Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2013 Issue 11
cheng li guo an wei an nei rang wai da zhan lue
ji suan ji an quan bian ji bu ;
..............
page:1
A Virtual Machine Backup and Recovery System based on ESXi
HU Xiao-qin;,TU Guo-yi;
..............
page:2-8
A Node Rescue Mechanism based Trust Model for Ad Hoc Networks
HAO Xu-Dong;,LIU Dao-Wei;,WANG Yong-Ming;,XUE Fei;
..............
page:9-13
Application of Cluster Algorithm in Network Intrusion Detection
HUANG Ning;
..............
page:14-18
Research of Netfilter/IPtables Firewall Frame based on Linux
JIANG Yi;,YAO Ya-feng;
..............
page:19-22
Analysis of Unified Identity Manager Service Model in Network
LIU Jian-hua;,SHI Pei-shan;
..............
page:23-26
Design and Implementation of a Malicious Programs Attack Trapping System in the Network Terminal
SUN Xin;,TANG Qiu-hang;
..............
page:27-35
The Design and Implementation of Attacks and Prevention which based on Manual of SQL Injection
MA Ting-ting;,WANG Cai-mei;
..............
page:36-41
A Design of Secure Network Architecture for Power Grid Operation Smart System
HU Jian-feng;,SU Yang;,WEN Bo-jian;
..............
page:42-46
A Method of Asynchronous Frequency-hopping Network Identification based on AIC
XIAO Chao;
..............
page:47-49
The Radiated Signal of the Computer Input Device for the Testing and Analysis of the Frequency Chart
JIANG Yun;,LIU Tai-kang;,ZHAO Lin;
..............
page:50-52
THE Development of a National Commercial Banks Offsite Disaster Recovery Network System
WU Yong-jia;
..............
page:53-57
Enterprise Data Center Planning and Design
ZHAO Zhi-qin;,ZHU Jin-wei;,ZHU Yong-hu;
..............
page:58-62
Application System Risk management Research of the Commercial Bank
JIANG Fan;,WANG Yan;
..............
page:63-67
The Symmetric Key Management System for Campus Card
ZHOU Jun;
..............
page:68-71
Web Website Integrated Monitoring and Management to Achieve the Security Goals
LIANG Ye-yu;,NING Jian-chuang;,XU Tan;,YANG Ming;
..............
page:72-78
Research and Application of IT Integrated Management and Monitoring Platform
ZHOU Wan-chun;
..............
page:79-83
Explore the Reasons for the Campus Network Broadcast Storm Formation and Processing Method
CUI Jian-guo;,NING Yong-xiang;
..............
page:84-88
The Thinking of Data Storage Optimization
QIN Jiong-cong;
..............
page:89-92
rsa an quan gai yao wei xia yi dai an quan gong zuo hui jiu lu xian tu
..............
page:93
hui pu tui chu xia yi dai fang huo qiang zhu qi ye ti sheng fang hu neng li
duan hong ;
..............
page:94-95
yun huan jing xia de an quan jian she
xi an jiao da jie pu wang luo ke ji you xian gong si ;
..............
page:96
qu shi ke ji yun an quan fang du ji shu zai nei meng gu dian li gong si de ying yong yu shi jian
..............
page:97
bo zuo shi me
qu ding ;
..............
page:98
xin xi dong tai
..............
page:99