Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2013 Issue 7
fat32 wen jian xi tong ge shi hua hou xun zhi xi tong bian hua qing kuang de fen xi
ZhANG Dong;XU Qing;WANG Zhong-sheng
..............page:77-79
xin shi qi yi dong hu lian wang fan zui fen xi yu fang fan yan jiu
HUANG Bo 1;XING Chao-jun 2
..............page:85-87
conficker ru chong shi jian hui gu yu si kao
PU Shi;CHEN Zhou-guo;HAO Yao;HUANG Chen
..............page:82-84
dpapi li xian jie mi fang fa ji qi qu zheng ying yong
QIAN Jing-jie;LIN Yi-bin;CHEN Jiang-yong
..............page:39-43
wang luo yin bi tong dao de yan jiu yu shi xian
ZHANG Ran;YIN Yi-feng;HUANG Xin-peng;GAN Yong
..............page:44-46
ji yu jian yi mi xie jia gou de wei wen fan guo lv ji shu yan jiu
Munila TALIFU 1;Anniwaer JIAMALI 2;Yasen AIZEZI 2;Palidan TUERXUN 3
..............page:56-60
2013 nian 5 yue ji suan ji bing du yi qing fen xi
meng bin ; zhang rui ;
..............page:97
wu xian ren zhi chuan gan qi wang luo zhu yong hu mo ni gong ji bo zuo yan jiu
LANG Wei-min;ZHANG Guo-feng
..............page:20-23
ji yu wu lian wang de yun duan qu zheng mo shi yan jiu
LIN Qing-shan
..............page:61-64
ji yu dpi de shu ju nei rong an quan jian ce suan fa you hua yu shi xian
YAO Yong-feng 1;2;MEI Rui 1;MEI Yue 3
..............page:2-6
ji yu usb de yi dong shu ju cai ji xi tong jie kou ying yong yan jiu
SU Hong-qi;LI Yong-mei;XU Tian-ran
..............page:53-55
ji yu android ping tai de dai ma bao hu ji shu yan jiu
MEI Rui 1;WU Xue-li 2;WEN Wei-ping 1
..............page:10-15
yi zhong ji yu tpcm de men xian qun qian ming fang an
LIU Yi 1;2;GONG Bei 2
..............page:7-9
ji yu nosql ji shu de tong yi ren zheng xi tong de she ji
CUI Jing-jing
..............page:65-69
ji yu windows xi tong de ji suan ji kai ji qu zheng yan jiu
HU Xue-feng;YANG Liu;ZHOU Lei;ZHU Feng-chun
..............page:70-73
e yi duan lian jie qi pian de fang hu dui ce yan jiu
CHENG Yi-chen 1;2;HUANG Shu-hua 1
..............page:32-35
ji yu cu cao ji yu gai nian ge de ru qin jian ce mo xing yan jiu
WANG Yan-hua;FAN Han-bing
..............page:50-52
ji yu krawtchouk bu bian ju de ling shui yin suan fa yan jiu
HE Bing;SU Bian-ling
..............page:36-38
ji yu rbr he cbr de wang luo ru qin jian ce xi tong mo xing
CHENG Jin 1;2;YAN Cheng-hua 1;FAN Pan-xing 1
..............page:47-49
android shou ji yin si bao hu xi tong de she ji yu shi xian
LIN Jia-hua 1;REN Wei 1;JIA Lei-lei 2 School of Computer Information Security Systems;Wuhan Hubei;430074;China;2.Erpao Logistics Department;Beijing 100085;China)
..............page:16-19
ji yu shi jian ju he he guan lian fen xi ji shu de an quan guan li ping tai ying yong yan jiu
DAI Ming-xing;CHU Ying-guo;CHEN Zheng-kui
..............page:91-92
lun xin shi dai dian zi shu ju qu zheng
CHEN Bi-xiu;YANG Jia-yue;SHI Jian-zhen
..............page:93-96
2013 nian 5 yue wang luo an quan jian ce shu ju fa bu
xu na ; wang xiao qun ;
..............page:99-100