Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 October 2013, Volume 13 Issue 10
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Discussion on Information Security Classiifed Protection Supervision of the Third Party Payment
2013, 13 (
10
): 0-0.
Abstract
(
355
)
PDF
(1276KB) (
348
)
third party payment%information security%classiifed protection%supervision
Related Articles
|
Metrics
Select
NULL
2013, 13 (
10
): 0-0.
Abstract
(
102
)
PDF
(436KB) (
29
)
NULL
Related Articles
|
Metrics
Select
Security Analysis and Improvement of an Authentication Protocol for SIP
2013, 13 (
10
): 0-0.
Abstract
(
170
)
PDF
(1302KB) (
411
)
SIP%authentication%key agreement%elliptic curve cryptosystem
Related Articles
|
Metrics
Select
The Cloud-based Network Security Event Monitoring System
2013, 13 (
10
): 0-0.
Abstract
(
92
)
PDF
(1298KB) (
266
)
security event%cloud platform%event monitoring%network security
Related Articles
|
Metrics
Select
The Security Threats and the Countermeasures Analysis of the Key Infrastructures
2013, 13 (
10
): 0-0.
Abstract
(
135
)
PDF
(1232KB) (
245
)
key infrastructure%security threat%security guarantee%countermeasure
Related Articles
|
Metrics
Select
The Security Evaluation and Defending Work of Mobile SMS Network
2013, 13 (
10
): 0-0.
Abstract
(
184
)
PDF
(1309KB) (
348
)
communication network%SMS network%security defending%risk evaluation
Related Articles
|
Metrics
Select
The Discussion of the Application of Security Model MAP2DR2 based on Classiifed Protection
2013, 13 (
10
): 0-0.
Abstract
(
195
)
PDF
(1350KB) (
191
)
information security%evaluation of classiifed protection%MAP2DR2
Related Articles
|
Metrics
Select
Research and Implementation of Host-based ICSP on-site Evaluation Tool
2013, 13 (
10
): 0-0.
Abstract
(
139
)
PDF
(1307KB) (
190
)
classiifed security protection%host security%multidimensional detection model%automatic processing
Related Articles
|
Metrics
Select
Research on Application for Classiifed Protection in Data Security of the Internet of Things
2013, 13 (
10
): 0-0.
Abstract
(
102
)
PDF
(1316KB) (
129
)
classiifed protection%the internet of things%data security
Related Articles
|
Metrics
Select
The Application of Continuous Data Protection Technology in Electric Power Industry Information Security
2013, 13 (
10
): 0-0.
Abstract
(
151
)
PDF
(1304KB) (
208
)
continuous data protection%information security%classiifed protection
Related Articles
|
Metrics
Select
Research on Hospital Information System Security Classiifed Protection
2013, 13 (
10
): 0-0.
Abstract
(
122
)
PDF
(1299KB) (
450
)
hospital information system%classiifed protection%security management
Related Articles
|
Metrics
Select
Cloud Storage-oriented Access Control Service
2013, 13 (
10
): 0-0.
Abstract
(
111
)
PDF
(1240KB) (
134
)
cloud storage%access control policy%access control service%data container
Related Articles
|
Metrics
Select
The Data Security Solution of Network Cluster System based on Virtualization Technology
2013, 13 (
10
): 0-0.
Abstract
(
180
)
PDF
(1305KB) (
116
)
virtualization%cluster system%cloud desktop%cloud storage%data security
Related Articles
|
Metrics
Select
Research on Cloud Computing, SDN and Security Technology
2013, 13 (
10
): 0-0.
Abstract
(
132
)
PDF
(1327KB) (
202
)
cloud computing%SDN%security%convergence
Related Articles
|
Metrics
Select
The Application of Cloud Technology in Three Nets Fusion Administration System
2013, 13 (
10
): 0-0.
Abstract
(
141
)
PDF
(1233KB) (
54
)
three nets fusion%cloud technology%virtualization
Related Articles
|
Metrics
Select
A Cloud Storage-based Database Secure Backup System
2013, 13 (
10
): 0-0.
Abstract
(
169
)
PDF
(1355KB) (
182
)
database backup%cloud storage%real-time backup%encrypted backup
Related Articles
|
Metrics
Select
Identity and Access Management Cloud Technology for Large Organizations
2013, 13 (
10
): 0-0.
Abstract
(
98
)
PDF
(1330KB) (
135
)
identity and access management%user authentication and authorization%single sign on
Related Articles
|
Metrics
Select
Research on Authentication Mechanisms in Cloud Computing
2013, 13 (
10
): 0-0.
Abstract
(
96
)
PDF
(1275KB) (
77
)
cloud computing%single sign-on%two-factor authentication
Related Articles
|
Metrics
Select
Research on Framework Design of Industrial Control System for Cyber-Security Defenses
2013, 13 (
10
): 0-0.
Abstract
(
192
)
PDF
(1263KB) (
539
)
cyber-security%industrial control system%strategic framework%security zones
Related Articles
|
Metrics
Select
Practice on Defense System of Smart Power Grids Information Security
2013, 13 (
10
): 0-0.
Abstract
(
174
)
PDF
(1254KB) (
491
)
electric power%smart power grids%information security%active defense
Related Articles
|
Metrics
Select
Implementation of Information Security on Perceptual Layer in Internet of Things
2013, 13 (
10
): 0-0.
Abstract
(
125
)
PDF
(1295KB) (
430
)
Internet of Things%sensor network%vehicle ad hoc network
Related Articles
|
Metrics
Select
A Security Management and Control Scheme for Portable Storage Devices based on RFID
2013, 13 (
10
): 0-0.
Abstract
(
146
)
PDF
(1302KB) (
117
)
portable storage%security management and control%RFID%context-aware
Related Articles
|
Metrics
Select
Active Cloud Services Safety Monitoring System of Server
2013, 13 (
10
): 0-0.
Abstract
(
146
)
PDF
(1256KB) (
141
)
computer security%cloud service%Saas
Related Articles
|
Metrics
Select
Research on the Wireless Network Security of Code Division Duplex System
2013, 13 (
10
): 0-0.
Abstract
(
202
)
PDF
(1373KB) (
142
)
CDD%wireless network security%wiretapping%interference attack
Related Articles
|
Metrics
Select
Security Situation and Developing Trend of Mobile Phone
2013, 13 (
10
): 0-0.
Abstract
(
214
)
PDF
(1300KB) (
221
)
mobile Internet%mobile phone security%mobile terminal
Related Articles
|
Metrics
Select
Analysis and Countermeasures about Mobile Phone Security Problems
2013, 13 (
10
): 0-0.
Abstract
(
177
)
PDF
(1275KB) (
288
)
security of mobile phone%smart phone%OS%counter measures
Related Articles
|
Metrics
Select
Analysis of Android Mobile Phone System Virus and the Protection Mechanisms
2013, 13 (
10
): 0-0.
Abstract
(
132
)
PDF
(1281KB) (
308
)
Android%virus%protection
Related Articles
|
Metrics
Select
Modeling of Android Application Security Testing
2013, 13 (
10
): 0-0.
Abstract
(
166
)
PDF
(1276KB) (
146
)
security test of Android applications%decompile%source code
Related Articles
|
Metrics
Select
iPhone-oriented Electronic Data Forensics
2013, 13 (
10
): 0-0.
Abstract
(
335
)
PDF
(1464KB) (
378
)
iPhone%electronic data forensics%standardization%data recovery
Related Articles
|
Metrics
Select
Analysis of Mobile Internet Security
2013, 13 (
10
): 0-0.
Abstract
(
179
)
PDF
(1284KB) (
130
)
mobile Internet%security%measure
Related Articles
|
Metrics
Select
Design and Implementation of Malicious Code Detection Platform for iOS System
2013, 13 (
10
): 0-0.
Abstract
(
157
)
PDF
(1361KB) (
400
)
iOS system%malicious code%detection platform
Related Articles
|
Metrics
Select
An Encryption Algorithm Application Solution
2013, 13 (
10
): 0-0.
Abstract
(
127
)
PDF
(1224KB) (
160
)
encryption%Loongson%T-DES%FPGA
Related Articles
|
Metrics
Select
Research on eID Virtual Identity Data Storage
2013, 13 (
10
): 0-0.
Abstract
(
121
)
PDF
(1305KB) (
87
)
eID%virtual identity%storage%query
Related Articles
|
Metrics
Select
A Packet Classiifcation Method Using Multibit Trie with Wildcard Supporting
2013, 13 (
10
): 0-0.
Abstract
(
152
)
PDF
(1350KB) (
117
)
packet classiifcation%multibit trie%equivalent pointer%wildcard
Related Articles
|
Metrics
Select
Emergency Communication Security Transmission Scheme by Password-based Key Negotiation
2013, 13 (
10
): 0-0.
Abstract
(
144
)
PDF
(1296KB) (
144
)
emergency communication security transmission%password-based key negotiation protocol%network layer encryption
Related Articles
|
Metrics
Select
A Group Signature Scheme based on Conic Curve in Finite Field GF(2n)
2013, 13 (
10
): 0-0.
Abstract
(
140
)
PDF
(1687KB) (
172
)
ifnite ifeld GF(2n)%conic curve%group signature%numerical simulation%SB
Related Articles
|
Metrics
Select
Research on Anti-attacking Detection Method in Mini-Electronic Security Device
2013, 13 (
10
): 0-0.
Abstract
(
124
)
PDF
(1314KB) (
94
)
electronic security device%anti-attacking%detection algorithm
Related Articles
|
Metrics
Select
A Quantitative Assessment Scheme on OTP Generation Algorithm
2013, 13 (
10
): 0-0.
Abstract
(
115
)
PDF
(1315KB) (
154
)
one-time password%algorithm%quantitative analysis
Related Articles
|
Metrics
Select
Reseach on Bit Security of Similar Knapsack Difife-Hellman Problem
2013, 13 (
10
): 0-0.
Abstract
(
191
)
PDF
(1549KB) (
156
)
one-way function%bit security%knapsack DH problem%bilinear pairings
Related Articles
|
Metrics
Select
The Construction of Active Network Security Situation Awareness Framework
2013, 13 (
10
): 0-0.
Abstract
(
141
)
PDF
(1269KB) (
134
)
network security%situation awareness%active probe%passive monitor
Related Articles
|
Metrics
Select
Design and Application of the City Security Video Surveillance System’s Information Security based on Network
2013, 13 (
10
): 0-0.
Abstract
(
128
)
PDF
(1238KB) (
73
)
IP network%video surveillance%information security%identity authentication%access control
Related Articles
|
Metrics
Select
Analysis of Depth Assessment of Information System Security Technology
2013, 13 (
10
): 0-0.
Abstract
(
148
)
PDF
(1268KB) (
440
)
information system%classiifed protection%effective security%depth assessment
Related Articles
|
Metrics
Select
Research on Access Control and Security Audit of SDC
2013, 13 (
10
): 0-0.
Abstract
(
105
)
PDF
(1334KB) (
106
)
SDC%access control%security audit%information security
Related Articles
|
Metrics
Select
Research on Internet Information Security Monitoring and Early Warning Mechanism
2013, 13 (
10
): 0-0.
Abstract
(
226
)
PDF
(1267KB) (
1020
)
information network%security%monitoring and early warning
Related Articles
|
Metrics
Select
Design of Packet Security Inspection Engine for Reconifgurable UTM
2013, 13 (
10
): 0-0.
Abstract
(
119
)
PDF
(1334KB) (
131
)
reconifgurable UTM%packet security inspection%component
Related Articles
|
Metrics
Select
Ontology Modeling for Network Vulnerability Scanners Standard and Research on Related Evaluation Tool
2013, 13 (
10
): 0-0.
Abstract
(
115
)
PDF
(1355KB) (
205
)
ontology%network vulnerability scanners standard%evaluation assistant tool
Related Articles
|
Metrics
Select
Study on Application of Integrated Technology in Information Network Security Protection
2013, 13 (
10
): 0-0.
Abstract
(
133
)
PDF
(1361KB) (
139
)
information network%application security%infrastructure security%comprehensive integration
Related Articles
|
Metrics
Select
Construction and Application of a Web Forum Harmful Information Detection and Analysis System
2013, 13 (
10
): 0-0.
Abstract
(
105
)
PDF
(1295KB) (
117
)
Web forum harmful information%monitor and control system%Web forums addin%increment collection%operation process
Related Articles
|
Metrics
Select
Research on CDN Regulation of Information Security Research
2013, 13 (
10
): 0-0.
Abstract
(
110
)
PDF
(1397KB) (
448
)
CDN%security%regulation
Related Articles
|
Metrics
Select
Web-based Application Layer Access User Behavior Analysis and Classiifcation Protection
2013, 13 (
10
): 0-0.
Abstract
(
166
)
PDF
(1318KB) (
172
)
Web security%classiifcation protection%application layer%behavior analysis
Related Articles
|
Metrics
Select
Network-wide Monitoring and Effective Defense of DDoS Attack
2013, 13 (
10
): 0-0.
Abstract
(
77
)
PDF
(1406KB) (
135
)
network-wide monitoring%NetFlow%Defense%DDoS
Related Articles
|
Metrics
Select
Design of Monitoring Platform based Information Operation and Maintenance Management Platform
2013, 13 (
10
): 0-0.
Abstract
(
198
)
PDF
(1288KB) (
163
)
J2EE%EJB%user interface layer%business logic layer%persistence layer
Related Articles
|
Metrics
Select
Research of Tendency Algorithm for Chinese Comments based on Machine Learning
2013, 13 (
10
): 0-0.
Abstract
(
107
)
PDF
(1382KB) (
139
)
tendency%machine learning%feature selection%term weight
Related Articles
|
Metrics
Select
Survey of Packet Cable Security
2013, 13 (
10
): 0-0.
Abstract
(
137
)
PDF
(1302KB) (
133
)
Packet Cable%security%attack
Related Articles
|
Metrics
Select
Design and Implementation of Digital Evidence Preservation Mechanism based on Intrusion Tolerance
2013, 13 (
10
): 0-0.
Abstract
(
100
)
PDF
(1290KB) (
97
)
network forensics%evidence preservation%information fragment%intrusion tolerance
Related Articles
|
Metrics
Select
The Optimization and Implementation of Data Flow Security Checking Algorithm
2013, 13 (
10
): 0-0.
Abstract
(
178
)
PDF
(1420KB) (
93
)
DPI%information security%ifngerprint
Related Articles
|
Metrics
Select
Application of Digital Signature and Encryption in Network Isolation
2013, 13 (
10
): 0-0.
Abstract
(
203
)
PDF
(1280KB) (
180
)
digital signature%encryption%network isolation%net gap
Related Articles
|
Metrics
Select
Research on Lucene Technology-based Mail Forensics Technology
2013, 13 (
10
): 0-0.
Abstract
(
115
)
PDF
(1254KB) (
58
)
Lucene%E-mail%forensics
Related Articles
|
Metrics
Select
Security Problems of WeChat
2013, 13 (
10
): 0-0.
Abstract
(
108
)
PDF
(1231KB) (
670
)
WeChat%network%information security
Related Articles
|
Metrics
Select
Build Active Defense System based on Whitelisting
2013, 13 (
10
): 0-0.
Abstract
(
119
)
PDF
(1284KB) (
318
)
White-List%applicaiton security%application management and control%proactive protection
Related Articles
|
Metrics
Select
NULL
2013, 13 (
10
): 0-0.
Abstract
(
182
)
PDF
(1038KB) (
122
)
NULL
Related Articles
|
Metrics
Select
A Combination of Active and Passive Security Mechanism for Wireless Ad Hoc Network
2013, 13 (
10
): 0-0.
Abstract
(
125
)
PDF
(1458KB) (
272
)
wireless Ad hoc network%security insurance%mechanism
Related Articles
|
Metrics
Select
Prevention Policy of SQL Injection based on HMAC
2013, 13 (
10
): 0-0.
Abstract
(
164
)
PDF
(1271KB) (
187
)
SQL injection%HMAC%database
Related Articles
|
Metrics
Select
Strengthen the Protection of Network Information and carry out Network Identity Management
2013, 13 (
10
): 0-0.
Abstract
(
140
)
PDF
(1255KB) (
249
)
network real-name system%network identity management
Related Articles
|
Metrics
Select
The Data Analysis Study of Network Crimes based on Tacit Knowledge Mining
2013, 13 (
10
): 0-0.
Abstract
(
126
)
PDF
(1262KB) (
302
)
tacit knowledge%network crime%criminal investigation%data analysis
Related Articles
|
Metrics
Select
The Construction of Trustworthiness Evaluation System of Electronic Data in Criminal Lawsuits
2013, 13 (
10
): 0-0.
Abstract
(
136
)
PDF
(1300KB) (
187
)
electronic data%trustworthiness evaluation system%evidence admissibility%judicial practice
Related Articles
|
Metrics
Select
Research on the Evidence of the Crime of Destroying Computer Information Systems
2013, 13 (
10
): 0-0.
Abstract
(
146
)
PDF
(1247KB) (
350
)
destroying computer information systems%electronic data%prosecution
Related Articles
|
Metrics
Select
The Characteristics and Countermeasures of VoIP Crime
2013, 13 (
10
): 0-0.
Abstract
(
117
)
PDF
(1260KB) (
170
)
VoIP%IP Phone%fake caller ID display
Related Articles
|
Metrics
Select
2012 Development of Computer Virus and Anti-virus Technology Trend
2013, 13 (
10
): 0-0.
Abstract
(
156
)
PDF
(1259KB) (
286
)
computer viruses%anti-virus technology%attack%security
Related Articles
|
Metrics
Select
2012 Analysis Report on Development Situation of Anti-virus Products and Mobile Security Products
2013, 13 (
10
): 0-0.
Abstract
(
165
)
PDF
(1317KB) (
77
)
anti-virus products%mobile security products%development status%analysis report
Related Articles
|
Metrics
Select
Research on the NRS and Network Management Mechanism
2013, 13 (
10
): 0-0.
Abstract
(
117
)
PDF
(1232KB) (
265
)
network security%Network Real-name System%network management mechanism
Related Articles
|
Metrics
Select
The Preliminary Research on Several Dififcult Issues of Amendment to Computer Crimes on Criminal Law
2013, 13 (
10
): 0-0.
Abstract
(
93
)
PDF
(1274KB) (
177
)
criminal law%computer crime%electronic evidence
Related Articles
|
Metrics
Select
ExplorationofLegislationonChinaMobileInternetSecurityRegulation
2013, 13 (
10
): 0-0.
Abstract
(
119
)
PDF
(1240KB) (
396
)
mobile Internet%security regulation%legislation
Related Articles
|
Metrics
Select
Research on the Method of Effectiveness Evaluation for Information Security System
2013, 13 (
10
): 0-0.
Abstract
(
172
)
PDF
(1336KB) (
502
)
information security system%effectiveness evaluation%Delphi method
Related Articles
|
Metrics
Select
Constructing the Secure and Reliable Government Websites based on the Baseline for Classiifed Protection
2013, 13 (
10
): 0-0.
Abstract
(
135
)
PDF
(1302KB) (
90
)
classified protection%information security construction of government%baseline for classified protection
Related Articles
|
Metrics
Select
NULL
2013, 13 (
10
): 0-0.
Abstract
(
61
)
PDF
(889KB) (
29
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
10
): 0-0.
Abstract
(
131
)
PDF
(1107KB) (
129
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
10
): 0-0.
Abstract
(
115
)
PDF
(1181KB) (
50
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
10
): 0-0.
Abstract
(
99
)
PDF
(1139KB) (
35
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
10
): 0-0.
Abstract
(
154
)
PDF
(1094KB) (
48
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
10
): 0-0.
Abstract
(
77
)
PDF
(1062KB) (
125
)
NULL
Related Articles
|
Metrics