Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2013 Issue 9
Analysis Botnet Behavior based on the Domain Name
WU Xi-hong;LIU Bao-xu;YANG Pei-an;College of Mathematics and Computer Science;Fuzhou University;Computing Center of Institute of High Energy Physics;Chinese Academy of Sciences;
..............page:10-13
Design and Implementation of a WLAN Communication System based on Face Recognition
SHENG Jia-lun;YAO Zhi-tong;WANG Yun-tao;FU Shao-jing;School of Computer;National University of Defense Technology;
..............page:68-72
A Mining System for Microblog Sensitive Information based on Distributed Computing
LI Sheng-long;SHI Qiao-xi;TANG Zhan-li;LIANG Gang;Software College of Sichuan University;
..............page:81-84
Design and Implementation of Stepping Stone Detection System based on Net-echo
SUN Yi;LIN Yang-dong;LIU Zhen;LU Xi-cheng;PLA Information Engineering University;
..............page:41-48
2013 nian 7 yue ji suan ji bing du yi qing fen xi
zhang rui ; li dong ;
..............page:97
Research on Key Issues of Privacy Protection System based on Behaviour
WANG Jian;YE Yan-ting;HU Feng-qi;TU Xiao-ying;College of Computer Science and Information;Guizhou University;
..............page:77-80
Design and Implementation of eID System based on Context Security Strategy
CHEN Jian;CHEN Ai-guo;WANG Zhi-qian;WANG Zhao-bo;University of Electronic Science and Technology of China;
..............page:30-34
Design and Implemantation of the Privacy Security Center for Internet Users
LOU Jia-peng;ZHANG Shu-tian;ZHANG Yi;SUN Lu;Beijing Electronic and Science Technology Institute;
..............page:35-40
Web Protection System based on Kernel Monitoring and Filtering Rules
ZHANG Xing-jie;CHI Yang;ZHU Qian;XU Jian;Northeastern University;
..............page:49-54
The Technology of Handwritten Signature Mobile Phone Identity Authentication based on Markov-BP Neural Network
ZHANG Zhi-wei;SUN Zi-wen;CONG Lin;ZHU Kai;School of Internet of Things Engineering;JiangNan University;
..............page:64-67
2013 nian 7 yue wang luo an quan jian ce shu ju fa bu
he shi ping ; zhu tian ;
..............page:99-100
Implementation of Covert Voice Communication System based on Fractal and Chaos under Android System
LI Ping;ZHAN Jia-wei;REN Wei;Department of Information Security;School of Computer Science;China University of Geosciences;
..............page:94-96
Evaluation System for Electronic Forensics
JIAO Na;CHEN Gong-long;LI Zhi-wei;ZHAO Shuai;Department of Information Science and Technology;East China University of Political Science and Law;
..............page:85-88
Surveillance Video Tamper Detection based on Energy of Regional Differences
YANG Jing;REN Yan-zhen;WANG Zhao-xiang;CUI Xiao-yu;Computer Department of Wuhan University;
..............page:55-59
Active Network Security Protection System based on Mobile Devices
WANG Xiao-nan;GAO Tian-jian;ZHOU Ying-hong;SU Hang;Air Force Engineering University;Changan University;Medical Information Center of No.302 Hospital of PLA;
..............page:89-93
A New Generation of Dynamic Password System based on Keystroke Pressure and RGB
LIU Xue-bin;WANG Bin-qian;ZENG Zi-zhen;TAN Da-wei;School of Electronic and Information Engineering of Beihang University;
..............page:73-76
Research for a DCT-based Blind Audio Steganography Algorithm
CHEN Hong-song;WANG Yu;YU Qian-yuan;TAN Min;School of Computer and Communication Engineering;University of Science and Technology;School of Computer and Communication Engineering;University of Science and Technologyg;School of Mathematics and Physics;University of Science and Technology;
..............page:60-63
Efficient Ciphertext Retrieval Protocol in Cloud Computing Environment
DUAN Gui-hua;JU Rui;WANG Yu-bin;LIU Yu;School of Information Science and Engineering;Central South University;
..............page:26-29
wang yu xing yun fa bu xia yi dai wang zha nggap
yang chen ;
..............page:48
Malicious Code Detection Platform based on Aggressive Behavior Tree
WEN Zhi-yuan;ZHAI Jian-hong;XU Jin-shan;OUYANG Jian-guo;Harbin Institute of Technology School of Software;Harbin Institute of Technology School of Computer Science;
..............page:22-25
Secure Protocols for Resolving Distributed System of Linear Equations
CHEN Li;LIN Bo-gang;College of Mathematics and Computer Science;Fuzhou University;
..............page:2-5
Efficient and Secure Outsourced Computation in a Multi-tenant Cloud
LIU Qiang;TANG Chuan-ming;HU Xing;ZHANG Yong-qiang;Guangdong Certificate Authority CO.;LTD;School of Mathematics and Information Science;Guangzhou University;Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes;Guangzhou University;
..............page:17-21
Research on Cloud Storage Ciphertext Retrieval Method
GUO Lu-lu;XU Chun-gen;Department of Applied Mathematics;Nanjing University of Science and Technology;
..............page:6-9
Research on the Data Falsification Attacks Games in Wireless Cognitive Sensor Network
LANG Wei-min;SU Ze-you;PLA Institute of National Defense Information;
..............page:14-16