Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 January 2013, Volume 13 Issue 1
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
NULL
2013, 13 (
1
): 0-0.
Abstract
(
310
)
PDF
(565KB) (
460
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
1
): 0-0.
Abstract
(
156
)
PDF
(101KB) (
28
)
NULL
Related Articles
|
Metrics
Select
Research on Effectivity Evaluation Methodsof Key Security Protection Functions in Classified Evaluation
2013, 13 (
1
): 0-0.
Abstract
(
123
)
PDF
(682KB) (
69
)
NULL
Related Articles
|
Metrics
Select
Research on Trust Measurement of Cloud Computing Platform
2013, 13 (
1
): 0-0.
Abstract
(
131
)
PDF
(206KB) (
206
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
1
): 0-0.
Abstract
(
113
)
PDF
(515KB) (
65
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
1
): 0-0.
Abstract
(
120
)
PDF
(1032KB) (
119
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
1
): 0-0.
Abstract
(
167
)
PDF
(1030KB) (
62
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
1
): 0-0.
Abstract
(
131
)
PDF
(4714KB) (
66
)
NULL
Related Articles
|
Metrics
Select
An Active Anti-Phishing Solution based on Semi-Fragile Watermark
2013, 13 (
1
): 0-0.
Abstract
(
140
)
PDF
(1173KB) (
92
)
NULL
Related Articles
|
Metrics
Select
The Research of Data Monitoring and Denial of Service Attack on Spanning Tree
2013, 13 (
1
): 0-0.
Abstract
(
303
)
PDF
(1596KB) (
144
)
NULL
Related Articles
|
Metrics
Select
Extraction of Polymorphic Malware Signatures using Abstract Interpretation Theory
2013, 13 (
1
): 0-0.
Abstract
(
133
)
PDF
(1106KB) (
95
)
NULL
Related Articles
|
Metrics
Select
The Extraction Technology of Browsers History Traces
2013, 13 (
1
): 0-0.
Abstract
(
184
)
PDF
(659KB) (
312
)
NULL
Related Articles
|
Metrics
Select
Acceleration of Field Multiplication on Graphics Hardware
2013, 13 (
1
): 0-0.
Abstract
(
116
)
PDF
(2124KB) (
140
)
NULL
Related Articles
|
Metrics
Select
Implementation of a Malware Detect Tool on Android
2013, 13 (
1
): 0-0.
Abstract
(
109
)
PDF
(1315KB) (
100
)
NULL
Related Articles
|
Metrics
Select
Trojan Horses Hiding and Detecting Technique of Android OS
2013, 13 (
1
): 0-0.
Abstract
(
192
)
PDF
(1263KB) (
347
)
NULL
Related Articles
|
Metrics
Select
Research and Implementation of Packing Technology for PE Files
2013, 13 (
1
): 0-0.
Abstract
(
171
)
PDF
(1738KB) (
1624
)
NULL
Related Articles
|
Metrics
Select
Research on Auto-Attack System based on Agent and Attack Tree
2013, 13 (
1
): 0-0.
Abstract
(
95
)
PDF
(784KB) (
108
)
NULL
Related Articles
|
Metrics
Select
The Detecting-Mode Research based on Cohen-Sutherland
2013, 13 (
1
): 0-0.
Abstract
(
157
)
PDF
(214KB) (
142
)
NULL
Related Articles
|
Metrics
Select
Research on the Game Theory based Network Attack-Defense and its Application
2013, 13 (
1
): 0-0.
Abstract
(
260
)
PDF
(1087KB) (
239
)
NULL
Related Articles
|
Metrics
Select
Network Security Event Analysis based on Hadoop
2013, 13 (
1
): 0-0.
Abstract
(
152
)
PDF
(1090KB) (
233
)
NULL
Related Articles
|
Metrics
Select
Provably Secure ID-based Generalized Signcryption Scheme
2013, 13 (
1
): 0-0.
Abstract
(
131
)
PDF
(229KB) (
139
)
NULL
Related Articles
|
Metrics
Select
An Anonymous Wireless Healthcare Monitoring System based on the Tate Pairing
2013, 13 (
1
): 0-0.
Abstract
(
142
)
PDF
(2084KB) (
77
)
NULL
Related Articles
|
Metrics
Select
Research on the Anti-stealth Strategy of Trojan Horse Prevetion
2013, 13 (
1
): 0-0.
Abstract
(
114
)
PDF
(1087KB) (
80
)
NULL
Related Articles
|
Metrics
Select
A Network Security Management Process System Design and Research
2013, 13 (
1
): 0-0.
Abstract
(
129
)
PDF
(644KB) (
138
)
NULL
Related Articles
|
Metrics
Select
Android Security Protection Mechanism and Decryption
2013, 13 (
1
): 0-0.
Abstract
(
140
)
PDF
(2055KB) (
221
)
NULL
Related Articles
|
Metrics
Select
The Research and Development of Youth Network Behavior Monitoring Software
2013, 13 (
1
): 0-0.
Abstract
(
120
)
PDF
(1157KB) (
218
)
NULL
Related Articles
|
Metrics
Select
Discussion on the Limits of Automated Web Security Testing Tools and Manual Testing Method
2013, 13 (
1
): 0-0.
Abstract
(
213
)
PDF
(223KB) (
505
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
1
): 0-0.
Abstract
(
133
)
PDF
(1029KB) (
68
)
NULL
Related Articles
|
Metrics