Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network Security Technology & Application
1009-6833
2011 Issue 7
On the design of enterprise anti-virus program
wang yong xiang
..............
page:10-11,5
cfca lian he si shi jia shang ye yin xing gong tong da zao xing ye guan wang
xiao hui
..............
page:6-6
Study of Construction in Digital Library Disaster Recovery System
zheng jing hua ; zhou zhong yi
..............
page:57-59
Scientific Literacy Of Teachers Data Mining Best On FP-DMMFI Parallel Algorithm of matrix
xu ru
..............
page:50-53
Active Queue Management Algorithm Based on single neurons-Smith for networks with big time delay
li zuo ; miao zeng qiang ; zhou ling ; man gao hua
..............
page:47-49,35
Analyze to Network Bank Fraud Cases and Prevention
ji fang ; xue liang
..............
page:74-76
ou mei qi guo zhi fa bu men lian he po huo jia mao sha du ruan jian qi zha an
..............
page:80-80
MDA-supported modeling for PIM to arrival management module
li ying ying ; zhang jian ge
..............
page:65-67
Creating a Green and Healthy Network Environment for Military Students in a New Period
yang qiu tian
..............
page:60-61
dong ruan neteye shi wu zhou nian xi lie zhi dong ruan an quan yan yi
..............
page:F0003-F0003
ruan geng jie he geng an quan rui xing zhu li zheng qi fang du ti xi bei jing shi zheng wu wang fang bing du yu jing an li
..............
page:F0002-F0002,1
Research on Network Communication Based on Socket
ou jun ; wu qing xiu ; pei yun ; zhang hong
..............
page:19-21
Application Research and Implementation of OPC XML Technology in MES
dai xiao ping ; shi tong xing ; xie qi yu
..............
page:39-42
Small and medium enterprise VPN network planning and design
mu dong zhou ; yu ben cheng
..............
page:72-73
Adaptive intrusion detection model
wang xiao fen ; liu hui
..............
page:33-35
Research on IDS Alarms correlation Techniques
duan xiang zuo ; xiao feng tao
..............
page:36-38
Introduction of EtherNet flow Measuring
li zhi min ; zhao zhi guo ; hao li bo
..............
page:26-28
dong ruan neteye ji cheng an quan wang guan rong huo 2011 zhong guo ruan bo hui jin jiang
..............
page:80-80
gong xin bu zu zhi kai zhan 2011 nian du hu lian wang wang luo an quan ying ji yan lian
..............
page:80-80
guan zhu yi dong an quan xin tiao zhan dong ruan ba lian biao chang tan mei hao shi dai
li ming
..............
page:4-5
Campus network security threats and management strategies
peng jun
..............
page:62-64,21
quan qiu it an quan feng xian diao cha bao gao
..............
page:80-80
Expansion Application and Research of Authentication in Classified Network in Military Industry
li wei feng
..............
page:7-9
Adopt IKE Protocol to increase application of IPSec's security
zhang li
..............
page:12-14
Improved Divided Difference Filter
zhang wei hua ; chen mao shu ; liu zou ; wang guo dong
..............
page:15-18
A Role-Activity Based Access Control Model for Workflow System
huang tao ; jia tao ; zhang zhi yong
..............
page:22-25
Softswitch Network Security Analysis and Communication
chen chuan
..............
page:54-56
To Build a Small Web Server Base On Virtual Network Environment
wei yan xian ; li lin
..............
page:68-71
wang luo an quan ji shu yu ying yong lan mu jie shao
..............
page:F0004-F0004
Strategies of Digital Campus Construction Based on Core "SOA+cloud"
yang fang zuo ; liu fu yin ; zhang xiao ru
..............
page:77-79
wei bao zhang wang luo an quan zhong guo zu jian wang luo lan jun
..............
page:80-80
mei guo biao shi jiang ba gao ji bie hei ke gong ji shi wei zhan zheng xing wei
..............
page:80-80
The improvement about WEB performance testing tools AB
deng jing ; liao xiao ping
..............
page:43-46
A comprehensive evaluation for network security risk assessment based on the cloud model
zuo de ze
..............
page:29-32