Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2014 Issue 12
Research on Cloud WAF Systems
bi sheng jie ;, li ming ;, wang hao ;, wang li le ;
..............page:1-6
The Research on Trusted Software Watermarking Based on Machine Fingerprint
WANG Liu-cheng;,WANG Wei;,ZHANG Yi;,ZHU Jian-wei;
..............page:7-11
A Homomorphic Encryption Scheme on Online DBMS with Multilevel Secure Mechanism
bai shu jun ;, li bin ;, song huai gang ;
..............page:12-15
Automatic Identiifcation for Abnormal HTTP Behavior Based upon RBF Neural Network
WANG Jing-zhong;,XU You-qiang;
..............page:16-20
Dynamic Analysis Scheme of Android Malware Based on Sandbox
hu long ;, qin zhi guang ;, xiong hu ;, zhao yang ;
..............page:21-26
Research and Implementation of Micro-blog Keyword Extraction Method Based on Clustering
li ai ping ;, li shu dong ;, sun xing dong ;
..............page:27-31
A Public Opinion Monitoring System Based on Big Data Technology
CAO Bin;,CHEN Zhen;,GU Yi-li;,XIE Zhen-zhen;
..............page:32-36
Study and Application of Network Security Situation Based on Ant Intelligence
LI Lin;,LIU Nian;,XU Jia-le;,ZHANG Xiao;
..............page:37-42
A Method to Defend Intrusion from Hypercall of Xen
CHEN Xing-shu;,LI Hui;,WANG Wen-xian;,ZHANG Lei;
..............page:43-46
Software Design of EXT3 File Operation Trace Extraction
xu guo tian ;
..............page:47-50
A Novel AOA Clustering-based Localization Algorithm with High Accuracy
HUANG Hai;,HUANG Qi;,XIE Dong-qing;
..............page:51-55
The Method of KPI Classiifcation of Mobile Communication Network
li hui zhi ;, yuan chao wei ;
..............page:56-60
Research and Implement on Dynamic Access Control Model Based on User’s Behavior in SaaS
gao fei ;, guo fei ;, zhang hua ;
..............page:71-75
The Research on Vulnerability Mitigation in Memory
HE Ying-rui;,SHI Ji;,WEN Wei-ping;,ZHANG Tao;
..............page:76-82
Assets Recognition and Importance Assessment Based on Information Flow
jiang fan ;, wei feng ;
..............page:83-87
2014 nian 10 yue ji suan ji bing du yi qing fen xi
li dong ;, meng bin ;
..............page:88-88
2014 nian 10 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan da xue guo jia ji suan ji wang luo ru qin fang fan zhong xin bei jing 100049;
..............page:89-90
2014 nian 10 yue wang luo an quan jian ce shu ju fa bu
li shi zuo ;, yan han bing ;
..............page:91-92
2014 nian zong mu ci
..............page:97-100