Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2014 Issue 2
A Multi-Level & Inter-Domain Access Control Administrative Model
DAI Xiang-dong;,LIU Jiang;,WANG Yi-gong;,ZHANG Hong-qi;
..............page:1-6
High-Speed Intelligent Internet Intrusion Defense System based on Deep Learning and NetFPGA
DENG Hao-wen;,LI Yi-ying;,LONG Jun;,WANG Si-qi;
..............page:12-19
The Design and Implementation of Suspicious Sample Collection System based on Windows Kernel Driver
JIAO Ying-nan;,LU Li-jie;,WEN Wei-ping;,ZHANG Tao;
..............page:41-47
Common Source Code Vulnerability Analysis and Research
WANG Huo-jian;,XU Yu;,ZHU Sheng-cai;
..............page:48-52
An Optimal Design to Lighten the Agreement of Bidirectional Identiifcation on RFID
SHEN Heng-feng;,SHI Li-zhe;,XIA Ge-ming;,ZHOU Wen;
..............page:58-62
Data Security Storage Solutions for Public Cloud Platform based on Trusted Third
JIN Xin;,LI Ning-bin;,WANG Wei;,WU Yu-xiang;
..............page:68-74
The Comparative Study of Methods on Spam Filtering
XU Yan;,ZHAO Xiao-dan;
..............page:75-80
Research and Realization of Crawling System for QVOD Resources
LI Wei;,WANG Wen-xian;
..............page:81-85
2013 nian 12 yue ji suan ji bing du yi qing fen xi
liu yang ;, meng bin ;
..............page:86-86
2013 nian 12 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan da xue guo jia ji suan ji wang luo ru qin fang fan zhong xin bei jing 100049;
..............page:87-87,89
2013 nian 12 yue wang luo an quan jian ce shu ju fa bu
xu na ;, zhu zuo zuo ;
..............page:88-89
dian zi zheng wu xin xi xi tong an quan xing fen xi bao gao
hang zhou an heng xin xi ji shu you xian gong si zhe jiang hang zhou 310051;
..............page:90-91
zhong ke yuan fa bu cao zuo xi tong cos
..............page:93-93