Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 June 2012, Volume 12 Issue 5
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
NULL
2012, 12 (
5
): 0-0.
Abstract
(
217
)
PDF
(359KB) (
113
)
NULL
Related Articles
|
Metrics
Select
NULL
2012, 12 (
5
): 0-0.
Abstract
(
119
)
PDF
(427KB) (
46
)
NULL
Related Articles
|
Metrics
Select
NULL
2012, 12 (
5
): 0-0.
Abstract
(
110
)
PDF
(181KB) (
149
)
NULL
Related Articles
|
Metrics
Select
NULL
2012, 12 (
5
): 0-0.
Abstract
(
172
)
PDF
(361KB) (
165
)
NULL
Related Articles
|
Metrics
Select
Association Analysis of Typical Detection Points and Control Points in Host Security Detection
2012, 12 (
5
): 0-0.
Abstract
(
139
)
PDF
(412KB) (
109
)
NULL
Related Articles
|
Metrics
Select
Analysis and Application for NAF Encoding Methods
2012, 12 (
5
): 0-0.
Abstract
(
268
)
PDF
(197KB) (
797
)
NULL
Related Articles
|
Metrics
Select
A Proof about the Information Entropy of Volley Markov Source in Network
2012, 12 (
5
): 0-0.
Abstract
(
187
)
PDF
(184KB) (
404
)
NULL
Related Articles
|
Metrics
Select
The Research of Trojan Horse Technology and Investigation Method on Differential Backup and Cookie Injection
2012, 12 (
5
): 0-0.
Abstract
(
142
)
PDF
(776KB) (
282
)
NULL
Related Articles
|
Metrics
Select
Software Implementation of Digit Encryptions Module
2012, 12 (
5
): 0-0.
Abstract
(
159
)
PDF
(185KB) (
170
)
NULL
Related Articles
|
Metrics
Select
The Solution of Key Migration Model and the Sealed Key Migration based on the Trusted Storage
2012, 12 (
5
): 0-0.
Abstract
(
133
)
PDF
(281KB) (
124
)
NULL
Related Articles
|
Metrics
Select
Application of Web Scan Web Spider Technology Research
2012, 12 (
5
): 0-0.
Abstract
(
172
)
PDF
(718KB) (
2574
)
NULL
Related Articles
|
Metrics
Select
Design and Analysis of Network Security Protection System based on Intrusion Tolerance
2012, 12 (
5
): 0-0.
Abstract
(
109
)
PDF
(209KB) (
100
)
NULL
Related Articles
|
Metrics
Select
Research on Defend Against DDoS Attacks
2012, 12 (
5
): 0-0.
Abstract
(
168
)
PDF
(769KB) (
1736
)
NULL
Related Articles
|
Metrics
Select
A Kind of New Proxy-Protected Signature based on Polynomial Over Finite Fields
2012, 12 (
5
): 0-0.
Abstract
(
181
)
PDF
(244KB) (
143
)
NULL
Related Articles
|
Metrics
Select
AIX5.3/6.1 Heap Exploitation Mechanisms Analysis
2012, 12 (
5
): 0-0.
Abstract
(
140
)
PDF
(592KB) (
108
)
NULL
Related Articles
|
Metrics
Select
A Kind of Embedded Radius Module Access Control Technology Research
2012, 12 (
5
): 0-0.
Abstract
(
155
)
PDF
(474KB) (
122
)
NULL
Related Articles
|
Metrics
Select
Virtualization System Security Research and Analysis
2012, 12 (
5
): 0-0.
Abstract
(
150
)
PDF
(225KB) (
221
)
NULL
Related Articles
|
Metrics
Select
The Capture of Conventional Intrusion
2012, 12 (
5
): 0-0.
Abstract
(
148
)
PDF
(137KB) (
107
)
NULL
Related Articles
|
Metrics
Select
Some Comments on Cybercrime-Scene and the Site Processing of Electronic Data
2012, 12 (
5
): 0-0.
Abstract
(
115
)
PDF
(296KB) (
83
)
NULL
Related Articles
|
Metrics
Select
One Kind based on the USB Key Encryption and Decryption Technology Software Protection Scheme
2012, 12 (
5
): 0-0.
Abstract
(
140
)
PDF
(649KB) (
550
)
NULL
Related Articles
|
Metrics
Select
Android System based on Mobile Phone Privacy Information Security Research and Implementation
2012, 12 (
5
): 0-0.
Abstract
(
237
)
PDF
(536KB) (
230
)
NULL
Related Articles
|
Metrics
Select
Research in the Application of 915.0MHz RFID Chips in Internet of Things
2012, 12 (
5
): 0-0.
Abstract
(
129
)
PDF
(411KB) (
192
)
NULL
Related Articles
|
Metrics
Select
The Security Challenges of the Opportunistic IoT
2012, 12 (
5
): 0-0.
Abstract
(
130
)
PDF
(320KB) (
193
)
NULL
Related Articles
|
Metrics
Select
A Study of Security Architecture and Technical Approaches in Internet of Things
2012, 12 (
5
): 0-0.
Abstract
(
193
)
PDF
(401KB) (
365
)
NULL
Related Articles
|
Metrics
Select
Study on Industrial Control SCADA Systems Information Security Protection System
2012, 12 (
5
): 0-0.
Abstract
(
152
)
PDF
(318KB) (
1055
)
NULL
Related Articles
|
Metrics
Select
Intrusion Tolerant System and the Key Mechanisms
2012, 12 (
5
): 0-0.
Abstract
(
145
)
PDF
(325KB) (
189
)
NULL
Related Articles
|
Metrics
Select
Research on the Legal System of Internet Public Opinion Monitoring
2012, 12 (
5
): 0-0.
Abstract
(
123
)
PDF
(331KB) (
72
)
NULL
Related Articles
|
Metrics
Select
Research on Key Technologies of Monitoring Public Opinions in Colleges based on the Web
2012, 12 (
5
): 0-0.
Abstract
(
181
)
PDF
(315KB) (
210
)
NULL
Related Articles
|
Metrics
Select
The Study of Mobile Phone Forensics Normalization
2012, 12 (
5
): 0-0.
Abstract
(
150
)
PDF
(395KB) (
588
)
NULL
Related Articles
|
Metrics
Select
Integrated Information Security Monitoring and Evaluation System Design based on the Classified Protection
2012, 12 (
5
): 0-0.
Abstract
(
224
)
PDF
(591KB) (
314
)
NULL
Related Articles
|
Metrics