Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal on Communications
1000-436X
2004 Issue 7
Description logic SHIQ and automatic classification of Web resources
zuo zhi hong ; zhou ming tian
..............page:200-206
A new field in security of internet information and content--network information penetration detection technology
chen xun xun ; fang bin xing ; hu ming zeng ; li lei
..............page:185-191
A DDoS intrusion detection method based on likeness
he hui ; zhang hong li ; zhang wei zhe ; fang bin xing ; hu ming zeng ; chen lei
..............page:176-184
Behavior profile mining in intrusion detection system
wang li ping ; an na ; wu xiao nan ; fang ding yi
..............page:168-175
Research and implementation of performance optimizing of the network monitoring in broadband network
li xue ying ; liu bao xu ; chen yu ; xu zuo sheng
..............page:160-167
Research on the concealing technology of Trojan horses
zhang xin yu ; qing si han ; ma heng tai ; zhang zuo ; sun shu hua ; jiang jian chun
..............page:153-159
Design and implementation of network intrusion detection unit based on semi-polling driven
tian zhi hong ; fang bin xing ; zhang hong li
..............page:146-152
The survivability technique and its implementation case study
huang zun guo ; lu xi cheng ; hu hua ping
..............page:137-145
Hownet-based conceptual feature selection method
zhao lin ; hu tian ; huang zuo zuo ; wu li de
..............page:46-54
Research on disaster recovery technology based on data flow
yu xiang zhan ; yun xiao chun
..............page:37-45
Survey of network attack classification
liu xin ran
..............page:30-36
Research on intrusion detection techniques:a survey
qing si han ; jiang jian chun ; ma heng tai ; wen wei ping ; liu xue fei
..............page:19-29
Survey of information security risk assessment
feng deng guo ; zhang yang ; zhang yu qing
..............page:10-18
"5432 strategies":towards the national information assurance framework
wang na ; fang bin xing ; luo jian zhong ; liu yong
..............page:1-9
The performance of multiple-keyword pattern matching algorithms of information content security
zhang dong yan ; yin li hua ; hu ming zeng ; yun xiao chun ; zheng xiu rong
..............page:128-136
A digital watermark algorithm based on side-information
zhao chao kui ; yao hong xun ; liu shao hui
..............page:115-120
Research on privilege-escalating based vulnerability taxonomy with multidimensional quantitative attribute
zhang yong zuo ; yun xiao chun ; hu ming zeng
..............page:107-114
A novel algorithm for content-based image recognition and filtering
yang jin feng ; fu zhou yu ; tan tie niu ; hu wei ming
..............page:93-106
Self-organized hierarchical massive network intrusion detection system
he long tao ; fang bin xing ; yun xiao chun
..............page:86-92
Polarity text filtering based on semantic analysis
liu yong dan ; zeng hai quan ; li rong lu ; hu yun fa
..............page:78-85
Steganalysis of images created by quantizating wavelet transform coefficients
liu shao hui ; yao hong xun ; gao wen ; jiang feng
..............page:71-77
A new approach to forecasting Internet worms based on netlike association analysis
qing si han ; wen wei ping ; jiang jian chun ; ma heng tai ; liu xue fei
..............page:62-70
The key technique on the large-scale network topology measurement
zhang hong li ; fang bin xing ; he hui ; zhang yu ; bi hui
..............page:55-61