Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2015 Issue 9
Research on the Security of APP Android Security Dynamic Analysis Method for Average Users
JIA Tong-bin;,CAI Yang;,WANG Yue-wu;,GAO Neng;
..............page:1-5
Research on Web Intrusion Detection Module Based on Hybrid Framework
ZHANG Ming;,XU Bo-yi;,XU Fei;
..............page:6-9
A Ciphertext Search Scheme Based on DAS
SONG Yan;,ZHOU Qing;,ZHANG Guo-shuang;,WANG Xin;
..............page:10-14
Research on Abnormal Behavior Analysis of Modern Networking Security Architecture
SHANG Jin;,XIE Jun;,JIANG Dong-yi;,CHEN Huai-lin;
..............page:15-19
Formal Analysis of Tracking Attack for RFID Security Protocols
YANG Yuan-yuan;,LU Zhen;,GU Jian;
..............page:25-28
Research on Android Device Forensic
LIU Hao-yang;
..............page:29-32
Research on Virtual Network Construction and Scalability in Network Testbed
AN Cai-hong;,HAN Wei-hong;
..............page:33-36
Analysis of the Technique of Breaking TCP MD5 Encryption and Authentication for BGP
SUN Ze-min;,LU Tian-liang;,ZHOU Yang;
..............page:37-40
A Performance Analysis Method for Intrusion Prevention System
LIU Wei;,LI Quan-lin;,RUI Li;
..............page:46-49
Research on Network Situation Assessment Method Based on Fuzzy Rough Set
FAN Yuan;,LIU Zhi-le;,WANG Ji-wen;
..............page:58-61
Research on Android Malware Detection Technology
LI Wen-yang;
..............page:62-65
Research on Monitoring Mechanism and Model of Network Security Situation
LIU Peng;,CHEN Hou-wu;,FANG Xiao;,YANG Jian;
..............page:66-69
Research on Trusted Computing Device Virtualization Critical Assurance Mechanisms
HUANG Qiang;,ZHANG De-hua;,WANG Lun-wei;
..............page:70-73
The Criminal Law Regulation of the Rubbish Electronic Information
WU Xiu-chun;,QING Yong;
..............page:74-77
Research and Realization of Domestic Encryption System Based on GDOI
ZHUO Cai-hua;,LI Da-peng;,YUAN Kai-guo;
..............page:84-88
Review-attached Electronic Signing Scheme Following Autonomous Cryptographic Standards
ZHU Peng-fei;,LI Wei;,ZHANG Li-qin;,LIU Hai-yan;
..............page:93-96
Research on Trusted Identity Architecture in Cyberspace Based on eID
WANG Zhi-peng;,YANG Ming-hui;,LV Liang;
..............page:97-100
xu
yan ying ;
..............page:封2
Construction of Three-dimensional Framework of Youth Network Protection
HAO Wen-jiang;,LI Cui-cui;,XU Li-ping;,TIAN Fang;
..............page:109-112
Design and Implementation of Android Security Data Storage Platform
TIAN Wei;,GAO Neng;,WANG Ping-jian;,ZHANG Ling-chen;
..............page:113-118
Problems of User's Privacy Leakage During Insecure Communication
LU Tian-liang;,WANG Qiao;,LIU Ying-qing;
..............page:119-123
Design and Implementation of a Multi-cloud Based Browser Password Manager
li ding bo ;, xia lu ning ;, wang zhan ;
..............page:124-128
Research on SQL Injection Attack and Defense Technology
LIU Wen-sheng;,LE De-guang;,LIU Wei;
..............page:129-134
The Yoking-proofs Based Authentication Protocol for Wearable Devices in the Cloud Computing
LIU Zhan-bin;,LIU Hong;,CAO Xiao-fei;
..............page:135-138
Research on Emulator-Based Sandbox Systems
yu hang ;, liu li min ;, gao neng ;, li hong da ;
..............page:139-143
Research on Monitoring Abnormal Illegal Behavior Based on Business White List
SHI Bo;,WANG Hong-yan;,GUO Xu-dong;
..............page:144-148
The Application of Big Data Tools in Monitoring Network Attack
YU Shi-yuan;,CHENG San-jun;
..............page:149-153
Research on Image Recognition Technology for the Network Content Security
CUI Peng-fei;,QIU Yue;,SUN Rui;
..............page:154-157
Design of Trusted Messaging Solution for Mobile Terminal
LIANG Ying-sheng;,WANG Qiong-xiao;,MA Cun-qing;,WANG Li-ping;
..............page:158-162
A Study on Incremental Text Clustering in Sensitive Topic Detection
ZHANG Yue-jin;,DING Ding;
..............page:170-174
Research on Anti-Cyber Terrorism
WANG Yu-bin;,WU Wei;,CHENG Nan;
..............page:175-179
Analysis of E-mail Sample Correlation Based on Social Engineering
LIANG Hong;,ZHANG Hui-yun;,XIAO Xin-guang;
..............page:180-185
Two PUF-based Methods for Generation of Secure and Efifcient Random Numbers on DSP
li fei ;, liu zong bin ;, zhang qing long ;, lin zuo ;
..............page:186-190
Design of Software Deifned Intrusion Detection System in Cloud
ZHOU Yi-zhou;,WANG Bin;,XIE Xiao-quan;
..............page:191-195
A Quantitative Evaluation System and Calculation Method for Internet Public Opinion Inlfuence
LI Yi-qun;,YAN Ling;,LI Jun-feng;
..............page:196-200
A Secure Access Control Mechanism for Data Storage in Cloud Computing
ZHENG Zhou;,ZHANG Da-jun;,LI Yun-fa;
..............page:221-226
Research on ZooKeeper-based Data Synchronization in Distributed Environment
HE Hui-hong;,WANG Yong;,SHI Liang;
..............page:227-230
Research on Threat Traceback Method Based on IDS Alarms and Rootkit
XIA Kun-peng;,XIE Zheng-yong;,CUI Wei;
..............page:231-235
Research and Implement of Real-time Automatic Web Services Classiifcation System
HAN Wei-hong;,JIA Yan;,ZHENG Yi;
..............page:236-239
Design and Implementation of Android Vulnerability Database
YANG Gang;,WEN Tao;,ZHANG Yu-qing;
..............page:240-244
A Solution to Detecting Security Incidents in Police Network Based on the Big Data Technology
DAI Xiao-miao;,GUAN Lei;,HU Guang-jun;
..............page:245-248
Research on Security Policies of U.S Government Cloud
ZHANG Ru-hui;,GUO Chun-mei;,BI Xue-yao;
..............page:257-261
Research on Recovery Technology of ReiserFS Deleted File
SHEN Chang-da;,WU Shao-hua;,QIAN Jing-jie;,HE Guang-gao;
..............page:262-265
Secure Password Manager Based on Shadow DOM and Improved PBE
JIANG Guo-feng;,GAO Neng;,JIANG Wei-yu;
..............page:270-273
Research on BGP Preifx Classiifcation Based on Data Panel
YU Si-min;,LI Zhen;,XIONG Gang;
..............page:274-277
Research and Applicationon on Terminals Management Security System Based on Firmware
CHEN Xiao-chun;,SUN Liang;,ZHAO Li-na;
..............page:287-291
2015 nian 7 yue ji suan ji bing du yi qing fen xi
zhang yun zuo ;, liu wei ;
..............page:292
2015 nian 7 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan da xue guo jia ji suan ji wang luo ru qin fang fan zhong xin ;
..............page:293-294
2015 nian 7 yue wang luo an quan jian ce shu ju fa bu
he shi ping ;, liu zuo ;
..............page:295-296
wang yu dong tai
..............page:297-300