Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
China Information Security
1009-8054
2007 Issue 2
Research on DDoS Defense Based on SYN Cookie
PEND Di;WANG Wensheng
..............page:125-127
The Research and Implementation of IDS Based on the Intelligent Agent
LU Wei;ZHANG Jie;ZHANG Peng
..............page:57-58
Analysis of Trojan using ARP spoofing
ZHANG Rong;XU Picheng
..............page:59-62
Audio Steganalysis Based on Principal Component Statistics
GAN Xinfu;GUO Li
..............page:63-64,67
Research On TCP reassembly in Snort IDS
DENG Zikuan;FAN MingYu;WANG Guangwei;ZHU dayong
..............page:65-67
Design of IC for High Speed Stream Cipher Algorithm
WANG Hui;WANG Hui
..............page:68-69
The study of automated fingerprint identification algorithm
LIU Fuyuan;WANG Ling
..............page:70-72
Dynamic SDR Multicast Key Management Scheme Research and Improvement
WANG Peng;HE Dake
..............page:128-129,133
Research of Insider Threat in Information System
ZHANG Yuanlin;KUANG Xinghua
..............page:130-133
A Kind of Distributed Micro-Firewall Architecture Oriented Spread Group Communication
ZHANG Yahui;ZHANG Yanyuan
..............page:134-136,139
Design and Implementation on IDSS-Based Network Emulation Attack Test System
ZHANG Wen;CAI Wandong;BAI Ruizhi
..............page:137-139
Mechanism of DoS Attack by ICMP's defect and its prevention
LI Yi;CHENG Ruiying
..............page:140-141,144
Flaws and Improvement of Wireless Local Area Network
ZENG Li li;SUN Zhenxing;ZHANG Guangcheng
..............page:142-144
Hierarchical Static Analysis Model
LI Qin;ZENG Fanping;WANG Limin
..............page:73-74,77
Automatic startup of Trojan horse based on IAT table
DENG Le;LI Xiaoyong
..............page:151-153
An Intrusion Detection System based on MANET
CHEN Qia;XUE Zhi;WANG Yijun
..............page:154-156
Dynamic Defense Security Model for Network Perimeter
CHEN Yulai;SHAN Rongsheng;BAI Yingcai
..............page:157-159
A Fast Low-power ASIC Implementation of AES Algorithm
ZHOU Liyang;ZHOU Yujie
..............page:160-162
Design and Realization of the High Availability System Framework Based on the Network Element
SHAO Sen;WANG Lifang;JIANG Zejun;ZHANG Yu
..............page:122-124
Design and Implementation of Removable Storage Device Monitoring System
WANG Li;CAI Wandong
..............page:119-121
Implementing XML-DSIG on Mustang
WANG Jiachang;GUO Jie
..............page:116-118,121
Reserrch based IPSec-NAT incompatibilities
RUAN Yilong
..............page:108-110
A Survey of the Research on Multimedia Data Encryption
XIE Jianquan
..............page:105-107
Security Analysis and Research on FreeBSD under SMM
WU Songqing;WANG Dianhong
..............page:100-102
Research on the Addressing of Web Service Based on WS-Addressing
DONG Wenwei;JIANG Zejun;WANG Lifang
..............page:98-99,102
The Reliability Application Study of Supervisory Circuits ADM706
JIA YuTao;ZHANG Jie;ZHAO Kai
..............page:93-94,97
Research and Implementation of operating system secure trusted chain
HU Zhongting;HAN Zhen
..............page:47-49
Analysis of security protocols and attacks in network
XU Mengming;XIAO Cong;TANG Liuhua;HUANG Jintao
..............page:50-51,54
National E-government Network will Wildly Spread
CUI Guangyao
..............page:15-17
Speech recognition technology in electronic ountermeasure applied analysis
SHI Jianfeng;CHANG Guodong;LI Zhigang
..............page:55-56
Vista: Disasters or Gospel
DAI Jie;LI Xue
..............page:5-8
Industry Events
..............page:3-4
Information Occasion When the Tunnel Collapses
CUI Guangyao
..............page:1
Attack and Defence on API HOOK Technology of Trojan Horse
KANG Zhiping;XIANG Hong;FU Li
..............page:145-148
Application Research of OLSR in Generalized AD-HOC Network
JIANG Qing;LI dashuang
..............page:149-150
The Algorithm of Handwritten Chinese Character Recognition Based on Multiple HMM
LIU Jian;LI Huifang;NIU Xinwei
..............page:75-77
Research on security control of information security model
YUAN Hao;YANG Xiaoyi
..............page:78-80
Build and Implement the Self-similar Model in Ethernet
LIU Ying;LI JianPing
..............page:81-82,85
DS Signal Detection in Non-cooperative Communication
YANG Minjun;QIU Ling
..............page:86-87
The Fingerprint Indentification Technology And The KEY
JIN XiaoGang;YANG Yuan
..............page:88-89,92
Technology Analysis and Model Improving of Digital Fingerprinting
CAO Junmei;ZHANG Zhen
..............page:90-92
Feature Selection for IDS Based on Priority
ZHENG Kangzhen;SUN Qiyuan;LU Wangjie
..............page:163-165
An ant colony algorithm based P2P network resource detection algorithm
ZHU Jun;PAN Li;LI Jianhua
..............page:166-168
The simulating of Quantum algorithm on a classical computer
ZHANG Dawei;ZHU Fuchen
..............page:169-171,174
A Watermark Algorithm for Relational Database
JU Minhua;WANG Yigang
..............page:172-174
Research and Design on a Network Security Communication Model
LI Peng;JIANG Zejun;WANG Lifang
..............page:175-177
Analysis and Research of the Short Messages Security on the Concept Space
ZHANG Yu;LI Shenghong;LIU Gongshen
..............page:178-180
WDM Driver Design Based on PCI Equipment
TANG Liuhua;DU Zhong;XIANG Hongquan;XU Mengming
..............page:41-43,46
CA: Do the Security Like Architects
BAI Jie
..............page:33
Year-end Inventory of the UTM
YU Jue
..............page:29-30
"Super Power" for Terminal Protection
HU Xiaohe
..............page:27-28