Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 February 2013, Volume 13 Issue 2
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
205
)
PDF
(1021KB) (
119
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
109
)
PDF
(521KB) (
27
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
153
)
PDF
(2560KB) (
29
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
94
)
PDF
(2065KB) (
52
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
132
)
PDF
(520KB) (
79
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
119
)
PDF
(1024KB) (
164
)
NULL
Related Articles
|
Metrics
Select
An Analysis of U.S.Federal Cloud Computing Security Policies
2013, 13 (
2
): 0-0.
Abstract
(
142
)
PDF
(1159KB) (
455
)
NULL
Related Articles
|
Metrics
Select
The Application of Genetic Algorithms in The Data Analysis in The Social Networking Site
2013, 13 (
2
): 0-0.
Abstract
(
149
)
PDF
(301KB) (
276
)
NULL
Related Articles
|
Metrics
Select
Algorithm of Constructing Decision Tree based on the Leaf and Branch Ratio
2013, 13 (
2
): 0-0.
Abstract
(
172
)
PDF
(260KB) (
176
)
NULL
Related Articles
|
Metrics
Select
The Study on User Privacy Protection Scheme in Content Centric Networking
2013, 13 (
2
): 0-0.
Abstract
(
102
)
PDF
(737KB) (
163
)
NULL
Related Articles
|
Metrics
Select
Create Secure Login Desktop based on Credential Providers for Win7
2013, 13 (
2
): 0-0.
Abstract
(
160
)
PDF
(1166KB) (
204
)
NULL
Related Articles
|
Metrics
Select
Face Recognition Method in Robot Vision based on Panorama Synthesis
2013, 13 (
2
): 0-0.
Abstract
(
205
)
PDF
(2617KB) (
253
)
NULL
Related Articles
|
Metrics
Select
Research and Achievement of Intrusion Detection System based on Android Platform
2013, 13 (
2
): 0-0.
Abstract
(
202
)
PDF
(206KB) (
419
)
NULL
Related Articles
|
Metrics
Select
A Strategy-based Android Application Detection System
2013, 13 (
2
): 0-0.
Abstract
(
176
)
PDF
(823KB) (
831
)
NULL
Related Articles
|
Metrics
Select
The Users Scene Info Leakage Prevention System based on the Android Smartphone Research and Implementation
2013, 13 (
2
): 0-0.
Abstract
(
126
)
PDF
(649KB) (
192
)
NULL
Related Articles
|
Metrics
Select
The Detection of Hidden Process Technology based on Thread Scheduling
2013, 13 (
2
): 0-0.
Abstract
(
161
)
PDF
(669KB) (
708
)
NULL
Related Articles
|
Metrics
Select
A Distributed and Autonomic Resource Management Mechanism in Network Virtualization
2013, 13 (
2
): 0-0.
Abstract
(
95
)
PDF
(246KB) (
92
)
NULL
Related Articles
|
Metrics
Select
A LAN Security System Model and Its Key Technology Research
2013, 13 (
2
): 0-0.
Abstract
(
169
)
PDF
(657KB) (
165
)
NULL
Related Articles
|
Metrics
Select
Voice Transmission System for Mobile Communication Network
2013, 13 (
2
): 0-0.
Abstract
(
172
)
PDF
(2642KB) (
243
)
NULL
Related Articles
|
Metrics
Select
A Research on Automatic Penetration Testing based on Metasploit Framework
2013, 13 (
2
): 0-0.
Abstract
(
171
)
PDF
(725KB) (
1085
)
NULL
Related Articles
|
Metrics
Select
N-gram of Expanded Hot Path Approach to Software Birthmarking
2013, 13 (
2
): 0-0.
Abstract
(
148
)
PDF
(266KB) (
121
)
NULL
Related Articles
|
Metrics
Select
The Security Analysis and Discuss of Non-contact Smart Card
2013, 13 (
2
): 0-0.
Abstract
(
127
)
PDF
(701KB) (
195
)
NULL
Related Articles
|
Metrics
Select
Research of Mine Localization System based on Wireless Sensor Networks
2013, 13 (
2
): 0-0.
Abstract
(
126
)
PDF
(643KB) (
125
)
NULL
Related Articles
|
Metrics
Select
RFID-based School Bus Personnel Security Management System
2013, 13 (
2
): 0-0.
Abstract
(
157
)
PDF
(155KB) (
145
)
NULL
Related Articles
|
Metrics
Select
Researches on the Technologies of Hard Disk Data Recovery
2013, 13 (
2
): 0-0.
Abstract
(
215
)
PDF
(647KB) (
551
)
NULL
Related Articles
|
Metrics
Select
Research Progress and Key Technologies on Future Internet
2013, 13 (
2
): 0-0.
Abstract
(
174
)
PDF
(662KB) (
168
)
NULL
Related Articles
|
Metrics
Select
Security Analysis of RFID Systems
2013, 13 (
2
): 0-0.
Abstract
(
147
)
PDF
(227KB) (
395
)
NULL
Related Articles
|
Metrics
Select
The Analysis and Research of PKI Cross-certification Technology from The View of "Super Online Banking System"
2013, 13 (
2
): 0-0.
Abstract
(
174
)
PDF
(1166KB) (
191
)
NULL
Related Articles
|
Metrics
Select
The Mining System of Social Relationship Networking based on Microblogging
2013, 13 (
2
): 0-0.
Abstract
(
186
)
PDF
(1596KB) (
1348
)
NULL
Related Articles
|
Metrics