Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2011 Issue 11
Safety Protection and Management of the Internet of Things
LI Chao;LI Qiu-xiang;LI Chun-fang
..............
page:18-20
The Three-level Supervision and Control System for the Internet
WEI Zhi-qiang
..............
page:21-23,49
Research on the Legal Application Difficulties of the Crime of Jeopardizing Computer Information System Security
XIE Jie
..............
page:81-84
Method of Digital Image Scrambling Based on Extended Zig-zag Transformation
YANG Yu-qin;JIANG Tian-fa;LIU Gen
..............
page:57-58,67
Using IHO S63 Data Protection Schema in Electronic Chart Systems
ZHANG Yong;MO Hong-fei;LIU Yang
..............
page:42-45
The Development and Implementation of a Software for Remote Forensic Analysis
NIAN An-jun;YUAN Jin-sha;LI Zhong
..............
page:65-67
HTML 5 on Web Application Effect and Safety Problem Research
AN Jing;LIU Zhi
..............
page:78-80
Cloud Computing Forensics Technology
DING Qiu-feng;SUN Guo-zi
..............
page:36-38
The Application of BP Neural Network in Intrusion Detection System
XUE Qin
..............
page:68-69,90
The Using USB Devices Theft Files Case Evidence Appraisal and Analysis
LIU Zhi-jun;WANG Ning
..............
page:91-93
Source Code Vulnerability Detection Using Information Flow Analysis
SHI Zhi-wei;LI Xiao-jun
..............
page:75-77
Security Problems in the Next Generation Network and Their Solutions
XIE Feng;PENG Yong;CHEN Si-cong;JIN Hai-fei;LI Jian
..............
page:14-17
Ten Critical Vulnerabilities Analysis Report October 2011
zhong guo ke xue yuan yan jiu sheng yuan guo jia ji suan ji wang luo ru qin fang fan zhong xin
..............
page:99-100
Explore Xen Security Mechanism
MA Zhe;YU Xi;YUAN Ao;YI Xiao-lei;SHEN Qing-ni
..............
page:31-35
Research on the Transport Security of LTE-Advanced
LANG Wei-min;YANG De-peng
..............
page:5-7
Research of Password Recovery System For RAR Based on GPU
SHEN Xiao-hua;ZHOU Yong-hua;YANG Fan;LIU Yi-ning
..............
page:59-61
Urban Network Security Integrated Monitoring
SHU Shou-heng;LIU Wen-gang;ZHANG Jun-feng;WANG Guang-hui
..............
page:70-72,93
Computer Virus Analysis of 2011 October
LIU Wei;MENG Bin
..............
page:97
Network Security Monitoring Data Analysis Report of 2011 September
LI Jia
..............
page:98,100
Information Security Uantification Standard and Assessment System Research
DONG Jian-feng;ZHOU Jun;ZHAI Yin-chuan
..............
page:28-30
Research on the Digital Evidence in the Illegal Network Intrusion
LIU Jian-jun;HUANG Zheng
..............
page:87-90
Research of the Tort Liability of the Internet Service Providers
WANG Zhu;FANG Jie
..............
page:85-86
xin xi dong tai
..............
page:封4,前插1
The Research of Crypto Algorithm Recognition Technology
LI Ji-zhong;SHU Hui
..............
page:46-49
2010 nian quan guo xin xi wang luo an quan zhuang kuang yu ji suan ji ji yi dong zhong duan bing du yi qing diao cha fen xi bao gao
guo jia ji suan ji bing du ying ji chu li zhong xin
..............
page:94-96
Power Line Panoramic Image Feature Extraction Based on SURF Algorithm
GAO Hui-sheng;ZHANG Feng-long;WANG Qin
..............
page:39-41
Forensic of Physical Memory Windows-based System Design and Implementation
LI Bing-long;LU Yue
..............
page:50-53
A Brief Review of Provably Secure Public Key Cryptography
REN Wei
..............
page:1-4,13
Attack Manner Mining in the XSS Included in URL
ZHAO Xue-jie;TANG Yi
..............
page:62-64
The Research of File Recovery Method on EXT4 File System
XU Guo-tian
..............
page:54-56
Coding Model and Methods for Steganography
ZHANG Wei-ming;WANG Chao;CHENG Sen
..............
page:8-13
The Development and Implementation of a Software for Remote Forensic Analysis
ZHU Feng;LIU Jie;LI Jun
..............
page:73-74
Research on Control Strategy of Networking Management
HAO Wen-jiang;WU Jie
..............
page:24-27