130
Computer network security problem is analysed
Liu Xiaolong;
..............page:138,141
To ensure the safety of cloud storage data
Cai Jia;
..............page:143,145
Mobile payment technology security research
Huang Changhui;,Wang Haizhen;
..............page:147,149
Safety and optimization of broadband metropolitan area network
Qiu Caifeng;
..............page:148-149
Computer network security technology and prevention strategy
Liu Jianyu;
..............page:151,153
Brief analysis of the safe management of digital archive
Bu Fengju;,Liu Lin;
..............page:156-157
Communication network optimization and security is analysed
Chen Lu;,Wang Xudong;
..............page:158,161
Computer network security hazard and prevention research
Jia Wenhai;
..............page:159,161
Introduction to computer maintenance and defense the virus
Xia Huan;
..............page:162,164
Computer local area network security analysis
Dong Xiangmei;,Su Kui;,Zhang Yanchao;
..............page:163-164
A Study on the Timing to Guide Internet Public Opinion Based on SNA
Cui Xin;,Hu Yong;,Wu Shaohua;
..............page:167-168
Study on the protection of personal information security based on Cloud Computing
Wu Huiling;,Zhao Zhuo;
..............page:169-170,172
ARP Virus Prevention And Control Research In LAN
Yu Fu;
..............page:173,175
Network intrusion attack black industry chain analysis
Tang Xin;
..............page:174-175
"Java programming" course teaching mode of study
Han Lin;
..............page:177,180
The Characteristics of Network Crime
Han Zhenglin;
..............page:183-184
The application of multimedia technology in reading teaching
Ma Jinxia;
..............page:195,198
Training courses for students majoring in computer development
Xing Yajuan;
..............page:200,202
Explore the university computer room information management and maintenance
Wang Yafei;,Zhang Yingxian;
..............page:206,209
The Thinking of Quantitative Review for Scientific Research Project
Wang XiaoYu;,Zhao Ning;
..............page:218-219
China unicom mobile business management index system research
Han Dongxu;
..............page:220-221,224
Thinking about computer network application security problem
Wu Changsong;
..............page:225,229
Warehouse based on ERP information management research
Zhang Shaoling;
..............page:230,234
Computer data file security precautions
Li Benming;
..............page:232,234
On the construction of Xinjiang computer network detection system
Li Guanglei;,Sun Jing;
..............page:235,239
The application of the behavior oriented teaching in computer practice course
Cao Yujing;,Zhou Xuemei;
..............page:240,243
Instructional Analysis and Design of UML Course
Tang Hongjie;
..............page:241,243
Some thoughts on the level of protection under the new situation
Xiao Fugui;,You Jian;
..............page:246,248