Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 November 2011, Volume 11 Issue 11
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
A Brief Review of Provably Secure Public Key Cryptography
2011, 11 (
11
): 0-0.
Abstract
(
282
)
PDF
(689KB) (
146
)
NULL
Related Articles
|
Metrics
Select
Research on the Transport Security of LTE-Advanced
2011, 11 (
11
): 0-0.
Abstract
(
77
)
PDF
(360KB) (
96
)
NULL
Related Articles
|
Metrics
Select
Coding Model and Methods for Steganography
2011, 11 (
11
): 0-0.
Abstract
(
151
)
PDF
(1060KB) (
486
)
NULL
Related Articles
|
Metrics
Select
Security Problems in the Next Generation Network and Their Solutions
2011, 11 (
11
): 0-0.
Abstract
(
117
)
PDF
(353KB) (
125
)
NULL
Related Articles
|
Metrics
Select
Safety Protection and Management of the Internet of Things
2011, 11 (
11
): 0-0.
Abstract
(
157
)
PDF
(266KB) (
121
)
NULL
Related Articles
|
Metrics
Select
The Three-level Supervision and Control System for the Internet
2011, 11 (
11
): 0-0.
Abstract
(
167
)
PDF
(356KB) (
127
)
NULL
Related Articles
|
Metrics
Select
Research on Control Strategy of Networking Management
2011, 11 (
11
): 0-0.
Abstract
(
84
)
PDF
(378KB) (
153
)
NULL
Related Articles
|
Metrics
Select
Information Security Uantification Standard and Assessment System Research
2011, 11 (
11
): 0-0.
Abstract
(
128
)
PDF
(263KB) (
106
)
NULL
Related Articles
|
Metrics
Select
Explore Xen Security Mechanism
2011, 11 (
11
): 0-0.
Abstract
(
188
)
PDF
(412KB) (
130
)
NULL
Related Articles
|
Metrics
Select
Cloud Computing Forensics Technology
2011, 11 (
11
): 0-0.
Abstract
(
134
)
PDF
(254KB) (
683
)
NULL
Related Articles
|
Metrics
Select
Power Line Panoramic Image Feature Extraction Based on SURF Algorithm
2011, 11 (
11
): 0-0.
Abstract
(
263
)
PDF
(516KB) (
133
)
NULL
Related Articles
|
Metrics
Select
Using IHO S63 Data Protection Schema in Electronic Chart Systems
2011, 11 (
11
): 0-0.
Abstract
(
129
)
PDF
(475KB) (
82
)
NULL
Related Articles
|
Metrics
Select
The Research of Crypto Algorithm Recognition Technology
2011, 11 (
11
): 0-0.
Abstract
(
210
)
PDF
(464KB) (
146
)
NULL
Related Articles
|
Metrics
Select
Forensic of Physical Memory Windows-based System Design and Implementation
2011, 11 (
11
): 0-0.
Abstract
(
165
)
PDF
(454KB) (
106
)
NULL
Related Articles
|
Metrics
Select
The Research of File Recovery Method on EXT4 File System
2011, 11 (
11
): 0-0.
Abstract
(
216
)
PDF
(242KB) (
148
)
NULL
Related Articles
|
Metrics
Select
Method of Digital Image Scrambling Based on Extended Zig-zag Transformation
2011, 11 (
11
): 0-0.
Abstract
(
159
)
PDF
(378KB) (
103
)
NULL
Related Articles
|
Metrics
Select
Research of Password Recovery System For RAR Based on GPU
2011, 11 (
11
): 0-0.
Abstract
(
217
)
PDF
(203KB) (
134
)
NULL
Related Articles
|
Metrics
Select
Attack Manner Mining in the XSS Included in URL
2011, 11 (
11
): 0-0.
Abstract
(
130
)
PDF
(233KB) (
87
)
NULL
Related Articles
|
Metrics
Select
The Development and Implementation of a Software for Remote Forensic Analysis
2011, 11 (
11
): 0-0.
Abstract
(
139
)
PDF
(371KB) (
94
)
NULL
Related Articles
|
Metrics
Select
The Application of BP Neural Network in Intrusion Detection System
2011, 11 (
11
): 0-0.
Abstract
(
142
)
PDF
(225KB) (
109
)
NULL
Related Articles
|
Metrics
Select
Urban Network Security Integrated Monitoring
2011, 11 (
11
): 0-0.
Abstract
(
76
)
PDF
(588KB) (
79
)
NULL
Related Articles
|
Metrics
Select
The Development and Implementation of a Software for Remote Forensic Analysis
2011, 11 (
11
): 0-0.
Abstract
(
173
)
PDF
(284KB) (
193
)
NULL
Related Articles
|
Metrics
Select
Source Code Vulnerability Detection Using Information Flow Analysis
2011, 11 (
11
): 0-0.
Abstract
(
157
)
PDF
(228KB) (
262
)
NULL
Related Articles
|
Metrics
Select
HTML 5 on Web Application Effect and Safety Problem Research
2011, 11 (
11
): 0-0.
Abstract
(
153
)
PDF
(375KB) (
132
)
NULL
Related Articles
|
Metrics
Select
Research on the Legal Application Difficulties of the Crime of Jeopardizing Computer Information System Security
2011, 11 (
11
): 0-0.
Abstract
(
192
)
PDF
(381KB) (
75
)
NULL
Related Articles
|
Metrics
Select
Research of the Tort Liability of the Internet Service Providers
2011, 11 (
11
): 0-0.
Abstract
(
138
)
PDF
(173KB) (
83
)
NULL
Related Articles
|
Metrics
Select
Research on the Digital Evidence in the Illegal Network Intrusion
2011, 11 (
11
): 0-0.
Abstract
(
132
)
PDF
(592KB) (
153
)
NULL
Related Articles
|
Metrics
Select
The Using USB Devices Theft Files Case Evidence Appraisal and Analysis
2011, 11 (
11
): 0-0.
Abstract
(
109
)
PDF
(367KB) (
132
)
NULL
Related Articles
|
Metrics
Select
NULL
2011, 11 (
11
): 0-0.
Abstract
(
127
)
PDF
(672KB) (
206
)
NULL
Related Articles
|
Metrics
Select
Computer Virus Analysis of 2011 October
2011, 11 (
11
): 0-0.
Abstract
(
136
)
PDF
(226KB) (
85
)
NULL
Related Articles
|
Metrics
Select
Network Security Monitoring Data Analysis Report of 2011 September
2011, 11 (
11
): 0-0.
Abstract
(
108
)
PDF
(451KB) (
90
)
NULL
Related Articles
|
Metrics
Select
Ten Critical Vulnerabilities Analysis Report October 2011
2011, 11 (
11
): 0-0.
Abstract
(
113
)
PDF
(452KB) (
90
)
NULL
Related Articles
|
Metrics
Select
NULL
2011, 11 (
11
): 0-0.
Abstract
(
149
)
PDF
(297KB) (
37
)
NULL
Related Articles
|
Metrics