Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2014 Issue 11
Research and Design on Offensive and Defensive Feedback Defense Graph on Cloud Desktop
HUANG Ru;,LI Zhong-xian;,LUO Shou-shan;
..............
page:1-7
Authenticated Encryption Modes Based on Block Ciphers
CHEN Chang-song;,HU Hong-gang;,ZHANG Ping;
..............
page:8-17
Authentication and Image Spatial Encryption Based on Ergodic Matrix and Hybrid Key System
DUAN Yu-cong;,FENG Wen-long;,LI Yi-hong;,ZHOU Xiao-yi;
..............
page:18-25
An Information Hiding Method Based on BCH Coding
YAN Chao;,YU Ming;
..............
page:26-29
Research on Chinese Text Appraisive Classification in the Present Era of Big Data
WANG Jing-zhong;,ZENG Fan-feng;,ZHU Wan-shan;
..............
page:30-35
The Method of Classifying Network Public Opinion Text Based on Random Forest Algorithm
SHA Jing;,WU Jian;
..............
page:36-40
Multi-level File Operations Recording System Based on Minifilter Driver
LIU Liang;,QING Lin-bo;,ZHANG Chen-lei;,ZHOU An-min;
..............
page:41-45
Mechanism on Computer Access Permission Management Based on the Mobile Clients' Dynamic Password Algorithm
CHENG Jiu-jun;,LIAO Jing-xue;,YANG Yang;,ZHANG Qing-yang;
..............
page:46-51
The Design and Research of Rootkit Detection System Based on Windows API
GONG Zheng;,HUANG Geng-xing;,YUAN Yu-heng;
..............
page:52-58
Exploration and Practice of Using Typical Software Vulnerabilities Based on Windows
GUAN Tong;,REN Fu-li;,WEN Wei-ping;,ZHANG Hao;
..............
page:59-65
Research on SQL Injection Vulnerabilities Detection Technology Based on Proxy Mode
CUI Bao-jiang;,WEI Cun-tang;,ZHAO Jing-ling;
..............
page:66-69
Second-order SQL Injection Attack Defense Model
LI Xue-shuang;,TIAN Yu-jie;,ZHANG Hai-chuan;,ZHAO Ze-mao;
..............
page:70-73
Research and Implementation of Android Software Protection Based on SMC
LI Lin;,LIU Nian;,XU Jia-le;,ZHANG Xiao;
..............
page:74-78
Study on New Mathematical Difficult Problem and Application in Block Cipher
WANG Yong;
..............
page:79-82
The Practice and Consideration of Constructing Network Security Law Enforcement Technology Discipline for Provincial Public Security Colleges
JIN Hui-yun;,ZHANG Qi-qian;
..............
page:83-86
The Research of the Significance of the Information Theory Course for the Construction of Network Security and Law Enforcement Discipline
CHEN Min;,CUI Xue-min;,GUO Hong-Yi;,XU Ming;
..............
page:87-91
2014 nian 9 yue ji suan ji bing du yi qing fen xi
li dong ;, meng bin ;
..............
page:92-92
2014 nian 9 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan da xue guo jia ji suan ji wang luo ru qin fang fan zhong xin bei jing 100049;
..............
page:93-94
2014 nian 9 yue wang luo an quan jian ce shu ju fa bu
chen yang ;, dang xiang lei ;
..............
page:95-96
zhong guo mi ma xue hui mi ma xin pian zhuan ye wei yuan hui 2014 nian mi ma xin pian xue shu hui yi zai bei jing cheng gong ju ban
..............
page:97-97
di wu jie zhong guo ji suan ji xue hui fu wu ji suan xue shu hui yi zai jin zhao kai
..............
page:97-97
2014 zhong guo ji suan ji da hui zai zheng zhou long zhong kai mu
..............
page:97-97
2014 nian quan guo gong an yuan xiao wang luo an quan zhi fa ji shu xue ke zhuan ye jian she yu ren cai pei yang yan tao hui zai zhe jiang jing cha xue yuan zhao kai
..............
page:98-98
shang hai gong ye kong zhi xi tong xin xi an quan ji shu fu wu lian meng cheng li
..............
page:98-98
2014 zhong guo yun ji suan da shu ju an quan da hui zai zhong guo ke da zhao kai
..............
page:98-98
di wu jie zhong guo xin xi an quan fa lv da hui zai bei jing shun li ju xing
..............
page:99-99
zhong guo hu lian wang xie hui xu ni yun ying fu wu gong zuo wei yuan hui zai bei jing cheng li
..............
page:100-100
2014 wang kang ke ji he zuo huo ban da hui zuo shi zhou nian qing dian zai jing ju xing
..............
page:100-100
yi dong ke hu duan lou dong wei shou dao zhong shi
..............
page:100-100