Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2014 Issue 12
Research on Cloud WAF Systems
bi sheng jie ;, li ming ;, wang hao ;, wang li le ;
..............
page:1-6
The Research on Trusted Software Watermarking Based on Machine Fingerprint
WANG Liu-cheng;,WANG Wei;,ZHANG Yi;,ZHU Jian-wei;
..............
page:7-11
A Homomorphic Encryption Scheme on Online DBMS with Multilevel Secure Mechanism
bai shu jun ;, li bin ;, song huai gang ;
..............
page:12-15
Automatic Identiifcation for Abnormal HTTP Behavior Based upon RBF Neural Network
WANG Jing-zhong;,XU You-qiang;
..............
page:16-20
Dynamic Analysis Scheme of Android Malware Based on Sandbox
hu long ;, qin zhi guang ;, xiong hu ;, zhao yang ;
..............
page:21-26
Research and Implementation of Micro-blog Keyword Extraction Method Based on Clustering
li ai ping ;, li shu dong ;, sun xing dong ;
..............
page:27-31
A Public Opinion Monitoring System Based on Big Data Technology
CAO Bin;,CHEN Zhen;,GU Yi-li;,XIE Zhen-zhen;
..............
page:32-36
Study and Application of Network Security Situation Based on Ant Intelligence
LI Lin;,LIU Nian;,XU Jia-le;,ZHANG Xiao;
..............
page:37-42
A Method to Defend Intrusion from Hypercall of Xen
CHEN Xing-shu;,LI Hui;,WANG Wen-xian;,ZHANG Lei;
..............
page:43-46
Software Design of EXT3 File Operation Trace Extraction
xu guo tian ;
..............
page:47-50
A Novel AOA Clustering-based Localization Algorithm with High Accuracy
HUANG Hai;,HUANG Qi;,XIE Dong-qing;
..............
page:51-55
The Method of KPI Classiifcation of Mobile Communication Network
li hui zhi ;, yuan chao wei ;
..............
page:56-60
Research and Realization of Indentiifcation Technology of Mobile Internet Audio-Video Protocol
LIU Ji-qiang;,ZHAO Zheng;
..............
page:61-64
Performance Analysis of Vehicle-to-Vehicle Communication System in the Internet of Vehicle under n-Rayleigh Fading Channels
WANG Jing-jing;,WU Chun-lei;,XU Ling-wei;,ZHANG Hao;
..............
page:65-70
Research and Implement on Dynamic Access Control Model Based on User’s Behavior in SaaS
gao fei ;, guo fei ;, zhang hua ;
..............
page:71-75
The Research on Vulnerability Mitigation in Memory
HE Ying-rui;,SHI Ji;,WEN Wei-ping;,ZHANG Tao;
..............
page:76-82
Assets Recognition and Importance Assessment Based on Information Flow
jiang fan ;, wei feng ;
..............
page:83-87
2014 nian 10 yue ji suan ji bing du yi qing fen xi
li dong ;, meng bin ;
..............
page:88-88
2014 nian 10 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan da xue guo jia ji suan ji wang luo ru qin fang fan zhong xin bei jing 100049;
..............
page:89-90
2014 nian 10 yue wang luo an quan jian ce shu ju fa bu
li shi zuo ;, yan han bing ;
..............
page:91-92
2014 yun ji suan yu da shu ju guo ji hui yi zhao kai
..............
page:93-93
shou jie shi jie hu lian wang da hui zai zhe jiang wu zhen ju xing
..............
page:93-93
2014 yi dong hu lian wang chan ye fa zhan yu wang luo xin xi an quan yan tao hui zai jing ju xing
..............
page:93-93
2014 wei lai zhi hui yuan qu yun ping tai fa zhan yu chuang xin lun tan zuo di tan gao duan zhi hui yuan qu yan tao hui zai jing ju ban
..............
page:94-94
ruan jian yu wang luo an quan ke xue yu ji shu qian yan lun tan cheng gong zhao kai
..............
page:94-94
2015 nian 4.29 shou du wang luo an quan ri wang luo yu xin xi an quan bo lan hui xin wen fa bu hui zai jing ju xing
..............
page:94-94
di san jie quan guo wang luo yu xin xi an quan fang hu feng hui zai wu han zhao kai
..............
page:95-95
2014 nian quan guo gong ye kong zhi ji suan ji ji shu nian hui zai zhong qing zhao kai
..............
page:95-95
shang hai wei xi tong suo chao dao dan guang zi tan ce ji shu zai liang zi tong xin ying yong zhong qu de zhong yao tu po -- cheng gong shi xian 200 gong li ce liang qi jian wu guan liang zi mi yue fen fa
..............
page:95-95
gong xiang wifi sheng huo gong jian an quan wang luo zhu ti huo dong zai jing ju ban
..............
page:96-96
quan guo dian zi ren zheng ji shu jiao liu da hui zuo dian zi ren zheng zhuan ye wei yuan hui 2014 nian nian hui zai jing cheng gong ju ban
..............
page:96-96
zai xian jiao yu guan cha wang luo an quan ren cai zhan lue shi yu ji xu jiao yu
..............
page:96-96
2014 nian zong mu ci
..............
page:97-100