Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Netinfo Security
1671-1122
2014 Issue 5
Research on Operating System Camoulfage Technology of Fingerprint Characteristic
CHEN Ying;,LIU Chang-zheng;,WANG Cheng-min;
..............
page:1-4
Research of Linux WebShell Detection based on SVM Classiifer
MEI Rui;,MENG Zheng;,WEN Wei-ping;,ZHANG Tao;
..............
page:5-9
Some Heuristic Discussion on ElGamal Encryption and Signature Schemes
FENG Ze-bo;,REN Wei;,WU Xiao-pin;
..............
page:10-14
Attribute-based Cipher-text Access Control Scheme Used in Cloud Storage of PHR
LI Ying;,LIN Bo-gang;,WANG Shu-e;,YANG Yang;
..............
page:15-20
The Security Modeling and Checking of the Fast Handover Authentication Protocol FHAM based on AVISPA
CHEN Shou-guo;,FU An-min;,QIN Ning-yuan;
..............
page:21-25
Research on the Techniques of Remote Video Capture based on VFW
LUO Sen-lin;,ZHOU Meng-ting;
..............
page:26-31
Finding Community Structures of Users’ Relationships in Twitter
LIN Bo-gang;,ZHONG Ling;
..............
page:32-36
Big Data Analysis on Security based on Network Trafifc Metadata
JIANG Kai-da;,LI Xiao;,SUN Qiang;
..............
page:37-40
Research of Malicious Code in Automatic Unpacking
GONG Tao;,HU Zhen-jiang;,PENG Xiao-xiang;,SHU Hui;
..............
page:41-45
Software Anti-tracking Technology Structure based on Self-modifying Code
GAO Bing;,LIN Guo-yuan;,WANG Ying;
..............
page:46-51
Simulation of Opportunistic Network Routing Protocols based on NS-3
LIU Dong-liang;,MA Chun-guang;
..............
page:52-58
Research on Routing Algorithm of Wireless Sensor Network based on Link Quality
LI Mu-feng;,TIAN Yu;,XU Hong-fei;,YI Ping;
..............
page:59-62
Research on the Security Model of Big Data in Government
LI Xiao-yong;,LV Cong-dong;,MA Wei;,ZHANG Lu;
..............
page:63-67
Dynamic Data Leakage Monitoring System based on Mobile Terminal
CHEN Ya-jie;,FU Tan-tan;,MA Qi-hang;,WANG Yong;
..............
page:68-72
The Construction and Application of Cyberspace Security Situational Awareness System
CHEN Hou-jin;,LAI Jian-rong;,LIN Fan;,SU Zhong;
..............
page:73-77
Research on the Cipher Computable Encryption System
YANG Chen;,YOU Lin;
..............
page:78-81
Research of Information Retrieval based on DOM
CHEN Tao;,SONG Qing-shuai;,XUE Li-min;
..............
page:82-86
The Digital Investigation and Forensics of Trojan Malware
LAN Yun;,LI Bao-lin;
..............
page:87-91
2014 nian 3 yue ji suan ji bing du yi qing fen xi
meng bin ;, wang wen yi ;
..............
page:92-92
2014 nian 3 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan da xue guo jia ji suan ji wang luo ru qin fang fan zhong xin bei jing 100049;
..............
page:93-94
2014 nian 3 yue wang luo an quan jian ce shu ju fa bu
he shi ping ;, zhao hui ;
..............
page:95-96
shou du wang luo an quan ri zheng shi que ding
..............
page:97-97
shou du shi da wang luo an quan an jian ping xuan huo dong zheng shi qi dong
..............
page:97-97
bei jing wang luo an quan fan zha pian lian meng zai jing zheng shi qi dong
..............
page:97-97
shou du wang luo an quan lun tan zai jing ju xing
..............
page:98-98
shou du wang jing zhi yuan zhe dui wu qi dong zuo btv sheng huo wang an tian xia lan mu kai bo yi shi zai jing ju xing
..............
page:98-98
bei jing wang luo an quan jiao yu ti yan ji di zheng shi qi dong
..............
page:98-98
di yi jie bei jing wang luo an quan ji shu da sai zai jing ju xing
..............
page:99-99
zhong guan cun ke xin ji suan chan ye lian meng zheng shi cheng li
..............
page:99-99
bei jing wang an lian he en ran guo ji wen hua chuan mei zhao kai wei dian ying fa bu hui
..............
page:99-99
ju jiao openssl zhi ming xin xue lou dong nei wang an quan
..............
page:100-100
2014 ke xin ji suan gao feng lun tan zai jing ju ban
..............
page:100-100
2014 di wu jie zhong guo wu lian wang da hui long zhong kai mu
..............
page:100-100