Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2010 Issue 1
Strategy for attack and repair of complex network
cui qiang ; tan min sheng ; wang jing
..............
page:35-37,34
SVG:Web digital Image standard application
zheng chen ; yang zuo
..............
page:61-63
Investigation of Comprehensive Defendable Policy based on UTM Network
liang hai jun
..............
page:21-23
A Overview of Harmful Information Discovery in Network
lin xiang yang
..............
page:32-34
si ke 2009 nian nian du an quan bao gao she jiao mei ti cheng wei wang luo fan zui zui xin chang suo
chen sai
..............
page:14,40
Analysis of network-video surveillance system based on Openh.323
deng zhong liang ; chen hai qun
..............
page:38-40
hu lian wang gei ji chu wang luo yun ying shang dai lai de bu shi ying
du yue jin
..............
page:6-7,20
Computer hardware,network security,support for the role of inquiry
feng guo ping
..............
page:47-48,66
Based on Two-step Backup Mechanism For Main Memory Database Recovery Method Research
liang zhi xing ; luo jun
..............
page:24-27
ddos dui dns de an quan tiao zhan
he kun
..............
page:8-9,27
Mining Abnormal Software User Based on Decision Tree
liu yu feng ; li xin you ; yuan ding rong
..............
page:55-58
2009 nian zhong guo hu lian wang nian hui zai jing zhao kai
..............
page:封2-1
An Lower Energy MAC Protocol For WSNs
tian hai tao ; tan min sheng ; chen wei
..............
page:74-77
Analysis and Implementation of DM Terminal Management Business
deng zhong liang ; ning cheng lin ; chen yuan zhi
..............
page:59-60,23
Study and application of WLAN based on SSL VPN technology
wu xian wen ; mao chun li ; liu zhi cheng ; xiao li quan
..............
page:64-66
Based on SNMP network abnormal phenomenon monitoring
shi ping ; lei wei lv
..............
page:41-43
shu guang zhu li da lian shi dian zi zheng wu wai wang jian she chuang xin xing shu ju zhong xin
ning lei
..............
page:10-11
e-Commerce security Attacks and preventive strategies
liang shi qing ; sun bo cheng
..............
page:15-17
ai di de ji tuan cloakware ju ban bai he an quan ji shu he ruan jian bao hu yan tao hui
..............
page:4
On the TDD-OFDM technology in the Fire Communication
xing xue chu ; sang ming hua
..............
page:67-69
Design of remote Disaster Tolerant System Based on the Architecture of B/S
zheng dao juan ; wang guo cai
..............
page:18-20
The Design And Its Implementation For 3G Mobile Video Monitor System Based On DaVinci Technology
zhang gui qing ; xiao hong xiang ; zhang ye mao
..............
page:52-54,46
The Research Of Network Information Security Laws
li zhen shan
..............
page:49-51,13
On the Design and Development of Campus Network in vocational colleges
zhang zhi feng
..............
page:78-79
Internet Security Systems unit in the classified application design
zhang huai
..............
page:72-73
zhong guo jin rong ren zheng zhong xin he 360 jie wei zhan lue he zuo huo ban
..............
page:5
Analysis of Network Security Defense Technology
song yi chang
..............
page:28-31
Based on USB-KEY Digital Copyright Protection System Analysis and Implementation
wang jing zhong ; li xiao ke
..............
page:44-46
bo xuan yue qu shi yong dang jia wei shi tong " zuo an " an quan jie ru wang guan tai yuan shi ke ji fu wu zhong xin ying yong an li
lei bing
..............
page:12-13
xin wen ji zuo
..............
page:80
Web Crawler by Filter resist
liu qing jie ; sun xu guang ; wang xiao ying
..............
page:70-71
nsfocus 2009 nian 12 yue zhi shi da an quan lou dong
..............
page:封3