Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 June 2013, Volume 13 Issue 5
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Research of the Fast Attack Method for the SQL Blind Injection
2013, 13 (
5
): 0-0.
Abstract
(
270
)
PDF
(269KB) (
231
)
NULL
Related Articles
|
Metrics
Select
A Publicly Verifiable Encryption Scheme
2013, 13 (
5
): 0-0.
Abstract
(
199
)
PDF
(645KB) (
76
)
NULL
Related Articles
|
Metrics
Select
Analysis of User Activity based on Shortcut Files in Recent Folder
2013, 13 (
5
): 0-0.
Abstract
(
137
)
PDF
(1553KB) (
235
)
NULL
Related Articles
|
Metrics
Select
Detecting Distributed Denial of Service Attack based on Multi-Feature Fusion
2013, 13 (
5
): 0-0.
Abstract
(
145
)
PDF
(1159KB) (
215
)
NULL
Related Articles
|
Metrics
Select
Attacks in QR Code and Defending Countermeasures
2013, 13 (
5
): 0-0.
Abstract
(
203
)
PDF
(702KB) (
118
)
NULL
Related Articles
|
Metrics
Select
Methods on Extracting Modified Time of Computer System based on Log
2013, 13 (
5
): 0-0.
Abstract
(
157
)
PDF
(568KB) (
189
)
NULL
Related Articles
|
Metrics
Select
The Analysis of Internet Security Events Propagation Path based on Causality
2013, 13 (
5
): 0-0.
Abstract
(
101
)
PDF
(645KB) (
101
)
NULL
Related Articles
|
Metrics
Select
Active Vulnerability Detection and Fix System
2013, 13 (
5
): 0-0.
Abstract
(
152
)
PDF
(1166KB) (
130
)
NULL
Related Articles
|
Metrics
Select
The Design and Implementation of System of Password Compromise Algorithm based on Space-time Analysis
2013, 13 (
5
): 0-0.
Abstract
(
221
)
PDF
(1677KB) (
163
)
NULL
Related Articles
|
Metrics
Select
Design and Evaluation about Reliability of the OLTP System based on FMEA
2013, 13 (
5
): 0-0.
Abstract
(
152
)
PDF
(797KB) (
164
)
NULL
Related Articles
|
Metrics
Select
System Design and Implementation of Spam Collection based on Honeypot Technology
2013, 13 (
5
): 0-0.
Abstract
(
108
)
PDF
(1689KB) (
62
)
NULL
Related Articles
|
Metrics
Select
The Design and Implementation of the Uniform Information Security Monitoring System
2013, 13 (
5
): 0-0.
Abstract
(
155
)
PDF
(655KB) (
128
)
NULL
Related Articles
|
Metrics
Select
Design and Implementation of Nagios based Switch Monitoring System
2013, 13 (
5
): 0-0.
Abstract
(
136
)
PDF
(1145KB) (
101
)
NULL
Related Articles
|
Metrics
Select
Research and Design of Network-Based Vulnerabilities Scan System
2013, 13 (
5
): 0-0.
Abstract
(
141
)
PDF
(197KB) (
340
)
NULL
Related Articles
|
Metrics
Select
Secure Mobile Client based on Bilinear Signature
2013, 13 (
5
): 0-0.
Abstract
(
150
)
PDF
(236KB) (
71
)
NULL
Related Articles
|
Metrics
Select
A Parallel Gauss-Jordan Elimination Algorithm for Solving Linear Equations Using OpenMP Technology
2013, 13 (
5
): 0-0.
Abstract
(
142
)
PDF
(662KB) (
111
)
NULL
Related Articles
|
Metrics
Select
Overview of Data Layout Algorithm of Storage System
2013, 13 (
5
): 0-0.
Abstract
(
80
)
PDF
(478KB) (
96
)
NULL
Related Articles
|
Metrics
Select
The Study on Indicator System of Website Credibility Evaluation
2013, 13 (
5
): 0-0.
Abstract
(
101
)
PDF
(302KB) (
58
)
NULL
Related Articles
|
Metrics
Select
The Design and Implementation of Enterprise Information Security Architecture based on Mobile Terminal
2013, 13 (
5
): 0-0.
Abstract
(
123
)
PDF
(653KB) (
194
)
NULL
Related Articles
|
Metrics
Select
The Research of VoIP Crime Characteristics and its Countermeasures
2013, 13 (
5
): 0-0.
Abstract
(
59
)
PDF
(217KB) (
107
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
5
): 0-0.
Abstract
(
128
)
PDF
(516KB) (
109
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
5
): 0-0.
Abstract
(
91
)
PDF
(599KB) (
71
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
5
): 0-0.
Abstract
(
102
)
PDF
(1029KB) (
51
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
5
): 0-0.
Abstract
(
97
)
PDF
(3579KB) (
48
)
NULL
Related Articles
|
Metrics
Select
The Information Security Protection in Software Testing
2013, 13 (
5
): 0-0.
Abstract
(
159
)
PDF
(1175KB) (
267
)
NULL
Related Articles
|
Metrics
Select
The Safe Application of LT Code in Broadcasts in the System based on the DVB-S2 Document
2013, 13 (
5
): 0-0.
Abstract
(
126
)
PDF
(650KB) (
136
)
NULL
Related Articles
|
Metrics
Select
Electronic Voting Scheme based on LWE Homomorphic Encryption
2013, 13 (
5
): 0-0.
Abstract
(
145
)
PDF
(284KB) (
147
)
NULL
Related Articles
|
Metrics
Select
The Research of Oracle Database Automatic Search Method
2013, 13 (
5
): 0-0.
Abstract
(
302
)
PDF
(1094KB) (
139
)
NULL
Related Articles
|
Metrics