Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2010 Issue 5
The Design and Realization of Clustering Algorithm Based on LACHS
Yang Yueting;Chen Xin;Niu Chunping
..............page:82-84
Buffer overflow security risks
Sun Wenhao
..............page:9-10
Array SSL VPN to protect the safety of Panyu Cable office network running
Ye Min;Zhou Xiaomei;Zhong Xun
..............page:71-72,61
Private Network Sharing Information on Public Network
Peng Xiaoli;Deng Xiaoqing
..............page:39-40
The research of Workflow System of PDM System Component-Based EJB
Feng Chuanxin;Gao Maoting
..............page:53-55
Container Throughput Forecasting Based on ExponentialSmoothing Method
Cheng Xueping;Lin Guolong
..............page:59-61
Research Of Key Pre-distribution Scheme For Wireless Sensor Networks
Yu Wangke;Ma Wenping
..............page:19-21
Research On Mobile Office Automatic Network and its Security
Yao Chunhui;Xie Haitao;Zhu Jiming;Xiao Jingchuan
..............page:22-24
The Research of Techniques for Dual-hosts Hot Standby in a Satellite Navigation System
Liu Xiaoping;Liu Li;Cao Jidong;Hu Xianghua;Huang Shuanglin;Hu Guangming
..............page:91-93
xin xi dong tai
..............page:封2,1
Network management in shipping companies
Xi Erchen
..............page:48-50
Study of Security Policy Based on P2RD Model in Office System
Tan Qiongling
..............page:43-44
Study On the LAN security and prevention
Jia Jinling
..............page:17-18
Enterprise Security Router Configuration
Huo Yanli
..............page:36-38
Design and implementation of web page tamper-proof system based on jetty components
Luo Hongfei;Meng Qingsheng;Xu Zhonggan
..............page:4-6
The Dsik File Transparent Encryption Technology
Li Weiguang;Guo Hui
..............page:45-47
Computer Network Security Technology and Development Trend
Zheng Lihua
..............page:7-8,27
OSPF on-demand in the circuit configuration on the research and application
Zhang Junhu;Hou Tiebing
..............page:68-70
Improved aggregation algorithm in multi-source detection system
Peng Guangjun;Yu Jiang;Chang Chun;Yang Zongbo
..............page:76-78
An improved method of humming music retrieval
Cheng Xiaoyan;Zhang Ming
..............page:85-87
Campus Network Export Traffic Management and Optimization Based on IP-layer
Wu Xingyong;Yang Yong;Huang Ronghua
..............page:94-96
Research of The Intrusion Detection Method Based On Clustering LS-SVM
Cheng Aihui;Gao Maoting
..............page:14-16
Login management and file protection of computer
Lai Zongli;Li Yaojie
..............page:31-33
Electronic Documents and its applications in E-Government
Yu Hongzhen;Zhou Dongchao
..............page:51-52,40
An instant-open type of electronic lottery issuing scheme
Sun Jianan
..............page:88-90,84