Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 February 2013, Volume 13 Issue 2
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
254
)
PDF
(1021KB) (
142
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
115
)
PDF
(521KB) (
28
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
170
)
PDF
(2560KB) (
30
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
104
)
PDF
(2065KB) (
53
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
144
)
PDF
(520KB) (
80
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
2
): 0-0.
Abstract
(
159
)
PDF
(1024KB) (
183
)
NULL
Related Articles
|
Metrics
Select
An Analysis of U.S.Federal Cloud Computing Security Policies
2013, 13 (
2
): 0-0.
Abstract
(
185
)
PDF
(1159KB) (
484
)
NULL
Related Articles
|
Metrics
Select
The Application of Genetic Algorithms in The Data Analysis in The Social Networking Site
2013, 13 (
2
): 0-0.
Abstract
(
166
)
PDF
(301KB) (
300
)
NULL
Related Articles
|
Metrics
Select
Algorithm of Constructing Decision Tree based on the Leaf and Branch Ratio
2013, 13 (
2
): 0-0.
Abstract
(
208
)
PDF
(260KB) (
186
)
NULL
Related Articles
|
Metrics
Select
The Study on User Privacy Protection Scheme in Content Centric Networking
2013, 13 (
2
): 0-0.
Abstract
(
108
)
PDF
(737KB) (
173
)
NULL
Related Articles
|
Metrics
Select
Create Secure Login Desktop based on Credential Providers for Win7
2013, 13 (
2
): 0-0.
Abstract
(
200
)
PDF
(1166KB) (
239
)
NULL
Related Articles
|
Metrics
Select
Face Recognition Method in Robot Vision based on Panorama Synthesis
2013, 13 (
2
): 0-0.
Abstract
(
226
)
PDF
(2617KB) (
258
)
NULL
Related Articles
|
Metrics
Select
Research and Achievement of Intrusion Detection System based on Android Platform
2013, 13 (
2
): 0-0.
Abstract
(
224
)
PDF
(206KB) (
450
)
NULL
Related Articles
|
Metrics
Select
A Strategy-based Android Application Detection System
2013, 13 (
2
): 0-0.
Abstract
(
216
)
PDF
(823KB) (
847
)
NULL
Related Articles
|
Metrics
Select
The Users Scene Info Leakage Prevention System based on the Android Smartphone Research and Implementation
2013, 13 (
2
): 0-0.
Abstract
(
154
)
PDF
(649KB) (
210
)
NULL
Related Articles
|
Metrics
Select
The Detection of Hidden Process Technology based on Thread Scheduling
2013, 13 (
2
): 0-0.
Abstract
(
174
)
PDF
(669KB) (
765
)
NULL
Related Articles
|
Metrics
Select
A Distributed and Autonomic Resource Management Mechanism in Network Virtualization
2013, 13 (
2
): 0-0.
Abstract
(
125
)
PDF
(246KB) (
98
)
NULL
Related Articles
|
Metrics
Select
A LAN Security System Model and Its Key Technology Research
2013, 13 (
2
): 0-0.
Abstract
(
206
)
PDF
(657KB) (
176
)
NULL
Related Articles
|
Metrics
Select
Voice Transmission System for Mobile Communication Network
2013, 13 (
2
): 0-0.
Abstract
(
218
)
PDF
(2642KB) (
248
)
NULL
Related Articles
|
Metrics
Select
A Research on Automatic Penetration Testing based on Metasploit Framework
2013, 13 (
2
): 0-0.
Abstract
(
197
)
PDF
(725KB) (
1218
)
NULL
Related Articles
|
Metrics
Select
N-gram of Expanded Hot Path Approach to Software Birthmarking
2013, 13 (
2
): 0-0.
Abstract
(
163
)
PDF
(266KB) (
139
)
NULL
Related Articles
|
Metrics
Select
The Security Analysis and Discuss of Non-contact Smart Card
2013, 13 (
2
): 0-0.
Abstract
(
162
)
PDF
(701KB) (
260
)
NULL
Related Articles
|
Metrics
Select
Research of Mine Localization System based on Wireless Sensor Networks
2013, 13 (
2
): 0-0.
Abstract
(
159
)
PDF
(643KB) (
133
)
NULL
Related Articles
|
Metrics
Select
RFID-based School Bus Personnel Security Management System
2013, 13 (
2
): 0-0.
Abstract
(
195
)
PDF
(155KB) (
150
)
NULL
Related Articles
|
Metrics
Select
Researches on the Technologies of Hard Disk Data Recovery
2013, 13 (
2
): 0-0.
Abstract
(
246
)
PDF
(647KB) (
587
)
NULL
Related Articles
|
Metrics
Select
Research Progress and Key Technologies on Future Internet
2013, 13 (
2
): 0-0.
Abstract
(
184
)
PDF
(662KB) (
191
)
NULL
Related Articles
|
Metrics
Select
Security Analysis of RFID Systems
2013, 13 (
2
): 0-0.
Abstract
(
181
)
PDF
(227KB) (
409
)
NULL
Related Articles
|
Metrics
Select
The Analysis and Research of PKI Cross-certification Technology from The View of "Super Online Banking System"
2013, 13 (
2
): 0-0.
Abstract
(
196
)
PDF
(1166KB) (
219
)
NULL
Related Articles
|
Metrics
Select
The Mining System of Social Relationship Networking based on Microblogging
2013, 13 (
2
): 0-0.
Abstract
(
211
)
PDF
(1596KB) (
1397
)
NULL
Related Articles
|
Metrics