Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 June 2013, Volume 13 Issue 5
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Research of the Fast Attack Method for the SQL Blind Injection
2013, 13 (
5
): 0-0.
Abstract
(
372
)
PDF
(269KB) (
454
)
NULL
Related Articles
|
Metrics
Select
A Publicly Verifiable Encryption Scheme
2013, 13 (
5
): 0-0.
Abstract
(
226
)
PDF
(645KB) (
96
)
NULL
Related Articles
|
Metrics
Select
Analysis of User Activity based on Shortcut Files in Recent Folder
2013, 13 (
5
): 0-0.
Abstract
(
183
)
PDF
(1553KB) (
273
)
NULL
Related Articles
|
Metrics
Select
Detecting Distributed Denial of Service Attack based on Multi-Feature Fusion
2013, 13 (
5
): 0-0.
Abstract
(
199
)
PDF
(1159KB) (
290
)
NULL
Related Articles
|
Metrics
Select
Attacks in QR Code and Defending Countermeasures
2013, 13 (
5
): 0-0.
Abstract
(
258
)
PDF
(702KB) (
206
)
NULL
Related Articles
|
Metrics
Select
Methods on Extracting Modified Time of Computer System based on Log
2013, 13 (
5
): 0-0.
Abstract
(
214
)
PDF
(568KB) (
429
)
NULL
Related Articles
|
Metrics
Select
The Analysis of Internet Security Events Propagation Path based on Causality
2013, 13 (
5
): 0-0.
Abstract
(
154
)
PDF
(645KB) (
141
)
NULL
Related Articles
|
Metrics
Select
Active Vulnerability Detection and Fix System
2013, 13 (
5
): 0-0.
Abstract
(
214
)
PDF
(1166KB) (
143
)
NULL
Related Articles
|
Metrics
Select
The Design and Implementation of System of Password Compromise Algorithm based on Space-time Analysis
2013, 13 (
5
): 0-0.
Abstract
(
280
)
PDF
(1677KB) (
208
)
NULL
Related Articles
|
Metrics
Select
Design and Evaluation about Reliability of the OLTP System based on FMEA
2013, 13 (
5
): 0-0.
Abstract
(
178
)
PDF
(797KB) (
249
)
NULL
Related Articles
|
Metrics
Select
System Design and Implementation of Spam Collection based on Honeypot Technology
2013, 13 (
5
): 0-0.
Abstract
(
172
)
PDF
(1689KB) (
77
)
NULL
Related Articles
|
Metrics
Select
The Design and Implementation of the Uniform Information Security Monitoring System
2013, 13 (
5
): 0-0.
Abstract
(
192
)
PDF
(655KB) (
196
)
NULL
Related Articles
|
Metrics
Select
Design and Implementation of Nagios based Switch Monitoring System
2013, 13 (
5
): 0-0.
Abstract
(
196
)
PDF
(1145KB) (
169
)
NULL
Related Articles
|
Metrics
Select
Research and Design of Network-Based Vulnerabilities Scan System
2013, 13 (
5
): 0-0.
Abstract
(
178
)
PDF
(197KB) (
545
)
NULL
Related Articles
|
Metrics
Select
Secure Mobile Client based on Bilinear Signature
2013, 13 (
5
): 0-0.
Abstract
(
174
)
PDF
(236KB) (
132
)
NULL
Related Articles
|
Metrics
Select
A Parallel Gauss-Jordan Elimination Algorithm for Solving Linear Equations Using OpenMP Technology
2013, 13 (
5
): 0-0.
Abstract
(
171
)
PDF
(662KB) (
188
)
NULL
Related Articles
|
Metrics
Select
Overview of Data Layout Algorithm of Storage System
2013, 13 (
5
): 0-0.
Abstract
(
114
)
PDF
(478KB) (
130
)
NULL
Related Articles
|
Metrics
Select
The Study on Indicator System of Website Credibility Evaluation
2013, 13 (
5
): 0-0.
Abstract
(
149
)
PDF
(302KB) (
108
)
NULL
Related Articles
|
Metrics
Select
The Design and Implementation of Enterprise Information Security Architecture based on Mobile Terminal
2013, 13 (
5
): 0-0.
Abstract
(
169
)
PDF
(653KB) (
543
)
NULL
Related Articles
|
Metrics
Select
The Research of VoIP Crime Characteristics and its Countermeasures
2013, 13 (
5
): 0-0.
Abstract
(
126
)
PDF
(217KB) (
183
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
5
): 0-0.
Abstract
(
164
)
PDF
(516KB) (
243
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
5
): 0-0.
Abstract
(
116
)
PDF
(599KB) (
84
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
5
): 0-0.
Abstract
(
140
)
PDF
(1029KB) (
67
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
5
): 0-0.
Abstract
(
120
)
PDF
(3579KB) (
116
)
NULL
Related Articles
|
Metrics
Select
The Information Security Protection in Software Testing
2013, 13 (
5
): 0-0.
Abstract
(
228
)
PDF
(1175KB) (
327
)
NULL
Related Articles
|
Metrics
Select
The Safe Application of LT Code in Broadcasts in the System based on the DVB-S2 Document
2013, 13 (
5
): 0-0.
Abstract
(
181
)
PDF
(650KB) (
221
)
NULL
Related Articles
|
Metrics
Select
Electronic Voting Scheme based on LWE Homomorphic Encryption
2013, 13 (
5
): 0-0.
Abstract
(
190
)
PDF
(284KB) (
214
)
NULL
Related Articles
|
Metrics
Select
The Research of Oracle Database Automatic Search Method
2013, 13 (
5
): 0-0.
Abstract
(
330
)
PDF
(1094KB) (
190
)
NULL
Related Articles
|
Metrics