Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2015 Issue 8
xin xi dong tai
..............page:10-15,59,71
wang luo an quan fa ( cao an ) chu tai yi yi zhong da
li xiao ;
..............page:16-19
ti sheng xin xi an quan bao zhang neng li de guan jian yao su
zhou cong ;, liu shi ;, jia lei lei ;
..............page:49-50
guan zhu an quan ling yu de zhi ku re xian xiang
yang chen ;
..............page:51-52
qian tan bao mi jian cha gong zuo de cheng xiao ti sheng
fu ru yi ;, zhang yan long ;, chen xu ;
..............page:53-55
iso27001 zai yin shua qi ye xin xi an quan guan li zhong de ying yong shi jian
zhao quan ting ;, wang lin ;
..............page:66-69
Suggestions for Classified Protection based on FedRAMP
JIANG Lei;,REN Wei-hong;,YUAN Jing;,ZHAO Tai;
..............page:73-77,81
Trusted Dynamic Logical Heterogeneity Technology
KANG Jian-ping;,LIU Shang-lin;,TAO Hong-tao;
..............page:78-81
Development of Domestic Computer Software and Hardware Technology
YAN Bin;,GU Hui-tao;
..............page:82-84,88
Security Architecture of Cloud Computing
YAN Lu-sheng;
..............page:85-88
Security Framework of Escort Management Information System Under New Security Situation
YIN Yi-hua;,WANG Si-liang;,ZHANG Wen-ke;
..............page:89-91,96
An Anomaly Detection System Applied to CAN Bus
ZHANG Zi-jian;,ZHANG Yue;,WANG Jian;
..............page:92-96