Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2011 Issue 10
Bypass Technique Under the Environment of Network Security Risk Research
LIU Zhi;QIAN Lu-feng;LU Jing-tai
..............
page:32-33
Local Public Security Colleges Cyber Security and Law Enforcement Professional Construction of Translation
JIN Hui-yun
..............
page:78-79,82
A New Way of Internal Memory Information Leakage and its Solutions
SHI Jun
..............
page:38-40
The Online Auction for Privacy Protection
YOU Yong-xing
..............
page:73-74
Information Security Protection Program in Cloud Computing Era
LI Yan-bin;SUN Song-er
..............
page:17-18
National Public Health Data Center Security Construction Resear
DING Hong-bin;XIAO Ge-xin
..............
page:71-72,77
An Approach to Network Security Situation Awareness Based on Hidden Markov Model
ZHANG Yong;TAN Xiao-bin
..............
page:47-51
The Analysis of Actuality and Development of Third Party Payment
LIANG Wen-yu
..............
page:41-43
A Brief Analysis of the Transport Security Based on CMCC WLAN in the Public
ZHAO Hai-liang
..............
page:62-64
Google Web Security Testing Tools-Skipfish Source Code Analysis
ZHANG Wei;LIU Wen-qing;CHEN Xing-yi
..............
page:34-37
The Judicial Congnizance on the Assistant Action of Accepting Gambling Fees in the Online Gambling Crime
XIE Jie
..............
page:95-96
Computer Virus Analysis of 2011 September
LIU Wei;MENG Bin
..............
page:97-97
Cloud Computing Environment Simulation Computer Forensics
ZANG Jun;MAI Yong-hao
..............
page:7-9,12
Convergence of Information Security Under Supervision of Comparison and Reference
HAO Wenjiang;WU Jie
..............
page:21-24
The Security Transmission Solution Based on the CPK
YU Yong;MANG Chun-sheng;WANG Shou-wu;CAI Jian-shun
..............
page:60-61,64
Chaos Genetic Algorithm and its Applicationin in Optimization Problem
YANG Xiao-yong
..............
page:75-77
Cloud Computing and Cloud Security in the United States
ZHAO Yan-lin;LI Zhan-bao
..............
page:83-87
Ten Critical Vulnerabilities Analysis Report September 2011
zhong guo ke xue yuan yan jiu sheng yuan guo jia ji suan ji wang luo ru qin fang fan zhong xin
..............
page:99-100
The Development of Database File Recovery and Testing Software on EXT3 File System
XU Guo-tian
..............
page:44-46,70
Ensure That the Network Virtual Thoughts on the Social Harmony and Stability
WU Liang-yuan
..............
page:80-82
Process Hiding and Treating Strategy of Various Windows Trojan
FENG Tian-shu;XU Xue-dong
..............
page:52-55
Study of the Multiple Uncertainty of Information and its Application in Information Security
WANG Yong
..............
page:56-59
Review of the Path-based Algorithm on Network Reliability
GAO Hui-sheng;ZHAN Jing-yu;WANG Bo-ying
..............
page:28-31
Research on The Information Security Technology of Network Fusion
ZHANG You-yang;DONG Jian-feng;ZHANG Hong-Jun;MEI Yue
..............
page:25-27
Design and Implementation of Common Evaluating Model of DBMS Security
FANG Zhou;HUANG Jun-qiang
..............
page:91-93
Security Problems in the Internet of Things and Their Solutions
PENG Yong;XIE Feng;GUO Xiao-jing;SONG Dan-jie;LI Jian
..............
page:4-6
Enlightenment on the Experience of the Prevention and Control of the Cyber Offences and Crimes in Western Countries
ZHANG Lu-lu
..............
page:88-90
Network Security Monitoring Data Analysis Report of 2011 August
WANG Ying-kang
..............
page:98-98,100
xin xi dong tai
..............
page:40,87,94,封4,前插1
Cloud Computing Information Security Risk Research
NIE Yuan-ming;AN Jing;Wen Hui
..............
page:15-16
Research on the Spectrum Sensing Data Falsification (SSDF) Attack in the Cognitive Internet of Things(CIOT)
LANG Wei-min;YANG De-peng;LI Hu-sheng
..............
page:1-3
The Research on Security Mechanism for Wireless Shadow Networks
LI Li;DONG Jian-feng;JIA Lei-lei
..............
page:19-20
Study on Information Security based Cloud Computing Model
ZHENG Chang-xing
..............
page:13-14
An Analysis on the Security of Quantum Cryptography
LIU Xiao-fen
..............
page:68-70
The Software Design of Civil Aviation Weather Message Integrated Application System
CHEN Qi-ya;MI Chao
..............
page:65-67
Study on Applications and Security of Logistics Information System Based on Cloud Computing
YANG Jun;ZHOU Dao-ming;ZHANG Ming
..............
page:10-12