Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2014 Issue 5
Research on Operating System Camoulfage Technology of Fingerprint Characteristic
CHEN Ying;,LIU Chang-zheng;,WANG Cheng-min;
..............page:1-4
Research of Linux WebShell Detection based on SVM Classiifer
MEI Rui;,MENG Zheng;,WEN Wei-ping;,ZHANG Tao;
..............page:5-9
Some Heuristic Discussion on ElGamal Encryption and Signature Schemes
FENG Ze-bo;,REN Wei;,WU Xiao-pin;
..............page:10-14
Attribute-based Cipher-text Access Control Scheme Used in Cloud Storage of PHR
LI Ying;,LIN Bo-gang;,WANG Shu-e;,YANG Yang;
..............page:15-20
The Security Modeling and Checking of the Fast Handover Authentication Protocol FHAM based on AVISPA
CHEN Shou-guo;,FU An-min;,QIN Ning-yuan;
..............page:21-25
Research on the Techniques of Remote Video Capture based on VFW
LUO Sen-lin;,ZHOU Meng-ting;
..............page:26-31
Finding Community Structures of Users’ Relationships in Twitter
LIN Bo-gang;,ZHONG Ling;
..............page:32-36
Big Data Analysis on Security based on Network Trafifc Metadata
JIANG Kai-da;,LI Xiao;,SUN Qiang;
..............page:37-40
Research of Malicious Code in Automatic Unpacking
GONG Tao;,HU Zhen-jiang;,PENG Xiao-xiang;,SHU Hui;
..............page:41-45
Software Anti-tracking Technology Structure based on Self-modifying Code
GAO Bing;,LIN Guo-yuan;,WANG Ying;
..............page:46-51
Simulation of Opportunistic Network Routing Protocols based on NS-3
LIU Dong-liang;,MA Chun-guang;
..............page:52-58
Research on Routing Algorithm of Wireless Sensor Network based on Link Quality
LI Mu-feng;,TIAN Yu;,XU Hong-fei;,YI Ping;
..............page:59-62
Research on the Security Model of Big Data in Government
LI Xiao-yong;,LV Cong-dong;,MA Wei;,ZHANG Lu;
..............page:63-67
Dynamic Data Leakage Monitoring System based on Mobile Terminal
CHEN Ya-jie;,FU Tan-tan;,MA Qi-hang;,WANG Yong;
..............page:68-72
The Construction and Application of Cyberspace Security Situational Awareness System
CHEN Hou-jin;,LAI Jian-rong;,LIN Fan;,SU Zhong;
..............page:73-77
Research on the Cipher Computable Encryption System
YANG Chen;,YOU Lin;
..............page:78-81
Research of Information Retrieval based on DOM
CHEN Tao;,SONG Qing-shuai;,XUE Li-min;
..............page:82-86
The Digital Investigation and Forensics of Trojan Malware
LAN Yun;,LI Bao-lin;
..............page:87-91
2014 nian 3 yue ji suan ji bing du yi qing fen xi
meng bin ;, wang wen yi ;
..............page:92-92
2014 nian 3 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan da xue guo jia ji suan ji wang luo ru qin fang fan zhong xin bei jing 100049;
..............page:93-94
2014 nian 3 yue wang luo an quan jian ce shu ju fa bu
he shi ping ;, zhao hui ;
..............page:95-96