Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 July 2013, Volume 13 Issue 7
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
The Optimization and Implementation of Data Content Security Detection Algorithm based on DPI
2013, 13 (
7
): 0-0.
Abstract
(
262
)
PDF
(1433KB) (
416
)
DPI%ifngerprint detection algorithm%security detection system
Related Articles
|
Metrics
Select
A Threshold Group Signature based on TPCM
2013, 13 (
7
): 0-0.
Abstract
(
178
)
PDF
(1484KB) (
111
)
group signature%threshold%composite protocol%protocol security
Related Articles
|
Metrics
Select
Research on Code Protection Technology based on Android Platform
2013, 13 (
7
): 0-0.
Abstract
(
210
)
PDF
(1181KB) (
121
)
software security%code protection%reverse analysis%Android platform
Related Articles
|
Metrics
Select
The Design and Implementation of a System for Privacy Protection in Android
2013, 13 (
7
): 0-0.
Abstract
(
232
)
PDF
(1350KB) (
305
)
privacy protection%Android system%system disguise
Related Articles
|
Metrics
Select
Research on the Primary User Emulation Attack Games in Wireless Cognitive Sensor Networks
2013, 13 (
7
): 0-0.
Abstract
(
144
)
PDF
(1437KB) (
145
)
Wireless Cognitive Sensor Network (WCSN)%Primary User Emulation (PUE)%game theory%secondary user
Related Articles
|
Metrics
Select
The Internet Open Source Data Storage and Analysis Technology Research
2013, 13 (
7
): 0-0.
Abstract
(
207
)
PDF
(1214KB) (
201
)
open source data%data acquisition%cloud storage%calculation and analysis
Related Articles
|
Metrics
Select
Research on General Security Framework and Key Technology of Cloud Computing
2013, 13 (
7
): 0-0.
Abstract
(
144
)
PDF
(1207KB) (
86
)
virtualization%cloud computing%cloud security%cloud security framework
Related Articles
|
Metrics
Select
Countermeasures Against Malicious Short Links
2013, 13 (
7
): 0-0.
Abstract
(
190
)
PDF
(1092KB) (
297
)
short link%malicious url cheat%malicious url detection%redirection
Related Articles
|
Metrics
Select
Zero Digital Image Watermarking Method based on Krawtchouk Invariant Moments
2013, 13 (
7
): 0-0.
Abstract
(
201
)
PDF
(1541KB) (
130
)
zero digital watermarking image%contourlet transform%Krawtchouk invariant moments%robustness
Related Articles
|
Metrics
Select
The Method of Decrypting DPAPI Oflfine and Its Application in Forensics
2013, 13 (
7
): 0-0.
Abstract
(
150
)
PDF
(1219KB) (
1458
)
data protect application-programming interface%master key%decryption%forensics
Related Articles
|
Metrics
Select
Research and Implementation of Network Covert Channel
2013, 13 (
7
): 0-0.
Abstract
(
185
)
PDF
(1222KB) (
349
)
covert channel%network protocol%HTTP message%Date header line
Related Articles
|
Metrics
Select
NULL
2013, 13 (
7
): 0-0.
Abstract
(
136
)
PDF
(883KB) (
66
)
NULL
Related Articles
|
Metrics
Select
Network Intrusion Detection Model based on RBR and CBR
2013, 13 (
7
): 0-0.
Abstract
(
143
)
PDF
(1106KB) (
69
)
CBR%RBR%network intrusion detection model
Related Articles
|
Metrics
Select
Research on an Intrusion Detection Model based on Rough and Concept Lattice
2013, 13 (
7
): 0-0.
Abstract
(
147
)
PDF
(1088KB) (
87
)
rough set%concept lattice%intrusion detection
Related Articles
|
Metrics
Select
The Application and Research of Interface of Mobile Data Acquisition System based on USB
2013, 13 (
7
): 0-0.
Abstract
(
125
)
PDF
(1237KB) (
131
)
GPIF%USB%data acquisition
Related Articles
|
Metrics
Select
A Uyghur Text Anti-ifltering Technique based on Simple Steganographic Scheme
2013, 13 (
7
): 0-0.
Abstract
(
129
)
PDF
(1428KB) (
191
)
anti-ifltering%steganography%simple scheme%Uyghur text
Related Articles
|
Metrics
Select
Reaserch on Cloud Forensics based on the Internet of Things
2013, 13 (
7
): 0-0.
Abstract
(
182
)
PDF
(1190KB) (
148
)
cloud-based forensics%the internet of things%cloud computing
Related Articles
|
Metrics
Select
Design of NOSQL-based Uniifed Authentication System
2013, 13 (
7
): 0-0.
Abstract
(
168
)
PDF
(1254KB) (
173
)
uniifed authentication service%SingleSignOn(SSO)%4A management%Cassandra
Related Articles
|
Metrics
Select
Research of Computer Live Forensics based on Windows
2013, 13 (
7
): 0-0.
Abstract
(
131
)
PDF
(1069KB) (
465
)
Windows system%live forensics%computer crime%digital evidence
Related Articles
|
Metrics
Select
Research on Content-based Commodity Image Retrieval Technology in E-commerce
2013, 13 (
7
): 0-0.
Abstract
(
187
)
PDF
(1284KB) (
186
)
image retrieval%feature extracting%e-commerce%algorithm analysis%retrieval technology
Related Articles
|
Metrics
Select
AnalysisofAddressingSystemaftertheFAT32FileSystemFormatting
2013, 13 (
7
): 0-0.
Abstract
(
131
)
PDF
(1135KB) (
185
)
cluster%cluster chain%FAT%directory entry%reserve sector%volume slack
Related Articles
|
Metrics
Select
Research on E-mail Bomber Attack Countermeasure based on Reservation of E-mail Service Space
2013, 13 (
7
): 0-0.
Abstract
(
183
)
PDF
(1055KB) (
123
)
E-mail bomber%SPAM%space reservation%countermeasure
Related Articles
|
Metrics
Select
Review and Consideration of Conifcker Worm Attack
2013, 13 (
7
): 0-0.
Abstract
(
219
)
PDF
(1125KB) (
414
)
networksecurity%Conifcker Worm%Botnet
Related Articles
|
Metrics
Select
Study of Mobile Internet Crime During the New Period
2013, 13 (
7
): 0-0.
Abstract
(
146
)
PDF
(1053KB) (
104
)
mobile Internet%Internet crime%network crime
Related Articles
|
Metrics
Select
Discussion on the Construction of Computer Forensics Laboratory
2013, 13 (
7
): 0-0.
Abstract
(
140
)
PDF
(1090KB) (
119
)
computer forensics technology%computer forensics laboratory%laboratory construction
Related Articles
|
Metrics
Select
Research on Security Management Platform based on Event Aggregation and Association Analysis
2013, 13 (
7
): 0-0.
Abstract
(
148
)
PDF
(1065KB) (
342
)
log analysis%aggregation analysis%association analysis%security management platform
Related Articles
|
Metrics
Select
Theory of Electronic Forensics in the New Era
2013, 13 (
7
): 0-0.
Abstract
(
159
)
PDF
(1079KB) (
369
)
network crime%electronic forensic%university
Related Articles
|
Metrics
Select
NULL
2013, 13 (
7
): 0-0.
Abstract
(
113
)
PDF
(968KB) (
97
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
7
): 0-0.
Abstract
(
139
)
PDF
(1069KB) (
91
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
7
): 0-0.
Abstract
(
67
)
PDF
(940KB) (
102
)
NULL
Related Articles
|
Metrics