Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2012 Issue 7
Hash lock-based RFID SQL Injection Attack Defense Method
QIAN Kun;SUN Cheng-hong;SUN Rui;ZHANG Wei
..............
page:25-28
The Defense System Basing on API Interception Network
ZHENG Huan-xin;YE Xiao-ping
..............
page:29-31
A Method based on Cloud Data Exchange Security Technology Application
NIE Yuan-ming;GU Li-ping;ZHOU Ying-hong
..............
page:32-34,42
Packet Attack and Defense in Mobile Ad Hoc Network
HUANG Xin-yan;YI Ping
..............
page:35-39
Algorithm for Attribute Reduction based on Mutual-Information
CHEN Fan;LIN He;SHI Zhou;CUI Wei-nan
..............
page:40-42
Backdoor Detection for Java Language based On Static Analysis
WANG Yi-lan;GUO Song
..............
page:43-45
ETC System Security Certification Technical Analysis
ZHANG Bo-yang;SONG Jie;TIAN Yuan;GUO Xiang-yu
..............
page:46-48,51
Design and Implementation of Active Simulation for ATA5567 Card
JIN Hua;ZHAO Feng
..............
page:77-79,86
A Method based on Virtual Storage and PXE Remote Boot Combination of Laboratory Network Security Technology
WU Ye-hong;LU Wei-feng;DONG Ai-hua
..............
page:49-51
The IPv6 Security Technology Analysis
HAO Wen-jiang;WU Jie
..............
page:80-82
Analysis of Web Services Security Problem Caused by Frequent Information Leakage
LI Fu-juan
..............
page:83-86
Design and Implementation of Network Security Defense System Based on TCP/IP Protocol
ZHANG Hui
..............
page:52-54
Safety Study on Transmission Convergence Layer of GPON User Termination
DING Shu-wen
..............
page:55-57
Cloud Computing Security Risk and Protection Technology Frame Analysis
HU Chun-hui
..............
page:87-89
The Research and Improvement of Software Testing Methods
LIN Wei
..............
page:58-60,73
The Information Security Public Training Room Construction Research
HE Xiao-xia;XIANG Xu-zhen;HUANG Zhen;FAN Yi-sheng
..............
page:90-92
Study of Image Transmission based on Limited Bandwidth
CHEN Dong-ning;LI Jian-hua;JIAO Yan-ping
..............
page:61-63
Face Detection based on Skin Color
SHANG Xi-xi;XIU Chun-bo
..............
page:64-65,97
The Research of Disaster Tolerant Recover of the Virtualization System in the Colleges and Universities of Public Security
YU Er
..............
page:93-96
Research on Unified Identity Authentication Architecture based on Desktop Cloud
XIA Rong
..............
page:66-68
2012 nian 5 yue ji suan ji bing du yi qing fen xi
liu wei ; wang yong lun
..............
page:97
2012 nian 5 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan yan jiu sheng yuan guo jia ji suan ji wang luo ru qin fang fan zhong xin
..............
page:98,100
2012 nian 5 yue wang luo an quan jian ce shu ju fen xi
zhang hong
..............
page:99-100
The Application of Memory Audit in Police Information Security
HUANG Wei-min;LV Jun;ZHOU Bing-jiang;LIU Xue-feng
..............
page:69-70
nong ye bu ben ji xin xi an quan deng ji bao hu jian she zheng gai she ji yu shi shi
wang ping
..............
page:前插1
The Analysis and Solution of Threat for Removable Storage Media
YAN Yong;LI Suo-lei
..............
page:71-73
3G Brings New Challenges and Countermeasures to the Network Supervision Work
DING Hong-jun
..............
page:74-76
xin xi dong tai
..............
page:1-2,19,57,封3
Study on Security Protection System of E-government Extranet based on Security Domain
LI Shui-lin
..............
page:3-5
On M2M Technology and Its Security
REN Wei;MA Liang-li;YE Min
..............
page:6-9,28
Research Progress of Traffic Management System in High Speed Network
LIANG Yong;CHEN Zhen;SHI Xi;LI Jun
..............
page:10-15
Analysis of the Software Testing Platform: S2E
WANG Xue;LI Xue-xin;ZHOU Zhi-peng;YUAN Yao-wen
..............
page:16-19
Application and Research for EV SSL Certificate in Electronic Commerce Security and Credit Risk
CHEN Hong-song;LU Yi-fang;ZHANG Dong-yan;FU Zhong-chuan
..............
page:20-24