Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2010 Issue 1
Strategy for attack and repair of complex network
cui qiang ; tan min sheng ; wang jing
..............page:35-37,34
SVG:Web digital Image standard application
zheng chen ; yang zuo
..............page:61-63
A Overview of Harmful Information Discovery in Network
lin xiang yang
..............page:32-34
Analysis of network-video surveillance system based on Openh.323
deng zhong liang ; chen hai qun
..............page:38-40
Computer hardware,network security,support for the role of inquiry
feng guo ping
..............page:47-48,66
ddos dui dns de an quan tiao zhan
he kun
..............page:8-9,27
Mining Abnormal Software User Based on Decision Tree
liu yu feng ; li xin you ; yuan ding rong
..............page:55-58
An Lower Energy MAC Protocol For WSNs
tian hai tao ; tan min sheng ; chen wei
..............page:74-77
Analysis and Implementation of DM Terminal Management Business
deng zhong liang ; ning cheng lin ; chen yuan zhi
..............page:59-60,23
Study and application of WLAN based on SSL VPN technology
wu xian wen ; mao chun li ; liu zhi cheng ; xiao li quan
..............page:64-66
Based on SNMP network abnormal phenomenon monitoring
shi ping ; lei wei lv
..............page:41-43
e-Commerce security Attacks and preventive strategies
liang shi qing ; sun bo cheng
..............page:15-17
On the TDD-OFDM technology in the Fire Communication
xing xue chu ; sang ming hua
..............page:67-69
Design of remote Disaster Tolerant System Based on the Architecture of B/S
zheng dao juan ; wang guo cai
..............page:18-20
The Design And Its Implementation For 3G Mobile Video Monitor System Based On DaVinci Technology
zhang gui qing ; xiao hong xiang ; zhang ye mao
..............page:52-54,46
The Research Of Network Information Security Laws
li zhen shan
..............page:49-51,13
Analysis of Network Security Defense Technology
song yi chang
..............page:28-31
Based on USB-KEY Digital Copyright Protection System Analysis and Implementation
wang jing zhong ; li xiao ke
..............page:44-46
xin wen ji zuo
..............page:80
Web Crawler by Filter resist
liu qing jie ; sun xu guang ; wang xiao ying
..............page:70-71