Dissertation 

About 10230 item dissertation in line with TP393.08,Computer Network Security query results,the following is 1 to 50(Search took 0.050 seconds)

  1. Research and Implementation on File Monitor System Based on Windows Driver,LiuShuang/Dalian University of Technology,0/19
  2. Research and Implementation of a Host-Based Intrusion Prevention System,YuanShuai/North China Electric Power University,0/2
  3. Research and Implemention of IP Packet Reinstall System Based on VPN,MaTeng/Dalian University of Technology,0/4
  4. Research on Network Security Supporting Technology,FangXiangYan/Harbin Engineering University,0/10
  5. Node Trust Degree Model for Volunteer Computing Environment,XuLing/Northeastern University,0/2
  6. Research on Intrusion Detection Based on Clustering Algorithm,WuLongChang/Northeastern University,0/5
  7. Study the Technology of Extraction Situation Factor for Network Security Situation Awareness,GuoJian/Northeastern University,0/4
  8. Design and Implementation of Trojan Detection System Based on Network Transmission Content,WangYanYan/Northeastern University,0/5
  9. Research on Intrusion Detection Based on Improved Decision Tree Algorithm,WangChu/Northeastern University,0/4
  10. Research on Anomaly Detection Based on host behavior,LinGuoYuan/Nanjing University,0/40
  11. The Electronic Reading Room ARP Virus Detection and Localization System Research,LiJin/Xi'an University of Petroleum,0/1
  12. Study and Deployment on Communication Security and Optimizations for VPN Networks,XuHaiDong/Northeastern University,0/5
  13. Research and Implement of Ipman XP Software Based on WinPcap,GaoLi/Northeastern University,0/1
  14. Research on Acceleration Technology of IPSec VPN Base on GPU,WangJinBao/Huazhong University of Science and Technology,0/2
  15. The Search of Privacy-preserving Matchmaking for Mobile Social Networking,ZhangZuoZuo/University of Electronic Science and Technology,0/63
  16. Research on Key Technologies of Network Traffic Analysis and System Implementation,ZhangZuoXiao/National University of Defense Science and Technology,0/70
  17. Research on IDS and Load Balancing Based on Multi-core Platform,LiYanJun/National University of Defense Science and Technology,0/12
  18. Research and Implementation of Relevant Technology in Colleges and Universities Teaching Administration System,LiQingSheng/Yanshan University,0/20
  19. Research of Coevolutionary Algorithm Based on Immune Agent,ChenShuai/Harbin University of Science and Technology,0/7
  20. Research on Real-valued Negative Selection Algorithm Based on Information Entropy Theory,QiaoZongJie/Harbin University of Science and Technology,0/5
  21. Research on Usage Control Model in Dynamic Openly Systems,DiZhiGang/Nanjing University of Aeronautics and Astronautics,0/10
  22. A Network Security Risk Computation Approach Based on Attack Graphs,YeYun/National University of Defense Science and Technology,1/0
  23. Recognition and Judgment of Public Relations Online on Bulletin Board System,GaoZuo/Institute of International Relations,0/4
  24. University Network Security Problems and Countermeasures,Xu/Yanshan University,1/0
  25. Research on Dependability Assurance for Internetware,SiGuanNan/Nankai University,0/23
  26. Research on Network Defending Scheme Against Malicious Code Based on Social Computing,LiuZuo/Nankai University,0/23
  27. Design and Implementation of Website Security Protection System,WangWeiTao/University of Electronic Science and Technology,0/150
  28. A Comprehensive Vulnerability Based Alert Management Approach,Humphrey Waita Njogu/Hunan University,0/3
  29. Research and Improvement of Online Payment Model Based on SSL Protocol,ChenXiuQiong/Northeastern University,0/6
  30. Botnet Design and Implementation for Internet Offensive and Defensive Test Platform,LiuXingLong/Harbin Institute of Technology,0/29
  31. Research on Technique of Capture and Reconstruction Audio and Video Traffic,JiaRongLai/Harbin Institute of Technology,0/14
  32. The Research and Application of Party School Network Security System Based on Classified Protection,WangHui/Sun Yat-sen University,0/47
  33. The Optimization of Worm Chaotic Dynamic Propagation Model Base on Quarantine and the Study on the Cost Optimizing Control,LiQiaoJun/Harbin Institute of Technology,0/2
  34. Research on Detection of Peer-to-Peer Botnet,ZhangShuai/Harbin Institute of Technology,0/14
  35. Active Defense and the Intrusion Forensics Researches Based on the Associated Weaknesses and Game Theory,NiuTong/Harbin Institute of Technology,0/32
  36. Research on IPv6Routing Strategy Based on the Virtual Router,LiuJianZhi/Harbin Institute of Technology,1/0
  37. Research on Access Control for Data Privacy Protection in Cloud Computing,YeZhiWei/Harbin Institute of Technology,0/128
  38. Research on Enhancement Technology of Proxy Cluster Dependability Based on Autonomic Computing,WangJian/Harbin Institute of Technology,0/4
  39. Research and Application of Network Monitor,YuJiLai/Hunan University,0/1
  40. Trust Management Against Risks in Peer to Peer E-Commerce,Ngui; Felix Musau(MuSa)/Central South University,0/352
  41. The Network Inside and Outside Isolation of Guizhou ATC System Design and Implementation,PanPingShan/University of Electronic Science and Technology,0/5
  42. The Intrusion Detection System Research Based on Adaptive Genetic Algorithm,AnKang/University of Electronic Science and Technology,0/2
  43. Honeypot Technology in Network Security Design and Application,ChenZuo/University of Electronic Science and Technology,0/2
  44. Modeling the Propagation and Defense Study of Internet Worms,WenZuo/Central South University,0/98
  45. Research on Defencing Real Source Address DDoS Attack,ZhuHongChao/Central South University,0/5
  46. The Research and Implementation of Distributed Intrusion Detection System Based on Libnids,XuPingJun/Central South University,0/12
  47. Research on APT Network Attacks and Defense Strategies,LuoXiang/Tianjin University,0/11
  48. Analysis of Permission Leakage in ARBAC and Improvement,CuiHongFei/Tianjin University,0/1
  49. Research on Key Technologies of Anonymous Communication Based on Peer-to-peer Network,MaZuo/Tianjin University,0/8
  50. The Design and Implementation of Browser Extension Vulnerability Detecting Tool,WangQin/Tianjin University,0/1

Total 205 Pages First Previous 1 2 3 4 5 6 7 8 9 10 Next Last

© 2012 www.DissertationTopic.Net  Mobile