Dissertation 

About 2411 item dissertation in line with Attack query results,the following is 1 to 50(Search took 0.057 seconds)

  1. The Defence of Directory Harvest Attack,OuJiaQuan/Guangzhou University,0/8
  2. A Network Security Risk Computation Approach Based on Attack Graphs,YeYun/National University of Defense Science and Technology,1/0
  3. Research on APT Network Attacks and Defense Strategies,LuoXiang/Tianjin University,0/11
  4. Research of Secure Socket Layer MitM Attacks and Defending,ZhaoSenDong/Harbin Engineering University,0/36
  5. Detecting LDoS Attacks Method Based on Abnormal ACK Traffic,ZhangJie/Huazhong University of Science and Technology,0/8
  6. A LDoS Attacks Detection Method Based on Abnormal TCP Data Traffic,ZhangJingJing/Huazhong University of Science and Technology,0/9
  7. Research on LDoS Attacks Detection Method Based on Coefficient of Variation and Hellinger Distance,WuKang/Huazhong University of Science and Technology,0/1
  8. Research of Vulnerability Attack Detection on Binary Code,LiuZhi/University of Electronic Science and Technology,0/133
  9. Research on the Detection Technology for Vulnerability in Java Web Program Based on Regular Expression,YeChuTian/Huazhong University of Science and Technology,0/12
  10. Research of Deception and Anti-Attack Methods in Dynamic Target Defense,WangWenLong/Huazhong University of Science and Technology,0/13
  11. Neighbor-Classification Detection Protocols and Curity Technology for WSNs,LiMingZuo/University of Science and Technology of China,0/32
  12. Implementation Firewall Combined with IPS to Prevent Dos/Malicious Attack,LATSAMY CHANTHAVONG/Hunan University,0/9
  13. Research on Attack Target Construction Based on Honeynet,ChengZuo/Xiamen University,0/11
  14. Research of Anti-Phishing Plugins Based on User Cooperaion,QiuBing/Zhejiang University of Technology,0/13
  15. Research on Some Key Technology of Network Information System’s Survivability,ZhaoChengLi/Jilin University,0/110
  16. Research and Implementation of Web Application Firewall Based on Feature Matching,FangShuang/Anhui University,0/3
  17. Study of CRFs intrusion detection method based on,NiuBingRu/Shandong Normal University,0/5
  18. Research and Implementation of DNS64Key Technology in the IPv4/IPv6Transition,ShaoShuai/Harbin Engineering University,0/32
  19. Research on Feature Extraction and Ensemble Detection Approaches for Recommendation Attacks in Collaborative Filtering,ZhouQuanQiang/Yanshan University,0/10
  20. Research and Implement on RFID Security Authentication Technology in Internet of Things,GuoBaoYu/Jiangsu University of Science and Technology,0/6
  21. On the Anti-Collusion Digital Fingerprinting,LiXinWei/Xi'an University of Electronic Science and Technology,1/0
  22. The Research of RFID Distance Bounding Protocol,WangJianZuo/Central China Normal University,0/1
  23. Design and Implementation about ARP Attack System Based on Campus Network,ZhaoMengNa/South China University of Technology,0/53
  24. The Algorithm Researches of Digital Text Watermarking,LiXiang/National University of Defense Science and Technology,0/25
  25. Analysis and Improvement of Data Encryption Algorithms,ZhaoXu/Harbin Institute of Technology,0/84
  26. Research and Implemention of Software Copyright Protection,LeiZunGuo/University of Electronic Science and Technology,0/4
  27. Research on Privacy Protection Based on K-anonymity,RenXiangMin/Harbin Engineering University,0/70
  28. Research on Survivability of Hidden Information Using Game Theory,HuZiQuan/University of Electronic Science and Technology,0/63
  29. Research on Privacy-Preserving Anonymous Technologies of Electronic Medical Records Publishing,WangWei/Central South University,0/17
  30. Research on Recommendation Attack Detection Algorithm for Collaborative Filtering Recommender Systems,LiPeng/Yanshan University,0/3
  31. Research on Network Bandwidth Isolation of Data Center for Cloud Computing,FengZhenQian/National University of Defense Science and Technology,0/248
  32. Research method of attack for the virtual machine software protection,LeiYuanXiao/Northwestern University,0/16
  33. Research on Wormhole Attack Detection Method of Wireless Sensor Network,YuanJiang/Huazhong University of Science and Technology,0/10
  34. Cryptanalytic Methods and Their Applications on Block Ciphers,TangXueHai/National University of Defense Science and Technology,0/114
  35. Research and Implementation of Power Analysis Attacks Based on Cryptographic Chip of RSA Algorithm,LiuYaLing/Tianjin University,0/3
  36. Research on the Hardware Implementation and Anti-attack Features for RSA Cryptographic Algorithm,BaiSongHui/Tianjin University,0/0
  37. Research and design on proxy signature scheme,YangLi/Shaanxi Normal University,0/37
  38. Quadratic Residue Problem and Cryptanalysis of One Strong Signature Scheme,ShaZuo/Shanghai University,0/1
  39. Research on threshold signature,XieJunQin/Shaanxi Normal University,0/33
  40. The Research of Enhanced Side-channel Attack and New Cryptographic Algorithmsits,SongZuo/Hunan University,0/0
  41. Research on Power Analysis Attack and Countermeasure for Light Weight Block Cipher Algorithm,JiangPeiHe/Harbin Institute of Technology,0/53
  42. Research on Key Management Scheme in WSN,ShiYan/Lanzhou University,0/20
  43. High-speed ECC Accelerator Resistant to Power Analysis Attack,CaoJie/Hangzhou University of Electronic Science and Technology,0/6
  44. Algebraic attack lightweight block cipher nonlinear module,LiuFeng/Shandong Normal University,0/2
  45. Analysis of HASH BMW function and SM3 algorithm,MengShuai/Shandong Normal University,0/2
  46. Research on the Wormhole Attack Detection in Wireless Sensor Networks,YangJie/Northeastern University,0/4
  47. The Research on Key Technologies of Jamming Attacks in Wireless Sensor Networks,SunYanQiang/National University of Defense Science and Technology,0/133
  48. Research of Secure Network Coding Against Pollution Attacks Based on Robust Network,HuangCheng/Huazhong University of Science and Technology,0/4
  49. Study of Security Localization Technology in Wireless Sensor Networks,WangShuai/Harbin Engineering University,0/29
  50. Detecting SIP-based DDoS Attack on IMS,ChenZhiQiang/Sun Yat-sen University,0/20

Total 49 Pages First Previous 1 2 3 4 5 6 7 8 9 10 Next Last

© 2012 www.DissertationTopic.Net  Mobile