About 10230 item dissertation in line with TP393.08,Computer Network Security query results,the following is 1 to 50(Search took 0.039 seconds)
- Research and Implementation on File Monitor System Based on Windows Driver,LiuShuang/Dalian University of Technology,0/19
- Research and Implementation of a Host-Based Intrusion Prevention System,YuanShuai/North China Electric Power University,0/2
- Research and Implemention of IP Packet Reinstall System Based on VPN,MaTeng/Dalian University of Technology,0/4
- Research on Network Security Supporting Technology,FangXiangYan/Harbin Engineering University,0/10
- Node Trust Degree Model for Volunteer Computing Environment,XuLing/Northeastern University,0/2
- Research on Intrusion Detection Based on Clustering Algorithm,WuLongChang/Northeastern University,0/5
- Study the Technology of Extraction Situation Factor for Network Security Situation Awareness,GuoJian/Northeastern University,0/4
- Design and Implementation of Trojan Detection System Based on Network Transmission Content,WangYanYan/Northeastern University,0/5
- Research on Intrusion Detection Based on Improved Decision Tree Algorithm,WangChu/Northeastern University,0/4
- Research on Anomaly Detection Based on host behavior,LinGuoYuan/Nanjing University,0/40
- The Electronic Reading Room ARP Virus Detection and Localization System Research,LiJin/Xi'an University of Petroleum,0/1
- Study and Deployment on Communication Security and Optimizations for VPN Networks,XuHaiDong/Northeastern University,0/5
- Research and Implement of Ipman XP Software Based on WinPcap,GaoLi/Northeastern University,0/1
- Research on Acceleration Technology of IPSec VPN Base on GPU,WangJinBao/Huazhong University of Science and Technology,0/2
- The Search of Privacy-preserving Matchmaking for Mobile Social Networking,ZhangZuoZuo/University of Electronic Science and Technology,0/63
- Research on Key Technologies of Network Traffic Analysis and System Implementation,ZhangZuoXiao/National University of Defense Science and Technology,0/70
- Research on IDS and Load Balancing Based on Multi-core Platform,LiYanJun/National University of Defense Science and Technology,0/12
- Research and Implementation of Relevant Technology in Colleges and Universities Teaching Administration System,LiQingSheng/Yanshan University,0/20
- Research of Coevolutionary Algorithm Based on Immune Agent,ChenShuai/Harbin University of Science and Technology,0/7
- Research on Real-valued Negative Selection Algorithm Based on Information Entropy Theory,QiaoZongJie/Harbin University of Science and Technology,0/5
- Research on Usage Control Model in Dynamic Openly Systems,DiZhiGang/Nanjing University of Aeronautics and Astronautics,0/10
- A Network Security Risk Computation Approach Based on Attack Graphs,YeYun/National University of Defense Science and Technology,1/0
- Recognition and Judgment of Public Relations Online on Bulletin Board System,GaoZuo/Institute of International Relations,0/4
- University Network Security Problems and Countermeasures,Xu/Yanshan University,1/0
- Research on Dependability Assurance for Internetware,SiGuanNan/Nankai University,0/23
- Research on Network Defending Scheme Against Malicious Code Based on Social Computing,LiuZuo/Nankai University,0/23
- Design and Implementation of Website Security Protection System,WangWeiTao/University of Electronic Science and Technology,0/150
- A Comprehensive Vulnerability Based Alert Management Approach,Humphrey Waita Njogu/Hunan University,0/3
- Research and Improvement of Online Payment Model Based on SSL Protocol,ChenXiuQiong/Northeastern University,0/6
- Botnet Design and Implementation for Internet Offensive and Defensive Test Platform,LiuXingLong/Harbin Institute of Technology,0/29
- Research on Technique of Capture and Reconstruction Audio and Video Traffic,JiaRongLai/Harbin Institute of Technology,0/14
- The Research and Application of Party School Network Security System Based on Classified Protection,WangHui/Sun Yat-sen University,0/47
- The Optimization of Worm Chaotic Dynamic Propagation Model Base on Quarantine and the Study on the Cost Optimizing Control,LiQiaoJun/Harbin Institute of Technology,0/2
- Research on Detection of Peer-to-Peer Botnet,ZhangShuai/Harbin Institute of Technology,0/14
- Active Defense and the Intrusion Forensics Researches Based on the Associated Weaknesses and Game Theory,NiuTong/Harbin Institute of Technology,0/32
- Research on IPv6Routing Strategy Based on the Virtual Router,LiuJianZhi/Harbin Institute of Technology,1/0
- Research on Access Control for Data Privacy Protection in Cloud Computing,YeZhiWei/Harbin Institute of Technology,0/128
- Research on Enhancement Technology of Proxy Cluster Dependability Based on Autonomic Computing,WangJian/Harbin Institute of Technology,0/4
- Research and Application of Network Monitor,YuJiLai/Hunan University,0/1
- Trust Management Against Risks in Peer to Peer E-Commerce,Ngui; Felix Musau(MuSa)/Central South University,0/352
- The Network Inside and Outside Isolation of Guizhou ATC System Design and Implementation,PanPingShan/University of Electronic Science and Technology,0/5
- The Intrusion Detection System Research Based on Adaptive Genetic Algorithm,AnKang/University of Electronic Science and Technology,0/2
- Honeypot Technology in Network Security Design and Application,ChenZuo/University of Electronic Science and Technology,0/2
- Modeling the Propagation and Defense Study of Internet Worms,WenZuo/Central South University,0/98
- Research on Defencing Real Source Address DDoS Attack,ZhuHongChao/Central South University,0/5
- The Research and Implementation of Distributed Intrusion Detection System Based on Libnids,XuPingJun/Central South University,0/12
- Research on APT Network Attacks and Defense Strategies,LuoXiang/Tianjin University,0/11
- Analysis of Permission Leakage in ARBAC and Improvement,CuiHongFei/Tianjin University,0/1
- Research on Key Technologies of Anonymous Communication Based on Peer-to-peer Network,MaZuo/Tianjin University,0/8
- The Design and Implementation of Browser Extension Vulnerability Detecting Tool,WangQin/Tianjin University,0/1
Total 205 Pages First Previous 1 2 3 4 5 6 7 8 9 10 Next Last
© 2012 www.DissertationTopic.Net Mobile
|