Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 February 2013, Volume 13 Issue 2
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
192
)
PDF
(1021KB) (
100
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
103
)
PDF
(521KB) (
24
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
146
)
PDF
(2560KB) (
26
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
91
)
PDF
(2065KB) (
50
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
124
)
PDF
(520KB) (
77
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
115
)
PDF
(1024KB) (
136
)
NULL
Related Articles
|
Metrics
Select
An Analysis of U.S.Federal Cloud Computing Security Policies
2013, 13 (
2
): 0-0.
Abstract
(
127
)
PDF
(1159KB) (
430
)
NULL
Related Articles
|
Metrics
Select
The Application of Genetic Algorithms in The Data Analysis in The Social Networking Site
2013, 13 (
2
): 0-0.
Abstract
(
140
)
PDF
(301KB) (
244
)
NULL
Related Articles
|
Metrics
Select
Algorithm of Constructing Decision Tree based on the Leaf and Branch Ratio
2013, 13 (
2
): 0-0.
Abstract
(
162
)
PDF
(260KB) (
162
)
NULL
Related Articles
|
Metrics
Select
The Study on User Privacy Protection Scheme in Content Centric Networking
2013, 13 (
2
): 0-0.
Abstract
(
93
)
PDF
(737KB) (
141
)
NULL
Related Articles
|
Metrics
Select
Create Secure Login Desktop based on Credential Providers for Win7
2013, 13 (
2
): 0-0.
Abstract
(
146
)
PDF
(1166KB) (
180
)
NULL
Related Articles
|
Metrics
Select
Face Recognition Method in Robot Vision based on Panorama Synthesis
2013, 13 (
2
): 0-0.
Abstract
(
203
)
PDF
(2617KB) (
245
)
NULL
Related Articles
|
Metrics
Select
Research and Achievement of Intrusion Detection System based on Android Platform
2013, 13 (
2
): 0-0.
Abstract
(
197
)
PDF
(206KB) (
398
)
NULL
Related Articles
|
Metrics
Select
A Strategy-based Android Application Detection System
2013, 13 (
2
): 0-0.
Abstract
(
166
)
PDF
(823KB) (
812
)
NULL
Related Articles
|
Metrics
Select
The Users Scene Info Leakage Prevention System based on the Android Smartphone Research and Implementation
2013, 13 (
2
): 0-0.
Abstract
(
117
)
PDF
(649KB) (
169
)
NULL
Related Articles
|
Metrics
Select
The Detection of Hidden Process Technology based on Thread Scheduling
2013, 13 (
2
): 0-0.
Abstract
(
153
)
PDF
(669KB) (
647
)
NULL
Related Articles
|
Metrics
Select
A Distributed and Autonomic Resource Management Mechanism in Network Virtualization
2013, 13 (
2
): 0-0.
Abstract
(
92
)
PDF
(246KB) (
85
)
NULL
Related Articles
|
Metrics
Select
A LAN Security System Model and Its Key Technology Research
2013, 13 (
2
): 0-0.
Abstract
(
161
)
PDF
(657KB) (
144
)
NULL
Related Articles
|
Metrics
Select
Voice Transmission System for Mobile Communication Network
2013, 13 (
2
): 0-0.
Abstract
(
164
)
PDF
(2642KB) (
240
)
NULL
Related Articles
|
Metrics
Select
A Research on Automatic Penetration Testing based on Metasploit Framework
2013, 13 (
2
): 0-0.
Abstract
(
168
)
PDF
(725KB) (
1017
)
NULL
Related Articles
|
Metrics
Select
N-gram of Expanded Hot Path Approach to Software Birthmarking
2013, 13 (
2
): 0-0.
Abstract
(
141
)
PDF
(266KB) (
108
)
NULL
Related Articles
|
Metrics
Select
The Security Analysis and Discuss of Non-contact Smart Card
2013, 13 (
2
): 0-0.
Abstract
(
124
)
PDF
(701KB) (
166
)
NULL
Related Articles
|
Metrics
Select
Research of Mine Localization System based on Wireless Sensor Networks
2013, 13 (
2
): 0-0.
Abstract
(
121
)
PDF
(643KB) (
112
)
NULL
Related Articles
|
Metrics
Select
RFID-based School Bus Personnel Security Management System
2013, 13 (
2
): 0-0.
Abstract
(
144
)
PDF
(155KB) (
135
)
NULL
Related Articles
|
Metrics
Select
Researches on the Technologies of Hard Disk Data Recovery
2013, 13 (
2
): 0-0.
Abstract
(
208
)
PDF
(647KB) (
521
)
NULL
Related Articles
|
Metrics
Select
Research Progress and Key Technologies on Future Internet
2013, 13 (
2
): 0-0.
Abstract
(
163
)
PDF
(662KB) (
142
)
NULL
Related Articles
|
Metrics
Select
Security Analysis of RFID Systems
2013, 13 (
2
): 0-0.
Abstract
(
137
)
PDF
(227KB) (
374
)
NULL
Related Articles
|
Metrics
Select
The Analysis and Research of PKI Cross-certification Technology from The View of "Super Online Banking System"
2013, 13 (
2
): 0-0.
Abstract
(
160
)
PDF
(1166KB) (
175
)
NULL
Related Articles
|
Metrics
Select
The Mining System of Social Relationship Networking based on Microblogging
2013, 13 (
2
): 0-0.
Abstract
(
177
)
PDF
(1596KB) (
1321
)
NULL
Related Articles
|
Metrics