Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 June 2013, Volume 13 Issue 5
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Research of the Fast Attack Method for the SQL Blind Injection
2013, 13 (
5
): 0-0.
Abstract
(
319
)
PDF
(269KB) (
377
)
NULL
Related Articles
|
Metrics
Select
A Publicly Verifiable Encryption Scheme
2013, 13 (
5
): 0-0.
Abstract
(
216
)
PDF
(645KB) (
92
)
NULL
Related Articles
|
Metrics
Select
Analysis of User Activity based on Shortcut Files in Recent Folder
2013, 13 (
5
): 0-0.
Abstract
(
161
)
PDF
(1553KB) (
262
)
NULL
Related Articles
|
Metrics
Select
Detecting Distributed Denial of Service Attack based on Multi-Feature Fusion
2013, 13 (
5
): 0-0.
Abstract
(
166
)
PDF
(1159KB) (
272
)
NULL
Related Articles
|
Metrics
Select
Attacks in QR Code and Defending Countermeasures
2013, 13 (
5
): 0-0.
Abstract
(
236
)
PDF
(702KB) (
189
)
NULL
Related Articles
|
Metrics
Select
Methods on Extracting Modified Time of Computer System based on Log
2013, 13 (
5
): 0-0.
Abstract
(
182
)
PDF
(568KB) (
335
)
NULL
Related Articles
|
Metrics
Select
The Analysis of Internet Security Events Propagation Path based on Causality
2013, 13 (
5
): 0-0.
Abstract
(
132
)
PDF
(645KB) (
138
)
NULL
Related Articles
|
Metrics
Select
Active Vulnerability Detection and Fix System
2013, 13 (
5
): 0-0.
Abstract
(
172
)
PDF
(1166KB) (
141
)
NULL
Related Articles
|
Metrics
Select
The Design and Implementation of System of Password Compromise Algorithm based on Space-time Analysis
2013, 13 (
5
): 0-0.
Abstract
(
253
)
PDF
(1677KB) (
198
)
NULL
Related Articles
|
Metrics
Select
Design and Evaluation about Reliability of the OLTP System based on FMEA
2013, 13 (
5
): 0-0.
Abstract
(
165
)
PDF
(797KB) (
183
)
NULL
Related Articles
|
Metrics
Select
System Design and Implementation of Spam Collection based on Honeypot Technology
2013, 13 (
5
): 0-0.
Abstract
(
130
)
PDF
(1689KB) (
76
)
NULL
Related Articles
|
Metrics
Select
The Design and Implementation of the Uniform Information Security Monitoring System
2013, 13 (
5
): 0-0.
Abstract
(
173
)
PDF
(655KB) (
182
)
NULL
Related Articles
|
Metrics
Select
Design and Implementation of Nagios based Switch Monitoring System
2013, 13 (
5
): 0-0.
Abstract
(
164
)
PDF
(1145KB) (
153
)
NULL
Related Articles
|
Metrics
Select
Research and Design of Network-Based Vulnerabilities Scan System
2013, 13 (
5
): 0-0.
Abstract
(
157
)
PDF
(197KB) (
481
)
NULL
Related Articles
|
Metrics
Select
Secure Mobile Client based on Bilinear Signature
2013, 13 (
5
): 0-0.
Abstract
(
165
)
PDF
(236KB) (
111
)
NULL
Related Articles
|
Metrics
Select
A Parallel Gauss-Jordan Elimination Algorithm for Solving Linear Equations Using OpenMP Technology
2013, 13 (
5
): 0-0.
Abstract
(
162
)
PDF
(662KB) (
152
)
NULL
Related Articles
|
Metrics
Select
Overview of Data Layout Algorithm of Storage System
2013, 13 (
5
): 0-0.
Abstract
(
98
)
PDF
(478KB) (
122
)
NULL
Related Articles
|
Metrics
Select
The Study on Indicator System of Website Credibility Evaluation
2013, 13 (
5
): 0-0.
Abstract
(
119
)
PDF
(302KB) (
96
)
NULL
Related Articles
|
Metrics
Select
The Design and Implementation of Enterprise Information Security Architecture based on Mobile Terminal
2013, 13 (
5
): 0-0.
Abstract
(
151
)
PDF
(653KB) (
509
)
NULL
Related Articles
|
Metrics
Select
The Research of VoIP Crime Characteristics and its Countermeasures
2013, 13 (
5
): 0-0.
Abstract
(
77
)
PDF
(217KB) (
156
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
5
): 0-0.
Abstract
(
139
)
PDF
(516KB) (
202
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
5
): 0-0.
Abstract
(
99
)
PDF
(599KB) (
83
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
5
): 0-0.
Abstract
(
112
)
PDF
(1029KB) (
60
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
5
): 0-0.
Abstract
(
111
)
PDF
(3579KB) (
100
)
NULL
Related Articles
|
Metrics
Select
The Information Security Protection in Software Testing
2013, 13 (
5
): 0-0.
Abstract
(
196
)
PDF
(1175KB) (
302
)
NULL
Related Articles
|
Metrics
Select
The Safe Application of LT Code in Broadcasts in the System based on the DVB-S2 Document
2013, 13 (
5
): 0-0.
Abstract
(
144
)
PDF
(650KB) (
192
)
NULL
Related Articles
|
Metrics
Select
Electronic Voting Scheme based on LWE Homomorphic Encryption
2013, 13 (
5
): 0-0.
Abstract
(
175
)
PDF
(284KB) (
188
)
NULL
Related Articles
|
Metrics
Select
The Research of Oracle Database Automatic Search Method
2013, 13 (
5
): 0-0.
Abstract
(
315
)
PDF
(1094KB) (
175
)
NULL
Related Articles
|
Metrics