Loading...
导航切换
Netinfo Security
Home
About Journal
Adviser
Editorial Board
Guide to Authors
Subscribe
Ethics Standard
Contacts us
中文
Table of Content
10 December 2013, Volume 13 Issue 12
Previous Issue
Next Issue
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Research on Authentication Method of Hadoop Cloud Computing Platform based on SAML
2013, 13 (
12
): 0-0.
Abstract
(
182
)
PDF
(1257KB) (
190
)
authentication%access control%Hadoop%Kerberos%SAML
Related Articles
|
Metrics
Select
Research on Security Technology of Mobile Network in Software Architecture
2013, 13 (
12
): 0-0.
Abstract
(
124
)
PDF
(1018KB) (
109
)
mobile network%security%static analysis%dynamic analysis%machine learning
Related Articles
|
Metrics
Select
Hadoop DDos Attack Detection Algorithm Analysis
2013, 13 (
12
): 0-0.
Abstract
(
168
)
PDF
(1107KB) (
211
)
Hadoop%DDos%SVM
Related Articles
|
Metrics
Select
Research and Analysis of P2P Security Protection Mechanism
2013, 13 (
12
): 0-0.
Abstract
(
136
)
PDF
(1178KB) (
193
)
peer-to-peer%security%protection mechanism
Related Articles
|
Metrics
Select
Application of Dynamic Taints Analysis Technology in Vulnerability Detection of ActiveX Controls
2013, 13 (
12
): 0-0.
Abstract
(
142
)
PDF
(1088KB) (
172
)
vulnerability detection%dynamic taints analysis%ActiveX controls
Related Articles
|
Metrics
Select
Campus Activity Sensing and Sharing based on Mobile Crowd Sensing
2013, 13 (
12
): 0-0.
Abstract
(
215
)
PDF
(1303KB) (
265
)
smart campus%mobile crowd sensing%smartphones%image classiifcation%AdaBoost algorithm
Related Articles
|
Metrics
Select
NULL
2013, 13 (
12
): 0-0.
Abstract
(
112
)
PDF
(550KB) (
29
)
NULL
Related Articles
|
Metrics
Select
Research on Public-Key based Cryptosystems for Secure Data Aggregation in Dynamic Wireless Sensor Network
2013, 13 (
12
): 0-0.
Abstract
(
170
)
PDF
(1415KB) (
114
)
public-key based cryptosystems%dynamic sensor network%data aggregation
Related Articles
|
Metrics
Select
Research and Design on Detection System for Secret Data based on Desktop Cloud
2013, 13 (
12
): 0-0.
Abstract
(
163
)
PDF
(1313KB) (
154
)
desktop cloud%ifnancial industry%secret data%data loss prevention technology
Related Articles
|
Metrics
Select
An Efifcient Scheme of Multi-user Searchable Encryption with Keyword in Cloud Storage
2013, 13 (
12
): 0-0.
Abstract
(
248
)
PDF
(1468KB) (
253
)
cloud storage%multi-user%searchable encryption
Related Articles
|
Metrics
Select
The Network Account Identity Authentication System based on Voiceprint Recognition and Speech Recognition
2013, 13 (
12
): 0-0.
Abstract
(
117
)
PDF
(1854KB) (
179
)
voiceprint recognition%speech recognition%identity authentication
Related Articles
|
Metrics
Select
The Anti-leak Password Management System based on Bluetooth and NFC
2013, 13 (
12
): 0-0.
Abstract
(
157
)
PDF
(1175KB) (
160
)
password management%NFC%bluetooth%anti-leak
Related Articles
|
Metrics
Select
NULL
2013, 13 (
12
): 0-0.
Abstract
(
93
)
PDF
(834KB) (
73
)
NULL
Related Articles
|
Metrics
Select
The Mobile Intelligent Terminal Malware Analysis and Detection System based on Behavior
2013, 13 (
12
): 0-0.
Abstract
(
194
)
PDF
(1234KB) (
1085
)
the wireless platform%sensitive permission%behavior hook%behavior triggering%malware detection
Related Articles
|
Metrics
Select
Research on Mining Network Comments based on Feature Clustering
2013, 13 (
12
): 0-0.
Abstract
(
128
)
PDF
(1259KB) (
124
)
feature classiifcation%adjacent co-occurrence%analysis of ifne-grained emotion%nonpolar opinion word
Related Articles
|
Metrics
Select
Research on Analysis of User Activity based on IconCache.db
2013, 13 (
12
): 0-0.
Abstract
(
240
)
PDF
(1408KB) (
652
)
IconCache.db%icon%storage path%user activity%USB device
Related Articles
|
Metrics
Select
A New Detection Method of Abnormal Network Behavior based on the Packet Content
2013, 13 (
12
): 0-0.
Abstract
(
158
)
PDF
(1152KB) (
269
)
network behavior%packet%regular expression
Related Articles
|
Metrics
Select
Network Fraud Suspects Tracking System based on Keystroke Biometric Identiifcation
2013, 13 (
12
): 0-0.
Abstract
(
137
)
PDF
(1325KB) (
167
)
keyboard%keystroke feature%identity%fraud of network%location
Related Articles
|
Metrics
Select
Analysis of Decrypting One Encrypted vbs Trojan
2013, 13 (
12
): 0-0.
Abstract
(
129
)
PDF
(1380KB) (
354
)
trojan%script%encrypt%decrypt
Related Articles
|
Metrics
Select
An Automatic Identiifcation System with Applications in Holter Monitoring
2013, 13 (
12
): 0-0.
Abstract
(
120
)
PDF
(1337KB) (
142
)
holter monitoring%identiifcation%biometrics
Related Articles
|
Metrics
Select
Application of Model-based Development Method in Multi-Application Smart Cards
2013, 13 (
12
): 0-0.
Abstract
(
130
)
PDF
(1254KB) (
97
)
smart card%Event-B%formal method%theory proof
Related Articles
|
Metrics
Select
The Rumor Spreading Mechanism of Network and Countermeasures
2013, 13 (
12
): 0-0.
Abstract
(
145
)
PDF
(1105KB) (
154
)
network rumor%network space%rumor propagation%rumours governance
Related Articles
|
Metrics
Select
NULL
2013, 13 (
12
): 0-0.
Abstract
(
110
)
PDF
(846KB) (
68
)
NULL
Related Articles
|
Metrics
Select
Dynamic and Static Forensics
2013, 13 (
12
): 0-0.
Abstract
(
159
)
PDF
(1076KB) (
217
)
computer forensics%dynamic forensics%static forensics
Related Articles
|
Metrics
Select
Sonic Network Management System based on CORBA
2013, 13 (
12
): 0-0.
Abstract
(
92
)
PDF
(1047KB) (
123
)
CORBA%ASON%Sonic Network Management System
Related Articles
|
Metrics
Select
Research on Digital Data in the New Telecommunication Fraud
2013, 13 (
12
): 0-0.
Abstract
(
257
)
PDF
(1042KB) (
390
)
telecommunication fraud%remote control%digital data%forensic analysis
Related Articles
|
Metrics
Select
NULL
2013, 13 (
12
): 0-0.
Abstract
(
104
)
PDF
(850KB) (
75
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
12
): 0-0.
Abstract
(
123
)
PDF
(947KB) (
86
)
NULL
Related Articles
|
Metrics
Select
NULL
2013, 13 (
12
): 0-0.
Abstract
(
141
)
PDF
(1095KB) (
65
)
NULL
Related Articles
|
Metrics