Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2015 Issue 4
xin xi an quan : shi xian guo jia neng yuan zhan lue rao bu kai de hua ti
qing zuo ;
..............
page:6-7
xin xi dong tai
..............
page:10-15,75-78
zai guo jia zong ti an quan guan he wang luo qiang guo zhan lue de da shi ye xia shu li hu lian wang an quan + de da si wei
qin an ;
..............
page:16-19
wang luo an quan lou dong fa lv wen ti yan jiu
zhang heng ;
..............
page:20-24
shang hai zhi hui cheng shi xin xi an quan bao zhang tan suo yu shi jian
liu shan quan ;
..............
page:25-28
ou meng wang luo kong jian an quan zheng ce fa gui ti xi yan jiu
lin li mei ;
..............
page:29-33
rang neng yuan xing ye pao zai an quan de xin xi hua gui dao shang
yang chen ;
..............
page:34-40
neng yuan xing ye gong kong xi tong xin xi an quan fen xi yu fang hu
zhang wu yi ;, li sheng quan ;
..............
page:41-44
dian li xin xi xi tong shu ju an quan fang hu
nie yuan ming ;, zhu wei guo ;, liu shi dong ;
..............
page:45-47
fa dian qi ye xin xi an quan bao zhang ren zhong dao yuan
wang chun ;
..............
page:48-49
neng yuan xin xi an quan ying ju an si wei ji chu she shi bi mian zhong ying qing ruan
zhu rui ;
..............
page:50-52
mei guo que bao neng yuan xing ye xin xi an quan de zhu yao ju cuo tan xi
zhou ji li ;, song wen ying ;
..............
page:53-58
cong hai kang wei shi shi jian kan an quan yi shi yu ze ren
lu bao hua ;, bi ning ;
..............
page:59
you jia wu hai zhan lian xiang dao wang luo an quan wen hua jian she
zhu rui ;
..............
page:60-61
xin xi an quan fu wu de gai nian yu fen lei
liu xiang ;, luo zuo ;, jiang lei ;
..............
page:62-65,69
da zhi yi yun shi dai ru he bao zhang wang luo shu ju an quan fang zhong guo gong cheng yuan yuan shi zuo he zuo
zhu rui ;
..............
page:66-69
che liang wang luo an quan kai fa ti xi yan jiu
wu yue ;
..............
page:71-74
Buffer Overflow Vulnerability Detection Technology based on Dynamic Instrumentation
LIU Lu-ping;,FANG Yong;,LIU Liang;,LONG Gang;
..............
page:80-82,87
Android Malicious Behavior Detection based on Reverse Engineering
LOU Yun-cheng;,SHI Yong;,XUE Zhi;
..............
page:83-87
Drive-by-Download Attack Deobfuscation based on AST
XIANG Jia-qi;,WANG Yi-jun;,XUE Zhi;
..............
page:88-92
Discussion on System Operation and Maintenance Security Audit in Banking Data Center
YUAN Hui-ping;,DONG Zhenliang;
..............
page:93-95,100
PublicOpinions Event Extraction based on Language Feature
JING Yue-cheng;,HUANG Zheng;
..............
page:96-100
Reliability Analysis of Intelligent Mobile Terminal System based on SFMEA/SFTA Method
XIE An-ming;,HU Chun-hui;,ZHANG Meng-yang;,HE Xin;
..............
page:101-104