Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2013 Issue 1
xin xi dong tai
..............page:80,封2,1
The Research of Host Security Based on Level Protection
Wang Keming;Feng Fanghui
..............page:17-19
Virtual Community Tacit Knowledge Sharing on Game Research
Xia Kun;Qiao Hong
..............page:36-39
Based on the MSF flat memory password cracking new ideas
Yao Yizhan;Chen Li;Wang Yu;Tian Yongxing
..............page:20-22
The Technology Research of dynamic Target moving data management
Xu Guiming;Sun Wenjun
..............page:65-67,55
Application of Association rules mining in emergency management system
Yue Jie;Xiao You;Tan Lu
..............page:56-58
Research and Design of Information Collection and Alarming System
Yin Xiaotian;Xu Guoxing
..............page:14-16,13
The Classification Mining Based on Hierarchical Clustering
Zhan Yucai;Liu Xiyu
..............page:54-55
Modulation Classification Algorithm Based on Adaptive MCMC
Jin Xiaoyan;Zhou Xiyuan
..............page:46-49,39
Based on Behavior Detection of Illegal VOIP Explore Research
Wang peng
..............page:71-72,79
Active Cooperation Defense System Based on Honeynet Technology
Li Shengliang;Wang Chenghua
..............page:7-9
Detecting method and data processing in the engineering applications of the pulse system GPA
Wang Guoyong;Zhang Yanqing;Liang Kan;Li Shangyu;Yu Yueshen
..............page:73-75,45
Researches on Security of the Internet Banking System
Liu Yajun
..............page:26-27,25
Discussion on SQL injection attack and defense
Pan Haoliang;Wang Guangyi;Lu Xinhua
..............page:31-32,30
Security Issues in SaaS Environment
Jiao Yanting;Sun Xinzhao
..............page:10-13