Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2013 Issue 12
nian zhong pan dian
ji suan ji an quan bian ji bu ;
..............page:1
Application of Sub Space Clustering in Intrusion Detetion
LI Guang-xia;,ZHANG Si-liang;
..............page:2-6
Extended Personal Identification System Using Motion Sensing
WANG Qiong;,WANG Zhi-guo;,ZHAO Wei-wei;
..............page:12-17
Analysis of Computer Network Security threats and Research on its Defense Architecture
GU Hui-tao;,YAN Bin;,ZHAO Jin;,ZHOU Yue;
..............page:18-21
Research of GPU Application in the Field of Cipher Processing
GUO Jian-jun;,WANG Yin;,Xu Kun;
..............page:22-27
The Construction of FPGA High-Level Language Design Environment
GU Hui-tao;,TIAN Nan;,YAN Bin;,ZHOU Yue;
..............page:28-31
The Important Value of Code Audit Work in the Whole Security System
LIANG Ye-yu;,NING Jian-chuang;,XU Tan;,YANG Ming;
..............page:32-35
A Design of Railway Transportation Safety Integrated Management Information System
PENG Jian-feng;,PENG Li-yu;,SONG Zong-ying;
..............page:36-39
The Network Security Technology?and Management
DING Jian;
..............page:64-66,72
ju jiao 2013 nian feng he zhong guo kai fa zhe da hui
duan hong ;
..............page:71-72
jie pu web an quan jian she fang an
xi an jiao da jie pu wang luo ke ji you xian gong si ;
..............page:73-74
xia yi ge shi nian
qu ding ;
..............page:77
xin xi dong tai
..............page:78