Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 June 2012, Volume 12 Issue 5
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
NULL
2012, 12 (
5
): 0-0.
Abstract
(
199
)
PDF
(359KB) (
101
)
NULL
Related Articles
|
Metrics
Select
NULL
2012, 12 (
5
): 0-0.
Abstract
(
110
)
PDF
(427KB) (
40
)
NULL
Related Articles
|
Metrics
Select
NULL
2012, 12 (
5
): 0-0.
Abstract
(
109
)
PDF
(181KB) (
131
)
NULL
Related Articles
|
Metrics
Select
NULL
2012, 12 (
5
): 0-0.
Abstract
(
157
)
PDF
(361KB) (
139
)
NULL
Related Articles
|
Metrics
Select
Association Analysis of Typical Detection Points and Control Points in Host Security Detection
2012, 12 (
5
): 0-0.
Abstract
(
130
)
PDF
(412KB) (
90
)
NULL
Related Articles
|
Metrics
Select
Analysis and Application for NAF Encoding Methods
2012, 12 (
5
): 0-0.
Abstract
(
246
)
PDF
(197KB) (
671
)
NULL
Related Articles
|
Metrics
Select
A Proof about the Information Entropy of Volley Markov Source in Network
2012, 12 (
5
): 0-0.
Abstract
(
168
)
PDF
(184KB) (
300
)
NULL
Related Articles
|
Metrics
Select
The Research of Trojan Horse Technology and Investigation Method on Differential Backup and Cookie Injection
2012, 12 (
5
): 0-0.
Abstract
(
134
)
PDF
(776KB) (
228
)
NULL
Related Articles
|
Metrics
Select
Software Implementation of Digit Encryptions Module
2012, 12 (
5
): 0-0.
Abstract
(
151
)
PDF
(185KB) (
134
)
NULL
Related Articles
|
Metrics
Select
The Solution of Key Migration Model and the Sealed Key Migration based on the Trusted Storage
2012, 12 (
5
): 0-0.
Abstract
(
129
)
PDF
(281KB) (
116
)
NULL
Related Articles
|
Metrics
Select
Application of Web Scan Web Spider Technology Research
2012, 12 (
5
): 0-0.
Abstract
(
161
)
PDF
(718KB) (
2559
)
NULL
Related Articles
|
Metrics
Select
Design and Analysis of Network Security Protection System based on Intrusion Tolerance
2012, 12 (
5
): 0-0.
Abstract
(
109
)
PDF
(209KB) (
87
)
NULL
Related Articles
|
Metrics
Select
Research on Defend Against DDoS Attacks
2012, 12 (
5
): 0-0.
Abstract
(
157
)
PDF
(769KB) (
1403
)
NULL
Related Articles
|
Metrics
Select
A Kind of New Proxy-Protected Signature based on Polynomial Over Finite Fields
2012, 12 (
5
): 0-0.
Abstract
(
168
)
PDF
(244KB) (
125
)
NULL
Related Articles
|
Metrics
Select
AIX5.3/6.1 Heap Exploitation Mechanisms Analysis
2012, 12 (
5
): 0-0.
Abstract
(
128
)
PDF
(592KB) (
90
)
NULL
Related Articles
|
Metrics
Select
A Kind of Embedded Radius Module Access Control Technology Research
2012, 12 (
5
): 0-0.
Abstract
(
138
)
PDF
(474KB) (
102
)
NULL
Related Articles
|
Metrics
Select
Virtualization System Security Research and Analysis
2012, 12 (
5
): 0-0.
Abstract
(
143
)
PDF
(225KB) (
207
)
NULL
Related Articles
|
Metrics
Select
The Capture of Conventional Intrusion
2012, 12 (
5
): 0-0.
Abstract
(
144
)
PDF
(137KB) (
89
)
NULL
Related Articles
|
Metrics
Select
Some Comments on Cybercrime-Scene and the Site Processing of Electronic Data
2012, 12 (
5
): 0-0.
Abstract
(
109
)
PDF
(296KB) (
77
)
NULL
Related Articles
|
Metrics
Select
One Kind based on the USB Key Encryption and Decryption Technology Software Protection Scheme
2012, 12 (
5
): 0-0.
Abstract
(
132
)
PDF
(649KB) (
463
)
NULL
Related Articles
|
Metrics
Select
Android System based on Mobile Phone Privacy Information Security Research and Implementation
2012, 12 (
5
): 0-0.
Abstract
(
225
)
PDF
(536KB) (
205
)
NULL
Related Articles
|
Metrics
Select
Research in the Application of 915.0MHz RFID Chips in Internet of Things
2012, 12 (
5
): 0-0.
Abstract
(
124
)
PDF
(411KB) (
170
)
NULL
Related Articles
|
Metrics
Select
The Security Challenges of the Opportunistic IoT
2012, 12 (
5
): 0-0.
Abstract
(
130
)
PDF
(320KB) (
182
)
NULL
Related Articles
|
Metrics
Select
A Study of Security Architecture and Technical Approaches in Internet of Things
2012, 12 (
5
): 0-0.
Abstract
(
173
)
PDF
(401KB) (
357
)
NULL
Related Articles
|
Metrics
Select
Study on Industrial Control SCADA Systems Information Security Protection System
2012, 12 (
5
): 0-0.
Abstract
(
138
)
PDF
(318KB) (
1034
)
NULL
Related Articles
|
Metrics
Select
Intrusion Tolerant System and the Key Mechanisms
2012, 12 (
5
): 0-0.
Abstract
(
133
)
PDF
(325KB) (
148
)
NULL
Related Articles
|
Metrics
Select
Research on the Legal System of Internet Public Opinion Monitoring
2012, 12 (
5
): 0-0.
Abstract
(
113
)
PDF
(331KB) (
64
)
NULL
Related Articles
|
Metrics
Select
Research on Key Technologies of Monitoring Public Opinions in Colleges based on the Web
2012, 12 (
5
): 0-0.
Abstract
(
161
)
PDF
(315KB) (
188
)
NULL
Related Articles
|
Metrics
Select
The Study of Mobile Phone Forensics Normalization
2012, 12 (
5
): 0-0.
Abstract
(
141
)
PDF
(395KB) (
554
)
NULL
Related Articles
|
Metrics
Select
Integrated Information Security Monitoring and Evaluation System Design based on the Classified Protection
2012, 12 (
5
): 0-0.
Abstract
(
214
)
PDF
(591KB) (
295
)
NULL
Related Articles
|
Metrics