Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 July 2013, Volume 13 Issue 7
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
The Optimization and Implementation of Data Content Security Detection Algorithm based on DPI
2013, 13 (
7
): 0-0.
Abstract
(
253
)
PDF
(1433KB) (
346
)
DPI%ifngerprint detection algorithm%security detection system
Related Articles
|
Metrics
Select
A Threshold Group Signature based on TPCM
2013, 13 (
7
): 0-0.
Abstract
(
174
)
PDF
(1484KB) (
79
)
group signature%threshold%composite protocol%protocol security
Related Articles
|
Metrics
Select
Research on Code Protection Technology based on Android Platform
2013, 13 (
7
): 0-0.
Abstract
(
192
)
PDF
(1181KB) (
116
)
software security%code protection%reverse analysis%Android platform
Related Articles
|
Metrics
Select
The Design and Implementation of a System for Privacy Protection in Android
2013, 13 (
7
): 0-0.
Abstract
(
221
)
PDF
(1350KB) (
278
)
privacy protection%Android system%system disguise
Related Articles
|
Metrics
Select
Research on the Primary User Emulation Attack Games in Wireless Cognitive Sensor Networks
2013, 13 (
7
): 0-0.
Abstract
(
134
)
PDF
(1437KB) (
120
)
Wireless Cognitive Sensor Network (WCSN)%Primary User Emulation (PUE)%game theory%secondary user
Related Articles
|
Metrics
Select
The Internet Open Source Data Storage and Analysis Technology Research
2013, 13 (
7
): 0-0.
Abstract
(
200
)
PDF
(1214KB) (
183
)
open source data%data acquisition%cloud storage%calculation and analysis
Related Articles
|
Metrics
Select
Research on General Security Framework and Key Technology of Cloud Computing
2013, 13 (
7
): 0-0.
Abstract
(
133
)
PDF
(1207KB) (
79
)
virtualization%cloud computing%cloud security%cloud security framework
Related Articles
|
Metrics
Select
Countermeasures Against Malicious Short Links
2013, 13 (
7
): 0-0.
Abstract
(
178
)
PDF
(1092KB) (
251
)
short link%malicious url cheat%malicious url detection%redirection
Related Articles
|
Metrics
Select
Zero Digital Image Watermarking Method based on Krawtchouk Invariant Moments
2013, 13 (
7
): 0-0.
Abstract
(
191
)
PDF
(1541KB) (
104
)
zero digital watermarking image%contourlet transform%Krawtchouk invariant moments%robustness
Related Articles
|
Metrics
Select
The Method of Decrypting DPAPI Oflfine and Its Application in Forensics
2013, 13 (
7
): 0-0.
Abstract
(
141
)
PDF
(1219KB) (
1405
)
data protect application-programming interface%master key%decryption%forensics
Related Articles
|
Metrics
Select
Research and Implementation of Network Covert Channel
2013, 13 (
7
): 0-0.
Abstract
(
176
)
PDF
(1222KB) (
298
)
covert channel%network protocol%HTTP message%Date header line
Related Articles
|
Metrics
Select
NULL
2013, 13 (
7
): 0-0.
Abstract
(
133
)
PDF
(883KB) (
59
)
NULL
Related Articles
|
Metrics
Select
Network Intrusion Detection Model based on RBR and CBR
2013, 13 (
7
): 0-0.
Abstract
(
134
)
PDF
(1106KB) (
62
)
CBR%RBR%network intrusion detection model
Related Articles
|
Metrics
Select
Research on an Intrusion Detection Model based on Rough and Concept Lattice
2013, 13 (
7
): 0-0.
Abstract
(
141
)
PDF
(1088KB) (
78
)
rough set%concept lattice%intrusion detection
Related Articles
|
Metrics
Select
The Application and Research of Interface of Mobile Data Acquisition System based on USB
2013, 13 (
7
): 0-0.
Abstract
(
122
)
PDF
(1237KB) (
100
)
GPIF%USB%data acquisition
Related Articles
|
Metrics
Select
A Uyghur Text Anti-ifltering Technique based on Simple Steganographic Scheme
2013, 13 (
7
): 0-0.
Abstract
(
124
)
PDF
(1428KB) (
164
)
anti-ifltering%steganography%simple scheme%Uyghur text
Related Articles
|
Metrics
Select
Reaserch on Cloud Forensics based on the Internet of Things
2013, 13 (
7
): 0-0.
Abstract
(
163
)
PDF
(1190KB) (
141
)
cloud-based forensics%the internet of things%cloud computing
Related Articles
|
Metrics
Select
Design of NOSQL-based Uniifed Authentication System
2013, 13 (
7
): 0-0.
Abstract
(
159
)
PDF
(1254KB) (
157
)
uniifed authentication service%SingleSignOn(SSO)%4A management%Cassandra
Related Articles
|
Metrics
Select
Research of Computer Live Forensics based on Windows
2013, 13 (
7
): 0-0.
Abstract
(
122
)
PDF
(1069KB) (
382
)
Windows system%live forensics%computer crime%digital evidence
Related Articles
|
Metrics
Select
Research on Content-based Commodity Image Retrieval Technology in E-commerce
2013, 13 (
7
): 0-0.
Abstract
(
181
)
PDF
(1284KB) (
177
)
image retrieval%feature extracting%e-commerce%algorithm analysis%retrieval technology
Related Articles
|
Metrics
Select
AnalysisofAddressingSystemaftertheFAT32FileSystemFormatting
2013, 13 (
7
): 0-0.
Abstract
(
124
)
PDF
(1135KB) (
150
)
cluster%cluster chain%FAT%directory entry%reserve sector%volume slack
Related Articles
|
Metrics
Select
Research on E-mail Bomber Attack Countermeasure based on Reservation of E-mail Service Space
2013, 13 (
7
): 0-0.
Abstract
(
178
)
PDF
(1055KB) (
101
)
E-mail bomber%SPAM%space reservation%countermeasure
Related Articles
|
Metrics
Select
Review and Consideration of Conifcker Worm Attack
2013, 13 (
7
): 0-0.
Abstract
(
207
)
PDF
(1125KB) (
339
)
networksecurity%Conifcker Worm%Botnet
Related Articles
|
Metrics
Select
Study of Mobile Internet Crime During the New Period
2013, 13 (
7
): 0-0.
Abstract
(
136
)
PDF
(1053KB) (
88
)
mobile Internet%Internet crime%network crime
Related Articles
|
Metrics
Select
Discussion on the Construction of Computer Forensics Laboratory
2013, 13 (
7
): 0-0.
Abstract
(
134
)
PDF
(1090KB) (
110
)
computer forensics technology%computer forensics laboratory%laboratory construction
Related Articles
|
Metrics
Select
Research on Security Management Platform based on Event Aggregation and Association Analysis
2013, 13 (
7
): 0-0.
Abstract
(
142
)
PDF
(1065KB) (
317
)
log analysis%aggregation analysis%association analysis%security management platform
Related Articles
|
Metrics
Select
Theory of Electronic Forensics in the New Era
2013, 13 (
7
): 0-0.
Abstract
(
155
)
PDF
(1079KB) (
322
)
network crime%electronic forensic%university
Related Articles
|
Metrics
Select
NULL
2013, 13 (
7
): 0-0.
Abstract
(
106
)
PDF
(968KB) (
91
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
7
): 0-0.
Abstract
(
131
)
PDF
(1069KB) (
84
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
7
): 0-0.
Abstract
(
63
)
PDF
(940KB) (
85
)
NULL
Related Articles
|
Metrics