Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network Security Technology & Application
1009-6833
2014 Issue 2
Design of Multi-tasking Vision System based on Multicast
Wang Jiangjing;
..............page:6,9
Research WEB internal office systems environment
Wang Yafei;,Zhang Yingxian;
..............page:10,13
The FTP service configuration isolation of user Windows2003
Hong Xinhua;,Hong Xinjian;
..............page:11,13
Improvement of PID Neural Network Based on Multi-innovation Algorithm
Qin Pinle;,Sun Minmin;
..............page:18,20
Research and implementation of network video monitoring system application architecture
Li Chengwu;,Ou Shuangqing;,Ren Zebin;
..............page:24,27
To explore the data backup and recovery technology in the portal
Rui Ying;,Si Wei;
..............page:25,27
The composition and function of digital microteaching system
La Guoqing;,Wang Yue;
..............page:26-27
Discussion virtualized cloud technology in the enterprise
Ren Jianyun;
..............page:28,31
Research of Gamma-gamma density logging based on Monte Carlo
Li Shiying;,Liu Mingzhe;
..............page:35-36
A Mobile Endpoint Exhibition Purchasing System Design Based on QR Code
Luo Jun;,Zhu Qiyuan;
..............page:39-40,43
Research on the clustering by using SOM network model
Yan Wei;,Yang Chen;
..............page:44-45
The Application of Ethereal for the Analysis of TCP/IP Protocol
Ma Zhengjun;,Wang Zhongcai;
..............page:46,48
Application of SCTP protocol NAT technology
Fan Zhanjun;,Gao Chao;
..............page:47-48
Power electrical equipment state overhaul technology research
Lv Shouxiang;
..............page:51-52
Investagation of Iris Vein Normalization Algorithm
Chen Datong;,Jin Cheng;,Mu Weibin;
..............page:53-54
Comparative Study Used Data Encryption Technology
Jia Zhiyang;,Lv Di;
..............page:55,57
Application of wireless LAN technology
Lu Xiaoli;
..............page:56-57
Analysis of speech signal processing technology and its application prospect
Chen Yongquan;,Hu Chonghao;,Zhang Yu;,Zheng Rongwen;
..............page:58-59
Research on the Attacks and Defense of Web Real-time Session Hijacking
Cao Weihua;,Liu Chunhui;,Lu Xiaoming;,Xu Bowen;
..............page:60-62
Analysis on the security strategy of E-business
Tan Xuelin;
..............page:64-65
Study of Security Measures of Computer Network
Chang Xuezhou;,Zhu Zhihong;
..............page:66,68
Research on digital campus security management
Liu Dingyi;
..............page:67-68
Digital archives information security research under a large data environment
Cheng Yanyan;,Fang Shimin;
..............page:70-71
Construct Control System Network Security System
Sang Zhibin;
..............page:75,77
On the highway traffic incident emergency rescue system
Chen Kunlun;
..............page:76-77
Computer network data security strategy
Li Ying;
..............page:82,84
On the information system of network planning
He Jian;
..............page:85,88
Design and implementation of tax Department network information system border protection system
Du Jun;,Ji Jun;,Shi Ning;,Yu Jingyu;
..............page:86,88
The realization of data disaster recovery
Cui Kai;,Xie Bin;
..............page:89-90,95
Shallow discussion security problem in network architecture
Duan Zhiming;,Huang Junqiang;,Wang Xizhong;
..............page:91-92,95
Research ring system based anti-theft system battery
Li Dong;,Li Zhan;,Zhang Junning;
..............page:93-95
Analysis of Bank Card information security in terms of network security
Zhi Shaochen;,Zhi Xiangming;
..............page:96-97
Research on Security Strategy Setting of Network Server
Guo Yulong;
..............page:102-103
A Function Signature Based on Mobile Security Authentication Protocol
Ding Ning;,Liu Wenjie;,Yang Tao;
..............page:104-105,107
Security system research in the government network
Ji Yingying;,Wang Bo;,Yu Chenglei;
..............page:106-107
Based on the subversion repository server simple comparison
Li Yuping;
..............page:110-111
Preliminary Design And Construction Allopatry Campus Network
Yang Dongwu;
..............page:112-113
Research of URL shortening technology based on content extraction
Gao Yinan;,Xue Fu;
..............page:114,116
File monitoring Webpage tamper proof system based on
Sun Jianshu;,Zhou Han;
..............page:115-116
Safety Monitoring ResearchBased on Station GroupSchema
Guo Jun;,Jiang Guowei;,Ma Jianrong;,Xu Shidong;
..............page:117-118
Network and information security emergency notification
Huang Junqiang;,Ma Yao;,Wang Xizhong;,Wu Qiong;
..............page:119,123
Reputation management mechanism in wireless sensor network
Li Jian;,Wu Zhengyi;
..............page:120-123
A deployment method of VPN based on radius authenticationand double gateway
Sun Xiaolin;,Wen Jie;
..............page:127-128
Application of Wi-Fi and Relevant Safety Problems
Zhou Xin;
..............page:129-130,133
Overview and Analysis on software engineering standard
Sun Haichao;
..............page:143,146
Application of cloud computing in terms of teaching
Zhang Lei;
..............page:147,149
Analysis of Computer Virus
Zhao Mingyang;
..............page:155-156
Based on the research of the optimal scheme VANET protocol
Song Xiaoyu;
..............page:160,162
Corporate website design thinking
Xie Yiwei;
..............page:164-165
Modem Educational Technology in Teaching
Hao Ying;
..............page:168-169
On class management under Network Environment
Zhong Aifen;
..............page:174,176
Construction of the hospital information system
Xu Shaohong;
..............page:177,179
Discretionary Penalty of Internet Rumors
Chen Yang;
..............page:181-182