Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 June 2013, Volume 13 Issue 5
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Research of the Fast Attack Method for the SQL Blind Injection
2013, 13 (
5
): 0-0.
Abstract
(
303
)
PDF
(269KB) (
287
)
NULL
Related Articles
|
Metrics
Select
A Publicly Verifiable Encryption Scheme
2013, 13 (
5
): 0-0.
Abstract
(
207
)
PDF
(645KB) (
82
)
NULL
Related Articles
|
Metrics
Select
Analysis of User Activity based on Shortcut Files in Recent Folder
2013, 13 (
5
): 0-0.
Abstract
(
151
)
PDF
(1553KB) (
251
)
NULL
Related Articles
|
Metrics
Select
Detecting Distributed Denial of Service Attack based on Multi-Feature Fusion
2013, 13 (
5
): 0-0.
Abstract
(
154
)
PDF
(1159KB) (
242
)
NULL
Related Articles
|
Metrics
Select
Attacks in QR Code and Defending Countermeasures
2013, 13 (
5
): 0-0.
Abstract
(
220
)
PDF
(702KB) (
164
)
NULL
Related Articles
|
Metrics
Select
Methods on Extracting Modified Time of Computer System based on Log
2013, 13 (
5
): 0-0.
Abstract
(
163
)
PDF
(568KB) (
278
)
NULL
Related Articles
|
Metrics
Select
The Analysis of Internet Security Events Propagation Path based on Causality
2013, 13 (
5
): 0-0.
Abstract
(
115
)
PDF
(645KB) (
113
)
NULL
Related Articles
|
Metrics
Select
Active Vulnerability Detection and Fix System
2013, 13 (
5
): 0-0.
Abstract
(
158
)
PDF
(1166KB) (
135
)
NULL
Related Articles
|
Metrics
Select
The Design and Implementation of System of Password Compromise Algorithm based on Space-time Analysis
2013, 13 (
5
): 0-0.
Abstract
(
232
)
PDF
(1677KB) (
186
)
NULL
Related Articles
|
Metrics
Select
Design and Evaluation about Reliability of the OLTP System based on FMEA
2013, 13 (
5
): 0-0.
Abstract
(
157
)
PDF
(797KB) (
171
)
NULL
Related Articles
|
Metrics
Select
System Design and Implementation of Spam Collection based on Honeypot Technology
2013, 13 (
5
): 0-0.
Abstract
(
115
)
PDF
(1689KB) (
68
)
NULL
Related Articles
|
Metrics
Select
The Design and Implementation of the Uniform Information Security Monitoring System
2013, 13 (
5
): 0-0.
Abstract
(
163
)
PDF
(655KB) (
155
)
NULL
Related Articles
|
Metrics
Select
Design and Implementation of Nagios based Switch Monitoring System
2013, 13 (
5
): 0-0.
Abstract
(
152
)
PDF
(1145KB) (
133
)
NULL
Related Articles
|
Metrics
Select
Research and Design of Network-Based Vulnerabilities Scan System
2013, 13 (
5
): 0-0.
Abstract
(
147
)
PDF
(197KB) (
404
)
NULL
Related Articles
|
Metrics
Select
Secure Mobile Client based on Bilinear Signature
2013, 13 (
5
): 0-0.
Abstract
(
159
)
PDF
(236KB) (
89
)
NULL
Related Articles
|
Metrics
Select
A Parallel Gauss-Jordan Elimination Algorithm for Solving Linear Equations Using OpenMP Technology
2013, 13 (
5
): 0-0.
Abstract
(
152
)
PDF
(662KB) (
120
)
NULL
Related Articles
|
Metrics
Select
Overview of Data Layout Algorithm of Storage System
2013, 13 (
5
): 0-0.
Abstract
(
89
)
PDF
(478KB) (
110
)
NULL
Related Articles
|
Metrics
Select
The Study on Indicator System of Website Credibility Evaluation
2013, 13 (
5
): 0-0.
Abstract
(
107
)
PDF
(302KB) (
83
)
NULL
Related Articles
|
Metrics
Select
The Design and Implementation of Enterprise Information Security Architecture based on Mobile Terminal
2013, 13 (
5
): 0-0.
Abstract
(
141
)
PDF
(653KB) (
406
)
NULL
Related Articles
|
Metrics
Select
The Research of VoIP Crime Characteristics and its Countermeasures
2013, 13 (
5
): 0-0.
Abstract
(
70
)
PDF
(217KB) (
133
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
5
): 0-0.
Abstract
(
131
)
PDF
(516KB) (
132
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
5
): 0-0.
Abstract
(
93
)
PDF
(599KB) (
75
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
5
): 0-0.
Abstract
(
105
)
PDF
(1029KB) (
55
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
5
): 0-0.
Abstract
(
100
)
PDF
(3579KB) (
85
)
NULL
Related Articles
|
Metrics
Select
The Information Security Protection in Software Testing
2013, 13 (
5
): 0-0.
Abstract
(
185
)
PDF
(1175KB) (
287
)
NULL
Related Articles
|
Metrics
Select
The Safe Application of LT Code in Broadcasts in the System based on the DVB-S2 Document
2013, 13 (
5
): 0-0.
Abstract
(
133
)
PDF
(650KB) (
156
)
NULL
Related Articles
|
Metrics
Select
Electronic Voting Scheme based on LWE Homomorphic Encryption
2013, 13 (
5
): 0-0.
Abstract
(
167
)
PDF
(284KB) (
171
)
NULL
Related Articles
|
Metrics
Select
The Research of Oracle Database Automatic Search Method
2013, 13 (
5
): 0-0.
Abstract
(
309
)
PDF
(1094KB) (
153
)
NULL
Related Articles
|
Metrics