Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 February 2013, Volume 13 Issue 2
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
181
)
PDF
(1021KB) (
92
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
97
)
PDF
(521KB) (
20
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
136
)
PDF
(2560KB) (
21
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
88
)
PDF
(2065KB) (
45
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
115
)
PDF
(520KB) (
63
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
99
)
PDF
(1024KB) (
109
)
NULL
Related Articles
|
Metrics
Select
An Analysis of U.S.Federal Cloud Computing Security Policies
2013, 13 (
2
): 0-0.
Abstract
(
111
)
PDF
(1159KB) (
385
)
NULL
Related Articles
|
Metrics
Select
The Application of Genetic Algorithms in The Data Analysis in The Social Networking Site
2013, 13 (
2
): 0-0.
Abstract
(
132
)
PDF
(301KB) (
220
)
NULL
Related Articles
|
Metrics
Select
Algorithm of Constructing Decision Tree based on the Leaf and Branch Ratio
2013, 13 (
2
): 0-0.
Abstract
(
158
)
PDF
(260KB) (
148
)
NULL
Related Articles
|
Metrics
Select
The Study on User Privacy Protection Scheme in Content Centric Networking
2013, 13 (
2
): 0-0.
Abstract
(
87
)
PDF
(737KB) (
117
)
NULL
Related Articles
|
Metrics
Select
Create Secure Login Desktop based on Credential Providers for Win7
2013, 13 (
2
): 0-0.
Abstract
(
123
)
PDF
(1166KB) (
103
)
NULL
Related Articles
|
Metrics
Select
Face Recognition Method in Robot Vision based on Panorama Synthesis
2013, 13 (
2
): 0-0.
Abstract
(
194
)
PDF
(2617KB) (
211
)
NULL
Related Articles
|
Metrics
Select
Research and Achievement of Intrusion Detection System based on Android Platform
2013, 13 (
2
): 0-0.
Abstract
(
191
)
PDF
(206KB) (
364
)
NULL
Related Articles
|
Metrics
Select
A Strategy-based Android Application Detection System
2013, 13 (
2
): 0-0.
Abstract
(
159
)
PDF
(823KB) (
793
)
NULL
Related Articles
|
Metrics
Select
The Users Scene Info Leakage Prevention System based on the Android Smartphone Research and Implementation
2013, 13 (
2
): 0-0.
Abstract
(
106
)
PDF
(649KB) (
138
)
NULL
Related Articles
|
Metrics
Select
The Detection of Hidden Process Technology based on Thread Scheduling
2013, 13 (
2
): 0-0.
Abstract
(
146
)
PDF
(669KB) (
562
)
NULL
Related Articles
|
Metrics
Select
A Distributed and Autonomic Resource Management Mechanism in Network Virtualization
2013, 13 (
2
): 0-0.
Abstract
(
84
)
PDF
(246KB) (
78
)
NULL
Related Articles
|
Metrics
Select
A LAN Security System Model and Its Key Technology Research
2013, 13 (
2
): 0-0.
Abstract
(
156
)
PDF
(657KB) (
125
)
NULL
Related Articles
|
Metrics
Select
Voice Transmission System for Mobile Communication Network
2013, 13 (
2
): 0-0.
Abstract
(
155
)
PDF
(2642KB) (
216
)
NULL
Related Articles
|
Metrics
Select
A Research on Automatic Penetration Testing based on Metasploit Framework
2013, 13 (
2
): 0-0.
Abstract
(
157
)
PDF
(725KB) (
954
)
NULL
Related Articles
|
Metrics
Select
N-gram of Expanded Hot Path Approach to Software Birthmarking
2013, 13 (
2
): 0-0.
Abstract
(
134
)
PDF
(266KB) (
95
)
NULL
Related Articles
|
Metrics
Select
The Security Analysis and Discuss of Non-contact Smart Card
2013, 13 (
2
): 0-0.
Abstract
(
122
)
PDF
(701KB) (
142
)
NULL
Related Articles
|
Metrics
Select
Research of Mine Localization System based on Wireless Sensor Networks
2013, 13 (
2
): 0-0.
Abstract
(
117
)
PDF
(643KB) (
94
)
NULL
Related Articles
|
Metrics
Select
RFID-based School Bus Personnel Security Management System
2013, 13 (
2
): 0-0.
Abstract
(
129
)
PDF
(155KB) (
121
)
NULL
Related Articles
|
Metrics
Select
Researches on the Technologies of Hard Disk Data Recovery
2013, 13 (
2
): 0-0.
Abstract
(
201
)
PDF
(647KB) (
433
)
NULL
Related Articles
|
Metrics
Select
Research Progress and Key Technologies on Future Internet
2013, 13 (
2
): 0-0.
Abstract
(
160
)
PDF
(662KB) (
98
)
NULL
Related Articles
|
Metrics
Select
Security Analysis of RFID Systems
2013, 13 (
2
): 0-0.
Abstract
(
121
)
PDF
(227KB) (
337
)
NULL
Related Articles
|
Metrics
Select
The Analysis and Research of PKI Cross-certification Technology from The View of "Super Online Banking System"
2013, 13 (
2
): 0-0.
Abstract
(
148
)
PDF
(1166KB) (
149
)
NULL
Related Articles
|
Metrics
Select
The Mining System of Social Relationship Networking based on Microblogging
2013, 13 (
2
): 0-0.
Abstract
(
162
)
PDF
(1596KB) (
1255
)
NULL
Related Articles
|
Metrics