Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2014 Issue 7
The design and implementation of college Internet application innovation platform
Chen Si;,Li Huafeng;,Shu Qianqian;,Tang Dongyang;,Tu Qinghua;
..............page:10-11
Its OTN network design problems
Chen Fenglian;,Liu Tao;
..............page:12-13
Study on Application of shuffled frog leaping algorithm
Gao jianxing;
..............page:28-29
On the Minimum Connected Communication Radius in Wireless Sensor Networks
Liu Sanyang;,Qiao Junfeng;
..............page:30-31,33
Inductive displacement sensor used in the design of circuit systemystem
Li Xingke;,Wang Hui;
..............page:35-36
The design and implementation of Micaps data monitoring system
Qin Yunlong;,Wang Yingying;,Xu Wei;,Yang Weifa;
..............page:37,40
The design and implementation of earthquake observation data transmission network in anhui province
Li Yingjie;,Sun Jing;,Wan Jie;,Wang Wei;
..............page:42,44
Wireless sensor network technology research
Peng Wei;
..............page:45,48
Computer technology in intelligent building applications
Rao Yanru;
..............page:46,48
The Error Correction of Three-axis Flux-gate Magnetometer Based on GATBX
Deng Ruihui;,Wu Wenfu;,Zhang Jin;,Zhao Yu;,Zou Pengyi;
..............page:50,52
Rearch on The Architecture of Enterprise Network Security
Yang Lian;
..............page:51-52
Computer level test architecture based on cloud
Lv Lixin;,Zhou Yaopeng;
..............page:53
Key points of power system maintenance
Liu Jiangtao;
..............page:54,56
A simple press release system design
Zhang Shu cai;
..............page:55-56
Smart home security system based on ZigBee is analysed
Zhang Wenhai;
..............page:57,59
The Technology research of Spam Filtering
Zhang Yonghua;
..............page:60,63
Computer network resource naming and addressing technology research
Gao Yunhua;,Jin Chuan;
..............page:64,68
Data stream similarity fast query synthesis algorithm
Guo Yan;,Zheng Guping;
..............page:70,72
wang luo shi yan de li qi -cisco packet tracer
zhang guo lin ;
..............page:73
The Theory and Application Prospect of Solid Oxide Fuel Cell(SOFC)
he pei;,li shiying;,liu mingzhe;,xiong chuanyun;
..............page:76-78
A compress sensing based fast Hybrid fractal coding algorithm
Peng Shunsheng;,Zhang Siping;,Zhao Li;
..............page:81-82
Analysis on the New Characteristics of Windows 8 OS Computer Forensics
Ding Dianmo;,Wu Kun;,Zhang Jinbo;
..............page:85-86
Grid and its application in the Campus Network Security
Li Qiujing;
..............page:93,95
Security analyses of a hyper-chaotic image encryption scheme
Lin Zhenrong;,Zhong Houqiao;
..............page:100-101
MATLAB graphics capabilities in the analysis of Experimental data
Chen Meiyi;,Hu Yaqi;,Liu Ming;
..............page:105-106
A new generation of weather radar transmitter fault diagnosis analysis
Wang Xueyuan;,Wu Pengfei;,Yuan Xiaoyan;
..............page:108-109
The design of E—commerce digital forensics model
Fan Qiang;,Tan Min;
..............page:110-111
Research on the encryption speed of DES_RSA and their hybrid algorithm
A Chao;,Wu Ming-hang;,Xu Xie;
..............page:117-119
Information security and network security relations
Chen Peng;
..............page:120,123
Network security status quo and countermeasures
Xu Xin;
..............page:122-123
Small and medium-sized enterprise network problems and Countermeasures
Wang Ruihai;,Xia Wei;
..............page:124,127
Delphi traffic control network information security system
Fang Yucheng;
..............page:125,127
Cloud computing platform security policy research
Wu Yue;
..............page:126-127
The database security and its preventive measures
Wu Haitao;,Zhang Xiaona;
..............page:128,131
4 G mobile terminal security threats and protection research under the network environment
Guo Qingrui;,Li Feng;,Li Mingxuan;,Li Yang;
..............page:129,131
Network security strategy in computer network teaching
Yuan Zhixin;
..............page:130-131
University campus network problems and strategy research
Wang Zhuying;
..............page:136,140
Safety situation and countermeasures of computer LAN network
Deng Gaofeng;,Li Yulong;
..............page:137,140
Analyses the ways and strategies to respond to cyber attacks
Feng Chengchun;
..............page:141,145
Common fault diagnosis and analysis in the network
Huang Liang;
..............page:142,145
Digital certificate application research of campus network
Wang Bing;
..............page:143,145
Campus network information security issues discussed in this paper
Wang Chunlei;,Wang Gang;
..............page:144-145
Under the background of big data mining personal information property right protection model research
Li Yihan;,Liu Detu;,Peng Zhirou;,Wang Zhu;
..............page:148-149
Using the boundary router to construct the network protection
Huang Hongjie;
..............page:150-151
The Data Fusion Program Based on Security in WSN
Li Li;,Zhou Yan;
..............page:156-157
Study on network security of intelligent mobile system
He Weiwen;
..............page:160-161
Information security analysis and practice of virtualization
Fu Xianshu;,Gan Xunde;
..............page:162,164
Virtualization technology and its security issues
Wen Sha;
..............page:165,170
Study on the RAP Based Wireless Denial of Service Attacks in IOT Applications
Liu Chibiao;,Liu Li;,Sun Lili;,Wu Meiyu;,You Chuiju;
..............page:166-170
The Analysis of Wireless LAN Security Mechanism
Yang Feng;
..............page:174,176
A search engine log analysis of network public opinion monitoring
Deng Shuangxiang;
..............page:177,179
University computer network security management
Xia Lei;
..............page:178-179
Computer network security and its prevention countermeasures
Cui Wei;,Tian Lu;
..............page:180,182
Wireless sensor network security problems and countermeasures
Chen Suiyang;,Li Yangyuan;,Zhang Weiwei;
..............page:183,185
The school computer network performance optimization
Huang Xinhua;
..............page:184-185
Security Solution of Cloud Computing
Hao Ting;,Jiang Chunjuan;,Zhou Yong;
..............page:186,188
Research on RFID security authentication based on IOT
Ou Jun;
..............page:187-188
The use of multiple knowledge base for the digital transformation
Sun Zhongqiang;
..............page:192,194
Introduction to desktop virtualization implementation of colleges and universities
He Junjian;,Huang Zhihong;
..............page:193-194
In the primary language of Multimedia Teaching
Ma Baojing;
..............page:195,197
The importance of hospital information network security
Zheng Li;
..............page:196-197
Digital library knowledge sharing strategy research
Chen Yang;
..............page:198,200
Study on the Construction of Computer Network Curriculum
Wang Yanfang;
..............page:201,203
Discussion and Practice on Teaching Army Information Security
Feng Fujun;,Li Min;,Li Xiaojun;
..............page:202-203
Multimedia use in math class teaching opportunity
Wang Lingfeng;
..............page:211-212
The design of the multimedia teaching system based on WEB
Feng Licheng;
..............page:214-215
B2C e-commerce existing problems and countermeasures
Gao Yan;
..............page:218-219
Improved C language teaching methods
Li Fenglin;,Tang Lei;
..............page:221,225
The computer network curriculum teaching reform
Li Gang;
..............page:224-225
Searching of teaching strategy for computer C language experimental University
Dai Hansong;,Shan Shuqian;,Tian Zhigang;,Zhang Jingfeng;
..............page:231,234
Research on information engineering risk management goals
Du Xiaoyu;,Man Qingxing;
..............page:245,248
Research on the construction of CNC technology professional digital resources
Lu Haogang;,Yao Guoxiang;
..............page:246,248