Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2012 Issue 5
The Capture of Conventional Intrusion
ZHU Feng;XIAO Li;GUO Kai
..............page:46-47
The Security Challenges of the Opportunistic IoT
GUO Bin;YU Zhi-wen;ZHANG Da-qing;WANG Zhu
..............page:68-69,77
A Kind of Embedded Radius Module Access Control Technology Research
DONG Jian-feng;ZHANG De;ZHAI Yin-chuan
..............page:39-42
Analysis and Application for NAF Encoding Methods
HUANG Shi-zhong;YANG Hong-guang
..............page:4-6,35
2012 nian 3 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan yan jiu sheng yuan guo jia ji suan ji wang luo ru qin fang fan zhong xin
..............page:98,100
Research on Key Technologies of Monitoring Public Opinions in Colleges based on the Web
WANG Cheng-ye;ZHANG Xiao-yu;XUE Qin
..............page:85-87
Virtualization System Security Research and Analysis
GAN Hong;PAN Dan
..............page:43-45
2012 nian 3 yue wang luo an quan jian ce shu ju fen xi
zhang hong
..............page:99-100
Intrusion Tolerant System and the Key Mechanisms
SU Zhong;LAI Jiang-rong;YU Bin;ZHAO Fei
..............page:78-80
Software Implementation of Digit Encryptions Module
LIU De-xiang
..............page:15-16,51
Research on the Legal System of Internet Public Opinion Monitoring
WEI Zhi-qiang;OUYANG Xu
..............page:81-84
xin xi dong tai
..............page:封2-封3,96
2012 nian 3 yue ji suan ji bing du yi qing fen xi
liu wei ; meng bin
..............page:97
Association Analysis of Typical Detection Points and Control Points in Host Security Detection
JIANG Yu;KONG Qing-yan;WANG Yi-nan;LI Jun;REN Jian
..............page:1-3,14
Research on Defend Against DDoS Attacks
CHI Shui-Ming;ZHOU Su-hang
..............page:27-31
AIX5.3/6.1 Heap Exploitation Mechanisms Analysis
LAO Wei
..............page:36-38,91
The Study of Mobile Phone Forensics Normalization
DING Hong-jun
..............page:88-91
Android System based on Mobile Phone Privacy Information Security Research and Implementation
ZHANG Jing-jing;YAN Xiao-wei;CAI Jian-shun;GUO Shu-guang
..............page:59-63