Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Network and Computer Security
1671-0428
2013 Issue 12
nian zhong pan dian
ji suan ji an quan bian ji bu ;
..............
page:1
Application of Sub Space Clustering in Intrusion Detetion
LI Guang-xia;,ZHANG Si-liang;
..............
page:2-6
Text Mining and Sentiment Analysis based Publicity Propagation Prediction Model
LIU Han-song;
..............
page:7-11
Extended Personal Identification System Using Motion Sensing
WANG Qiong;,WANG Zhi-guo;,ZHAO Wei-wei;
..............
page:12-17
Analysis of Computer Network Security threats and Research on its Defense Architecture
GU Hui-tao;,YAN Bin;,ZHAO Jin;,ZHOU Yue;
..............
page:18-21
Research of GPU Application in the Field of Cipher Processing
GUO Jian-jun;,WANG Yin;,Xu Kun;
..............
page:22-27
The Construction of FPGA High-Level Language Design Environment
GU Hui-tao;,TIAN Nan;,YAN Bin;,ZHOU Yue;
..............
page:28-31
The Important Value of Code Audit Work in the Whole Security System
LIANG Ye-yu;,NING Jian-chuang;,XU Tan;,YANG Ming;
..............
page:32-35
A Design of Railway Transportation Safety Integrated Management Information System
PENG Jian-feng;,PENG Li-yu;,SONG Zong-ying;
..............
page:36-39
Application & Research About Master Data management of Power Grid Company based on the Model of Maturity
HU Bo;,JI Xiao-heng;,SU Kai;
..............
page:40-45
The Exploration and Practice of Information Safety Centralized Monitoring and Warning System of Electric Power Corporation
SHE Shi-zhou;
..............
page:46-49
A Research of Electronic transformer and Synchronization Technology in Electric Power System Network Security Transmission
LIU Cai-ming;,Peng Ling-xi;,YANG Jin;,ZENG Jin-quan;
..............
page:50-53
Virtual Machine Monitoring under Cloud Environment and Key Technologies of Server Deployment
WANG Shuai-peng;
..............
page:54-56
Research on Building the System of Computer Network and Information Security
CUI Peng-yu;
..............
page:57-59
Solution of Campus Network Achieves IPSec Travelling Through NAT
LAI Shun-tian;
..............
page:60-63
The Network Security Technology?and Management
DING Jian;
..............
page:64-66,72
hang zhou hua san : yun wang rong he cheng jiu xia yi dai an quan
duan hong ;
..............
page:67-68
watchguard: tou shi da shu ju que bao wang luo an quan
..............
page:69-70
ju jiao 2013 nian feng he zhong guo kai fa zhe da hui
duan hong ;
..............
page:71-72
jie pu web an quan jian she fang an
xi an jiao da jie pu wang luo ke ji you xian gong si ;
..............
page:73-74
bai du shou ji wei shi zheng shi fa bu fang xi fei gong neng quan qiu shou chuang
..............
page:75
di si jie yun an quan lian meng gao feng lun tan re yi xin yong yun
..............
page:76
xia yi ge shi nian
qu ding ;
..............
page:77
xin xi dong tai
..............
page:78