Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
China Information Security
1009-8054
2016 Issue 9
xin xi dong tai
..............
page:5,10-13,54
gong kong an quan shou yao cong zhe ting yu wu sheng , ming zhe jian yu wei xing
tang li ;
..............
page:7
zhuo yan gong ye kong zhi xi tong xin xi an quan jian she wei gong ye 4.0 bao jia hu hang
..............
page:14-18
quan li hu wei zhong guo gong ye wang luo an quan yi bu rong ci
..............
page:19
gong kong an quan zhi zhuan jia tan
..............
page:20-21
zhong guo gong ye ti xi xu yao xi tong hua de jiao yu pei yang ji zhi he chuang xin shi de an quan yun xing ji zhi
..............
page:22-23
zhen wang bing du xi ji yi lang he she shi
..............
page:24
de guo gang chang zao wang luo gong ji zao cheng ju da wu li po huai
..............
page:25
wu ke lan dian wang bei hei shi jian
..............
page:25
nei meng gu gong ye kong zhi xi tong xin xi an quan jian ce gong zuo zong shu
..............
page:26-30
hu lian wang shi dai , gong kong an quan ren zhong dao yuan zhuan fang nei meng gu zi zhi qu jing ji he xin xi hua wei yuan hui xin xi an quan xie diao chu liu ji zuo chu chang
chen zuo ;
..............
page:31-39
ji yu gu zhang shu fen qu de gong ye kong zhi xi tong an quan fang hu ji shu yan jiu
li wen ;, yao zhi xiong ;, wang wei ;
..............
page:40-43
ji yu wireless hart xie yi de gong ye wu xian tong xin ji shu an quan xing fen xi
zhang mei lan ;, cai xin yuan ;, wang xiao fei ;
..............
page:44-45
yi zhong dan du yun xing zai plc zhong de ru chong bing du yan jiu
fang qiang ;, xiang chun long ;
..............
page:46-47
zhu lao gong kong xi tong an quan wang an guo jia dui bu ru shi ming
..............
page:48
tian kong wei shi 2016 nian xin chan pin xin ji shu fa bu hui zai jing long zhong zhao kai
li jin ;
..............
page:50
2016 nian shou jie c3 an quan feng hui zuo zhong guo yun an quan feng hui zheng shi kai mu
chen sheng ;
..............
page:51
zhuan fang ruan jian yu fu wu zhong xin zong jing li liu dong
wu xiao zuo ;
..............
page:52
wang luo kong jian an quan chan ye bai pi shu ji long yu xi lie chan pin fa bu
liu zuo ;
..............
page:53
Security Situation of the Email System for Chinese Government Sectors
FAN Hua;,GAN Jie-fu;,KOU Chun-xiao;,LI Cheng-qing;
..............
page:55-58,62
Novel Digital Data Anti-Forensic Technology
DU Jia-ying;,CHEN Chang-song;
..............
page:59-62
Overview on Internet Academic Information Credibility Evaluation Behavior
ZHANG Xiang-yu;
..............
page:63-66
Non-intrusive Network Security Scanning Technology
WANG Chen-dong;,GUO Yuan-bo;,HUANG Wei;
..............
page:67-72,76
SpamApp Testing and Research based on Metadata
SI Shuai-shuai;,SHI Yong;,XUE Zhi;
..............
page:73-76
Activeand Non-Destructive Vulnerability Scanner for Industrial Control Systems
WANG Wei-jian;
..............
page:77-81
Designand Implementation of Intranet-Wide Printing Monitor based on Distributed System
TANG Wei;,TANG Wen-zhang;,ZHANG Xiao-bin;,LI Xin-lai;
..............
page:82-85
NDKCracking Technology on Android System
LIU Dong-hao;,SHI Yong;,XUE Zhi;
..............
page:86-89
Behavioral Analysis of College Student Users based on Weibo Data
ZHANG Hui;,LIU Cheng;
..............
page:90-96,101
MalwareDetection based on Frequency and Behavior Characteristics Vector of Opcode Sequence
XIU Yang;,LIU Jia-yong;
..............
page:97-101
ITOperation-and-Maintenance Audit Practice based on Petrochemical Information System
LIU Xiao-wen;,ZHANG Zhi-hai;,ZHANG Xiao-li;
..............
page:102-104