Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Netinfo Security
1671-1122
2014 Issue 9
xu
..............page:0-0
Cloud Platform based Real-time Monitoring of the Abnormal Trafifc in Massive-scale Network
LI Tian-feng;,WANG Jin-song;,YAO Xin;
..............page:1-5
Solution for Rule Conlfict under Distributed SDN Controller System
GAO Neng;,MA Cun-qing;,WANG Xin;,XUE Cong;
..............page:6-11
Research on a New Proposed Fake Base Station Restraining Scheme based on Pseudo Signal
LI Geng;,SUN Chun-lai;,ZHAO Hui;,ZHAO Yu-ping;
..............page:12-16
A Method of Discriminating Microblog Topic Position based on the Text Classiifcation with Correlation of Subject
HUANG Jiu-ming;,JIA Yan;,WANG Ming-yuan;,ZHOU Bin;
..............page:17-21
Study on Evaluation of the Important Information System Security Safeguard Capability
GUO Yan-qing;,LV Xin;,YANG Yue-yuan;
..............page:22-25
A Review of Security Threats of Mobile Internet
LEI Ling-guang;,WANG Xue-qiang;,WANG Yue-wu;
..............page:30-33
Design of Secure SDN Controller Architecture
LIU Zong-bin;,MA Cun-qing;,XUE Cong;,ZHANG Qing-long;
..............page:34-38
Network Collaborative Defense Oriented Dynamic Risk Assessment System
WANG Xing-he;,XIA Chun-he;,YU Yang;
..............page:39-43
Privacy Protection Using Face Recognition in Android Platform
CAI Zhi-ling;,JIANG Qing-shan;,LIN Bo-gang;
..............page:50-53
A System of Privacy Protection based on Android
HUANG Ke-zhen;,LI Yu-xiang;,LIN Bo-gang;
..............page:54-57
Conformance Assessment and Standards System Research on Data Forensics Equipment
DU Da-hai;,FAN Hong;,HU Zhi-ang;,WANG Guan;
..............page:58-62
Present Situation and Enlightenment of the Foreign Network Range Technology
HAO Wen-jiang;,LI Cui-cui;,LI Qiu-xiang;,XU Li-ping;
..............page:63-68
Research on DDoS Attack and Defense based on Network Self-similarity Detecting
CHEN Si;,HUANG Chang-hui;,WANG Hai-zhen;
..............page:69-71
2014 Domestic Government Website Security Analysis
CHEN Jian-min;,LIU Yan;,ZHANG Xin;
..............page:72-75
Cyber Resilience:New Ideas of Cyber Security Development
LI Zhan-bao;,ZHANG Wen-gui;
..............page:76-79
Research on E-commerce-oriented User Abnormal Behaviour Detection
HAN Wei-hong;,JI Bing-shuai;,JIA Yan;,LI Hu;
..............page:80-85
Research on Tibetan Public Opinion Platform of Cloud Analysis System
DAI Yu-gang;,JIANG Jing;,JIANG Tao;,LI Ai-lin;
..............page:92-94
A Simple Discussion on the Impact of SDN Development on Network Security
QI Zhong-hou;,XIE Xu-dong;,ZHANG Nai-bin;
..............page:95-97
Moving Target Defense Mechanisms
FENG Xue-wei;,WANG Dong-xia;,ZHAO Gang;
..............page:98-100
An Anti-APT Scheme Research for High-Security Network
LI Feng-hai;,LI Shuang;,SONG Yan;,ZHANG Bai-long;
..............page:109-114
Emergency Response Collaborative System Design for Network Security based on Business Process Management
LI Yu-peng;,WANG Hong-yan;,ZHANG Yan-li;
..............page:123-126
Classiifcation-based Hot Topic Detection Approach on Chinese Micro-blog
ZHANG Lei;,ZHENG Fei;
..............page:127-131
Analysis and Research on Security Protocol of Wireless LAN
ZHANG Lei;,ZHENG Fei;
..............page:132-137
Internet Security Protection in Personal Sensitive Information
CHENG Nan;,LI Chao;,WANG Yu-bin;
..............page:144-148
Research on How to Handle the Balance of Internet Vitality and Order
JIAO Guo-lin;,ZHUO Gang;
..............page:152-156
A Smart Inspection Recording Scheme based on OTP Token
LU Zhou;,YU Hua-zhang;,ZHANG Yi-fei;,ZHU Peng-fei;
..............page:165-166
iOS Forensics
LIU Hao-yang;
..............page:167-170
A Secure Computer Terminal Coping with Various Threats
LI Yu-wen;,ZHANG Xue-jun;
..............page:171-175
Analysis of Attack Techniques and Crime Methods of the Mobile Internet
CAO Wei;,LU Tian-liang;,ZHOU Yun-wei;
..............page:176-179
The Analysis and Comparison of Website Security Scanning Products
DI Hong-bo;,SU Ji-cheng;,YU Shao-hui;
..............page:180-183
Feasibility Study on Automobile Electronic Control System of ECU Intrusion and Virus
LI Xiang;,MO Jia-shuai-zi;,XIA Zi-yan;,ZHOU Zhi-tong;
..............page:193-195
Fake Base Station Recognition and Locating Technology Research
LI Zhen-ni;,XIA Zi-yan;,XING Jia-shuai;,ZHOU Zhi-tong;
..............page:196-198
The Analysis of Financial Crime in Mobile Internet
GUO Chen-yang;,HE Su-ping;,ZHU Yan-jun;
..............page:199-202
Research on Industrial Control System Security Risks and Countermeasures
SHEN Xiao-jun;,WANG Hong-kai;,WANG Zhi-qiang;,ZHANG Xu-dong;
..............page:203-206
Discussion of Mobile Internet Security Issues and Protection Measures
GONG Xiao-gang;,WANG Hong-kai;,WANG Zhi-qiang;
..............page:207-210
The Method of Decrypting FileVault2 Oflfine and Applications in Forensics
LAN Chao-xiang;,QIAN Jing-jie;,SHEN Chang-da;
..............page:211-213
Analytical Techniques of BlackBerry File System
LI Yong-xing;,LIN Yi-bin;,QIAN Jing-jie;,SHEN Chang-da;
..............page:214-216
Analysis of Decrypting LUKS Encrypted Volume Oflfine
QIAN Jing-jie;,SHEN Chang-da;,WEI Peng;
..............page:217-219
TrueCrypt Container Fast Detection Technology
QIAN Jing-jie;,SHEN Chang-da;,YOU Jun-sheng;
..............page:220-222
2014 nian 7 yue ji suan ji bing du yi qing fen xi
meng bin ;, zhang rui ;
..............page:226-226
2014 nian 7 yue shi da zhong yao an quan lou dong fen xi
zhong guo ke xue yuan da xue guo jia ji suan ji wang luo ru qin fang fan zhong xin bei jing 100049;
..............page:227-228
2014 nian 7 yue wang luo an quan jian ce shu ju fa bu
chen yang ;, he neng qiang ;
..............page:229-230