Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2012 Issue 7
Hash lock-based RFID SQL Injection Attack Defense Method
QIAN Kun;SUN Cheng-hong;SUN Rui;ZHANG Wei
..............page:25-28
The Defense System Basing on API Interception Network
ZHENG Huan-xin;YE Xiao-ping
..............page:29-31
A Method based on Cloud Data Exchange Security Technology Application
NIE Yuan-ming;GU Li-ping;ZHOU Ying-hong
..............page:32-34,42
Packet Attack and Defense in Mobile Ad Hoc Network
HUANG Xin-yan;YI Ping
..............page:35-39
Algorithm for Attribute Reduction based on Mutual-Information
CHEN Fan;LIN He;SHI Zhou;CUI Wei-nan
..............page:40-42
Backdoor Detection for Java Language based On Static Analysis
WANG Yi-lan;GUO Song
..............page:43-45
ETC System Security Certification Technical Analysis
ZHANG Bo-yang;SONG Jie;TIAN Yuan;GUO Xiang-yu
..............page:46-48,51
Design and Implementation of Active Simulation for ATA5567 Card
JIN Hua;ZHAO Feng
..............page:77-79,86
The IPv6 Security Technology Analysis
HAO Wen-jiang;WU Jie
..............page:80-82
The Research and Improvement of Software Testing Methods
LIN Wei
..............page:58-60,73
The Information Security Public Training Room Construction Research
HE Xiao-xia;XIANG Xu-zhen;HUANG Zhen;FAN Yi-sheng
..............page:90-92
Study of Image Transmission based on Limited Bandwidth
CHEN Dong-ning;LI Jian-hua;JIAO Yan-ping
..............page:61-63
Face Detection based on Skin Color
SHANG Xi-xi;XIU Chun-bo
..............page:64-65,97
2012 nian 5 yue ji suan ji bing du yi qing fen xi
liu wei ; wang yong lun
..............page:97
2012 nian 5 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan yan jiu sheng yuan guo jia ji suan ji wang luo ru qin fang fan zhong xin
..............page:98,100
2012 nian 5 yue wang luo an quan jian ce shu ju fen xi
zhang hong
..............page:99-100
The Application of Memory Audit in Police Information Security
HUANG Wei-min;LV Jun;ZHOU Bing-jiang;LIU Xue-feng
..............page:69-70
The Analysis and Solution of Threat for Removable Storage Media
YAN Yong;LI Suo-lei
..............page:71-73
xin xi dong tai
..............page:1-2,19,57,封3
On M2M Technology and Its Security
REN Wei;MA Liang-li;YE Min
..............page:6-9,28
Research Progress of Traffic Management System in High Speed Network
LIANG Yong;CHEN Zhen;SHI Xi;LI Jun
..............page:10-15
Analysis of the Software Testing Platform: S2E
WANG Xue;LI Xue-xin;ZHOU Zhi-peng;YUAN Yao-wen
..............page:16-19
Application and Research for EV SSL Certificate in Electronic Commerce Security and Credit Risk
CHEN Hong-song;LU Yi-fang;ZHANG Dong-yan;FU Zhong-chuan
..............page:20-24