Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2012 Issue 1
Convergence in Safety Risk and Prevention Technology Research
HAO Wen-jiang;WU Jie
..............page:5-9,13
Computer Virus Analysis of 2011 December
LIU Wei;MENG Bin
..............page:85
Mobile Intelligent Terminal Security Threat Analysis and Protection Research
PENG Guo-jun;SHAO Yu-ru;ZHENG Yi
..............page:58-63
xin xi dong tai
..............page:89-92
On the Basic Discussion of Wireless Network Security
REN Wei
..............page:10-13
A Survey on Detecting Techniques of Computer Security Vulnerability
SONG Chao-chen;HUANG Jun-qiang;Wang Da-meng;Duan Zhi-ming
..............page:77-79
Detection of Phishing URL Based on Abnormal Feature
HUANG Hua-Jun;QIAN Liang;WANG Yao-Jun
..............page:23-25,67
Dynamic Forensics Model based on Ontology and Context Information
JIA Bao-xian;XIE Sheng-xian
..............page:68-70
Vision-based Password Authentication Things
DU Yi-kun;YAN Cheng-hua;FENG Jian-chuan
..............page:26-28
The Principal Component Analysis in Network Traffic Anomaly Detection
ZHANG Xin-chao;DONG Jian-feng;ZHANG Jing
..............page:29-31,35
A Behavior Characteristic CAPTCHA
DU Kai-xuan;WANG Bin-jun
..............page:32-35
Survey on Anonymous Credential Schemes
ZHANG Yan;ZHANG Li-wu
..............page:17-22
Design and Implementation of HIP-based Network Firewall
ZHANG Fan;SHI Chen-jie;LU Xiu-qing;XU Zhuo
..............page:53-57
Research of SSL Protocol DoS Attack and Defense Strategy
WANG Wei;WANG Hai
..............page:50-52
Analyze of TCP Injection and Implement Method
ZHAO Wen-lu;ZHONG Guo-hui
..............page:43-45
Realization and Optimization of Algorithm SM2 over GF(2m)
HUANG Shi-zhong
..............page:36-39
The Analysis and Forensic of Thumbs.db
LIU Hao-yang
..............page:74-76
SNMP Protocol Based on Network Topology Discovery Algorithm Analysis
LV Bin-bin;BAO Zhen-bin;ZHANG Ming-le
..............page:46-49
Ten Critical Vulnerabilities Analysis Report December 2011
National Computer Networks Intrusion Protection Ce
..............page:87-88