Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2013 Issue 9
Show the advantage of haze disasters with animation techniques
Xu Jiankang;Deng Jingxian
..............page:31-32
WEB data mining research applications in e-commerce
Liu Jinyong
..............page:25-26
Inquiry in Mode Reforming of Computer Teaching
Sun Lihao
..............page:24-25
Cloud computing security
Liu Pengfei
..............page:51,61
Research and Application on 100G + ROADM-based transmission technology
Wu Jianrong;Wu Wenhao;Chen Jianyi
..............page:18-19
Inhibition Of Computer Information Leakage Blocking Technology
Liu Lei;Lu Zhen Ting
..............page:20,19
Study of Video-based Face Tracking Techniques
Lu Manhui
..............page:13,23
Compressor expert diagnosis analysis system
Luo Qiao
..............page:9,4
DDoS Attack is Analysis and its Protective Measures
Chen Ming;Zhang Xiaoyong
..............page:14-15
The Application of Simple Object Access Protocol in Wireless Sensor Network
Zheng Miansheng;Zhan Xuefeng
..............page:40-41
Network deception and sniffer technology research
Wang Shuai
..............page:88-89
Research on System Architecture and Key Technologies of IOV
Tang Hongjie
..............page:42-43
The Strategy Of Automation Test In Agile
Yin Yu
..............page:44
Research for Data Disaster Tolerance
Liu Shuhe;Wang Fang
..............page:45-47
Research on shortwave network structure and technology
Zhang Huayu
..............page:49-50
Computer network security hidden danger and countermeasure
Cui Yangyang
..............page:112,73
Research of Integrated Platform for Social Security Monitoring Based on IOT
Peng Mingxi;Zhang Wenjiang
..............page:54-56
Research on shortwave network structure and technology
Zhang Huayu
..............page:94-95
Research of campus network security protection
Li Xu;Liang Wang
..............page:113-114
Research on security in network teaching informationization
Huang Yifan
..............page:102-103
Wireless network coding based encryption algorithm
Yu Zhen
..............page:100-101
Analysis of computer network security
Wang Jin
..............page:104,106
Implementation of Campus Network-Based simple Video Live System
YanLei;QiBing;Wang Zhongxiang
..............page:107-109
The construction of hospital information network
Luo Fei
..............page:97,99,101
Specification and sc enterprise Intranet security management
Huang Relian;Wang Yu
..............page:96
Application of NAS in Enterprises
Ma Shuaixing
..............page:10-11
Information On The Electronic File System Security Level System Of
Wu Binliang;Xiong Lu
..............page:98-99
Network Security Situation Awareness System Key Technologies
Feng Chuan
..............page:119-120
Application of Digital Signature in Network Communication Security
Zhou Lu;Zhang Leilei;Zheng Jian
..............page:111,109
xin xi dong tai
..............page:封2-封3,前插1
The wireless LAN Application in modem architecture
Wu Jun
..............page:62-63,81
Iot standardized assessment techniques and test specification development analysis
Liu Xue;Wang Wenbin;Wang Hangwei
..............page:69-70
Active Warning of the Campus Network Monitoring System Design and Implementation
Zhang Ge;Dai Yuechuan;Han Yuelong
..............page:72-73
Development of provable security
Zhang Manjun
..............page:70-71
Security and Protection of Internet
Du Tao
..............page:78-79