Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2011 Issue 11
Safety Protection and Management of the Internet of Things
LI Chao;LI Qiu-xiang;LI Chun-fang
..............page:18-20
The Three-level Supervision and Control System for the Internet
WEI Zhi-qiang
..............page:21-23,49
Method of Digital Image Scrambling Based on Extended Zig-zag Transformation
YANG Yu-qin;JIANG Tian-fa;LIU Gen
..............page:57-58,67
Using IHO S63 Data Protection Schema in Electronic Chart Systems
ZHANG Yong;MO Hong-fei;LIU Yang
..............page:42-45
The Development and Implementation of a Software for Remote Forensic Analysis
NIAN An-jun;YUAN Jin-sha;LI Zhong
..............page:65-67
HTML 5 on Web Application Effect and Safety Problem Research
AN Jing;LIU Zhi
..............page:78-80
Cloud Computing Forensics Technology
DING Qiu-feng;SUN Guo-zi
..............page:36-38
The Using USB Devices Theft Files Case Evidence Appraisal and Analysis
LIU Zhi-jun;WANG Ning
..............page:91-93
Source Code Vulnerability Detection Using Information Flow Analysis
SHI Zhi-wei;LI Xiao-jun
..............page:75-77
Security Problems in the Next Generation Network and Their Solutions
XIE Feng;PENG Yong;CHEN Si-cong;JIN Hai-fei;LI Jian
..............page:14-17
Ten Critical Vulnerabilities Analysis Report October 2011
zhong guo ke xue yuan yan jiu sheng yuan guo jia ji suan ji wang luo ru qin fang fan zhong xin
..............page:99-100
Explore Xen Security Mechanism
MA Zhe;YU Xi;YUAN Ao;YI Xiao-lei;SHEN Qing-ni
..............page:31-35
Research on the Transport Security of LTE-Advanced
LANG Wei-min;YANG De-peng
..............page:5-7
Research of Password Recovery System For RAR Based on GPU
SHEN Xiao-hua;ZHOU Yong-hua;YANG Fan;LIU Yi-ning
..............page:59-61
Urban Network Security Integrated Monitoring
SHU Shou-heng;LIU Wen-gang;ZHANG Jun-feng;WANG Guang-hui
..............page:70-72,93
Computer Virus Analysis of 2011 October
LIU Wei;MENG Bin
..............page:97
Information Security Uantification Standard and Assessment System Research
DONG Jian-feng;ZHOU Jun;ZHAI Yin-chuan
..............page:28-30
Research on the Digital Evidence in the Illegal Network Intrusion
LIU Jian-jun;HUANG Zheng
..............page:87-90
Research of the Tort Liability of the Internet Service Providers
WANG Zhu;FANG Jie
..............page:85-86
xin xi dong tai
..............page:封4,前插1
The Research of Crypto Algorithm Recognition Technology
LI Ji-zhong;SHU Hui
..............page:46-49
Power Line Panoramic Image Feature Extraction Based on SURF Algorithm
GAO Hui-sheng;ZHANG Feng-long;WANG Qin
..............page:39-41
Attack Manner Mining in the XSS Included in URL
ZHAO Xue-jie;TANG Yi
..............page:62-64
The Research of File Recovery Method on EXT4 File System
XU Guo-tian
..............page:54-56
Coding Model and Methods for Steganography
ZHANG Wei-ming;WANG Chao;CHENG Sen
..............page:8-13
Research on Control Strategy of Networking Management
HAO Wen-jiang;WU Jie
..............page:24-27