Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2009 Issue 9
fang kong wang luo bing du gou jian an quan he xie de wang luo huan jing
zhang jian
..............
page:1
mu ma he jiang shi wang luo jian ce yu chu zhi ji zhi ji hu lian wang wang luo an quan xin xi tong bao shi shi ban fa jie du
gong ye he xin xi hua bu tong xin bao zhang ju
..............
page:4
ying dui bing du wei xie jian she guo jia ji wang luo an quan ying ji xiang ying zu zhi
yuan chun yang ; zhou yong lin ; ji yu chun ; xu yuan ; jiao xu lu
..............
page:5
wo guo xing fa xiu zheng an ( qi ) shi shi hou ji suan ji bing du de xing fa gui zhi
pi yong ; huang zuo
..............
page:9
"wen rou " xi lie mu ma an de fa lv fen xi
xiang hai long
..............
page:12
fan " jian die ruan jian " bing du li fa de bi jiao yan jiu
li jing
..............
page:13
ji suan ji bing du chan ye lian yan jiu
li cheng
..............
page:15
3g shi dai shou ji bing du de wei xie yu yi dong an quan
chen jian min
..............
page:19
shou ji lan ya wang luo zhong yi zhong ju you ke bian gan ran lv de sirqd bing du chuan bo mo xing
li chao zuo ; xia zuo ; zhang zuo yuan
..............
page:21
shou ji bing du ji ying dui ji shu tan jiu
luo hong wei
..............
page:24
windows rootkit bing du jin hua yu jian ce
hu yong tao ; kang xue bin ; li bai song
..............
page:27
Research on Negative Selection Algorithm in Computer Virus Artificial Immune
QIN Xiao-Qian
..............
page:30
shu ju lian lu ceng an quan yin huan ji wang luo bing du fang fan dui ce
li zuo juan
..............
page:34
bing du gong ji fen xi yu yu jing mo xing yan jiu
hao wen jiang
..............
page:38
Research of Detection and Defense Policy on DDoS Attack
SUN You-cang
..............
page:41
A New Anti-virus Network Security Analysis Model Based on Take-Grant Protection System
LI Yan;LIU Yi-lin
..............
page:43
A Comparison Study on Software and Hardware implementation of Packet Classification Using Snort Rules
XIE Wen-liang;YANG Chuang-xin;YUN Jun
..............
page:46
arp xie yi jian xi ji arp bing du gong ji de fang yu
yao xiao bing
..............
page:49
li yong pki/ca ren zheng bao zhang you jian an quan
jing xue lei ; jiang ya li
..............
page:51
mu ma dao hao an jian de zhen cha qu zheng
huang bu gen ; huang bao hua ; sun yan long
..............
page:53
wang ba ddos gong ji ying ji chu zhi fang an jie xi
jiang ying jun ; zhang shu zhi
..............
page:56
jin cheng guan li zai ji suan ji bing du zhen duan yu fang zhi zhong de zuo yong
li zhen shan
..............
page:58
ji yu " yun an quan " ji shu de jun dui xin xi wang luo fang du xi tong yan jiu
wang shui xiang ; xue lan yu ; liu yong
..............
page:61
qian xi fan bing du ji shu xian zhuang tiao zhan ji fa zhan qu shi
peng guo jun ; fu jian ming ; zhang huan guo
..............
page:64
gao wei ling ri lou dong chuang li shi xin gao
wang ming hua
..............
page:66
da zao an quan you xu de shang wang huan jing lian xiang wang yu utm pu jiao xing ye ying yong an li
bi xue yao
..............
page:67
an tian da gui mo wang luo an quan jie jue fang an
li bai song
..............
page:69
ding pu mu ma jian ce yu fen xi ping gu jie jue fang an
chen guang hui
..............
page:71
gao bie cha lou bu que , shi xian tong yi an quan guan li
wang yu shen zhou ke ji you xian gong si
..............
page:74
ji yu wang ye jie gou hua qing xiang de wang ye fen lei fang fa yan jiu
wan yue liang ; zhu he jun ; liu hong zhi
..............
page:76
mu ma bing du gong ji fang fan ji shu
li hai yan
..............
page:80