Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 April 2013, Volume 13 Issue 4
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
NULL
2013, 13 (
4
): 0-0.
Abstract
(
193
)
PDF
(515KB) (
74
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
4
): 0-0.
Abstract
(
152
)
PDF
(527KB) (
162
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
4
): 0-0.
Abstract
(
122
)
PDF
(1042KB) (
213
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
4
): 0-0.
Abstract
(
127
)
PDF
(1027KB) (
131
)
NULL
Related Articles
|
Metrics
Select
VMware Application of Virtual Technology in the Construction of the Fire Service Platform
2013, 13 (
4
): 0-0.
Abstract
(
113
)
PDF
(654KB) (
142
)
NULL
Related Articles
|
Metrics
Select
Research on Security of Network Examination System based on Java Web Start Technology
2013, 13 (
4
): 0-0.
Abstract
(
96
)
PDF
(216KB) (
175
)
NULL
Related Articles
|
Metrics
Select
The Review of File System Forensic Techniques
2013, 13 (
4
): 0-0.
Abstract
(
143
)
PDF
(221KB) (
268
)
NULL
Related Articles
|
Metrics
Select
Security Problems in the Microblog and Their Solutions
2013, 13 (
4
): 0-0.
Abstract
(
121
)
PDF
(321KB) (
206
)
NULL
Related Articles
|
Metrics
Select
Study on Application of Depth Searching in Public Opinion Control System
2013, 13 (
4
): 0-0.
Abstract
(
144
)
PDF
(587KB) (
105
)
NULL
Related Articles
|
Metrics
Select
Research on Technical Hierarchical Architecture of Government Affairs Networks Security Planning
2013, 13 (
4
): 0-0.
Abstract
(
132
)
PDF
(314KB) (
142
)
NULL
Related Articles
|
Metrics
Select
Radio and Television Network Important Data Storage Security Analysis
2013, 13 (
4
): 0-0.
Abstract
(
151
)
PDF
(1535KB) (
147
)
NULL
Related Articles
|
Metrics
Select
Research of APT Attack Operations based on UML
2013, 13 (
4
): 0-0.
Abstract
(
151
)
PDF
(1576KB) (
577
)
NULL
Related Articles
|
Metrics
Select
Study on Virus Signatures based on Matching in Virus-detecting Technologies
2013, 13 (
4
): 0-0.
Abstract
(
90
)
PDF
(2193KB) (
172
)
NULL
Related Articles
|
Metrics
Select
Research on Moving Target Tracking in Application-oriented Robot Integrated Machine Scheme
2013, 13 (
4
): 0-0.
Abstract
(
185
)
PDF
(1694KB) (
176
)
NULL
Related Articles
|
Metrics
Select
Based on the Voice Print Android Mobile Access Control and File Encryption System
2013, 13 (
4
): 0-0.
Abstract
(
146
)
PDF
(2175KB) (
156
)
NULL
Related Articles
|
Metrics
Select
A Research and the Realization of a PE-Virus Infection Redirector
2013, 13 (
4
): 0-0.
Abstract
(
165
)
PDF
(2058KB) (
171
)
NULL
Related Articles
|
Metrics
Select
Design and Realization of SSL VPN System with Data Forwarding
2013, 13 (
4
): 0-0.
Abstract
(
107
)
PDF
(1089KB) (
473
)
NULL
Related Articles
|
Metrics
Select
The Research of Testing the E-cmmerce Website based on.NET
2013, 13 (
4
): 0-0.
Abstract
(
130
)
PDF
(1160KB) (
127
)
NULL
Related Articles
|
Metrics
Select
Zigbee Based Monitoring System on Wind Farm
2013, 13 (
4
): 0-0.
Abstract
(
147
)
PDF
(1097KB) (
83
)
NULL
Related Articles
|
Metrics
Select
Method Generating Smooth Closed B-spline Curves Using Adjacent Vertices Chord Length Parameters Interpolation
2013, 13 (
4
): 0-0.
Abstract
(
183
)
PDF
(712KB) (
315
)
NULL
Related Articles
|
Metrics
Select
The Analysis of MAC Optimization Technology in 802.11 Standards
2013, 13 (
4
): 0-0.
Abstract
(
163
)
PDF
(197KB) (
322
)
NULL
Related Articles
|
Metrics
Select
The Realization and Application of NDIS Data Filtering
2013, 13 (
4
): 0-0.
Abstract
(
138
)
PDF
(1616KB) (
137
)
NULL
Related Articles
|
Metrics
Select
A Design of the Data Sharing between the Fire Control and Dispatch Network and the Fire Service Information Network
2013, 13 (
4
): 0-0.
Abstract
(
192
)
PDF
(1550KB) (
115
)
NULL
Related Articles
|
Metrics
Select
Research on the Security of WLAN Wireless Access Equipment
2013, 13 (
4
): 0-0.
Abstract
(
163
)
PDF
(1573KB) (
127
)
NULL
Related Articles
|
Metrics
Select
Smartphone Internet Security Analysis and Prevention
2013, 13 (
4
): 0-0.
Abstract
(
103
)
PDF
(232KB) (
147
)
NULL
Related Articles
|
Metrics
Select
Research on Mobile Office Security Communication System based on Special Process
2013, 13 (
4
): 0-0.
Abstract
(
174
)
PDF
(722KB) (
200
)
NULL
Related Articles
|
Metrics
Select
Cloud Storage System Support for Existence Verification
2013, 13 (
4
): 0-0.
Abstract
(
124
)
PDF
(738KB) (
236
)
NULL
Related Articles
|
Metrics
Select
A Safe Cloud Storage Solution based on Secret Sharing
2013, 13 (
4
): 0-0.
Abstract
(
126
)
PDF
(664KB) (
406
)
NULL
Related Articles
|
Metrics
Select
Research on False Negative in Keyword Search
2013, 13 (
4
): 0-0.
Abstract
(
136
)
PDF
(578KB) (
131
)
NULL
Related Articles
|
Metrics
Select
Practice and Research of Data Recovery
2013, 13 (
4
): 0-0.
Abstract
(
96
)
PDF
(1118KB) (
69
)
NULL
Related Articles
|
Metrics
Select
The Design of the New-type Network Monitoring Architecture based on the Cloud Computing Technology
2013, 13 (
4
): 0-0.
Abstract
(
99
)
PDF
(203KB) (
61
)
NULL
Related Articles
|
Metrics