Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2011 Issue 12
A Study on Image Restoration Based on Stochastic Resonance in Bistable System
DING Wei-jie;ZHANG Qi-qian;CHEN Zhe-jian
..............
page:36-39
Study on Authentication Protocols for Wireless Sensor Network
CHEN Yu;WANG Jin-dong
..............
page:46-47,71
Video Surveillance System Problems and Solutions
SONG Tao
..............
page:76-79
Application of Fuzzy Comprehensive Evaluation Method for Uncertainty Evaluation of Electronic Evidence
LIU Zhi-jun;WANG Ning;MAI Yong-hao
..............
page:40-42,64
The Oracle Database SQL Injection Technology Research
CHEN Jin
..............
page:80-83
A Model of Intrusion Detection System Based on the Cloud Computing
ZHANG Hui
..............
page:69-71
Research on Security Framework for Personal Cloud Computing
ZHENG Yuan;JIANG Wei;JIANG Tian-fa
..............
page:72-75
Study on Computer Forensics on Windows Operation System
Maierdan Abula;Yasen Aizezi
..............
page:24-26
Researching on Anti-Occupying Channel by Setting NAV Twice
LI Lei;YI Ping
..............
page:31-35
Transparent Encryption Technology Research
ZHOU Dao-ming;QIAN Lu-feng;WANG Lu-lu
..............
page:54-56
A Proxy Signature Scheme Based on MPKC
LI Zhi-Xing;XU Chun-gen
..............
page:48-50
A Survey of Digital Signcryption
LI Fa-gen;ZHONG Di
..............
page:1-8
Computer Virus Analysis of 2011 November
LIU Wei;MENG Bin
..............
page:93
Design and Realization of the File Safe Transmission System Based on Ad Hoc Network
FENG Jian-chuan;YAN Cheng-hua;DU Yi-kun
..............
page:57-58,88
Information System Security Level Protection Review of Physical Security Assessment of Research
BAI Lu
..............
page:89-92
xin xi wang luo an quan za zhi zheng gao han
..............
page:封4
Forensic Analysis of Windows Deleted Files
ZHAO Zhi-yan;HUANG Shu-hua
..............
page:61-64
Research on the Security Authentication Protocol of Data Communication Based on EPC Internet of Things
WANG Qiong;SUN Rui-bing;WANG Liang-min;WAN Ke
..............
page:20-23
Research on Teaching Methods and Contents of Public Security Institutions “Network Security Technology” Course
XU Guo-tian
..............
page:17-19,26
Google Bigtable System Reliability Research
WEI Bing;YAO Min;SHEN Zhi-rong
..............
page:27-30,39
Ten Critical Vulnerabilities Analysis Report November 2011
..............
page:95-96
Based on the FUZZING Lead to a New Mining Method Based on Windows Kernel Vulnerability
YAO Hong-bo;YIN Liang;WEN Wei-ping
..............
page:9-16
Analysis of Smart Phone Security and Protection
ZHANG Ting;ZHANG Hui-ji
..............
page:65-68
Embedding and Security Test Based on Singular Value Decomposition on Video Watermark
JIANG Wei;YAN Hao;XIONG Xiang-guang;JIANG Tian-fa
..............
page:43-45
Method Based on Bayesian Networks for Wireless LAN Security Risk Assessment
ZHOU Shen-lin;MAO Jie
..............
page:59-60
The Research of Combination of Classified Protection and Critical Infrastructure Protection
QU Jie;ZHU Jian-ping
..............
page:84-88
Network Security Monitoring Data Analysis Report of 2011 October
WEN Sen-hao
..............
page:94,96
SQLI and XSS Security Vulnerabilities Research
YAN Hao;JIANG Wei;JIANG Tian-fa
..............
page:51-53