Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2012 Issue 1
Convergence in Safety Risk and Prevention Technology Research
HAO Wen-jiang;WU Jie
..............
page:5-9,13
Computer Virus Analysis of 2011 December
LIU Wei;MENG Bin
..............
page:85
Mobile Intelligent Terminal Security Threat Analysis and Protection Research
PENG Guo-jun;SHAO Yu-ru;ZHENG Yi
..............
page:58-63
zhong guo shi you tian ran qi ji tuan gong si quan mian kai zhan xin xi an quan deng ji bao hu gong zuo wei xin xi hua jian she bao jia hu hang
..............
page:83-84
The Research of the Data Protection and Control Platform for Information Security System
LIN Qing-shan
..............
page:80-82
Study of the Puzzles and Countermeasures of Digital Copyright Protection
WANG Yong
..............
page:1-4
Analysis and Deployment for the Honeypot-based Mail Capture System
LI Qiu-rui
..............
page:64-67
xin xi dong tai
..............
page:89-92
On the Basic Discussion of Wireless Network Security
REN Wei
..............
page:10-13
Network Security Monitoring Data Analysis Report of 2011 November
XU Yuan
..............
page:86,88
Research on the SIR-Model-based Data Falsification Attacks of Wireless Cognitive Sensor Networks in Smart Grids
LANG Wei-min;YANG De-peng;LI Hu-sheng
..............
page:14-16,28
A Survey on Detecting Techniques of Computer Security Vulnerability
SONG Chao-chen;HUANG Jun-qiang;Wang Da-meng;Duan Zhi-ming
..............
page:77-79
Detection of Phishing URL Based on Abnormal Feature
HUANG Hua-Jun;QIAN Liang;WANG Yao-Jun
..............
page:23-25,67
Dynamic Forensics Model based on Ontology and Context Information
JIA Bao-xian;XIE Sheng-xian
..............
page:68-70
Vision-based Password Authentication Things
DU Yi-kun;YAN Cheng-hua;FENG Jian-chuan
..............
page:26-28
The Principal Component Analysis in Network Traffic Anomaly Detection
ZHANG Xin-chao;DONG Jian-feng;ZHANG Jing
..............
page:29-31,35
Research of Network Traffic Anomaly Detection Technique Based on Histogram Clustering
LI Qiang;YAN Cheng-hua
..............
page:40-42,57
A Behavior Characteristic CAPTCHA
DU Kai-xuan;WANG Bin-jun
..............
page:32-35
Survey on Anonymous Credential Schemes
ZHANG Yan;ZHANG Li-wu
..............
page:17-22
Design and Implementation of HIP-based Network Firewall
ZHANG Fan;SHI Chen-jie;LU Xiu-qing;XU Zhuo
..............
page:53-57
Research of SSL Protocol DoS Attack and Defense Strategy
WANG Wei;WANG Hai
..............
page:50-52
Analyze of TCP Injection and Implement Method
ZHAO Wen-lu;ZHONG Guo-hui
..............
page:43-45
Study on the Manual Recovery Technology of Primary Partition Table in Electronic Forensics
CHEN Chao
..............
page:71-73,79
Realization and Optimization of Algorithm SM2 over GF(2m)
HUANG Shi-zhong
..............
page:36-39
The Analysis and Forensic of Thumbs.db
LIU Hao-yang
..............
page:74-76
SNMP Protocol Based on Network Topology Discovery Algorithm Analysis
LV Bin-bin;BAO Zhen-bin;ZHANG Ming-le
..............
page:46-49
Ten Critical Vulnerabilities Analysis Report December 2011
National Computer Networks Intrusion Protection Ce
..............
page:87-88