About 66 item dissertation in line with active defense query results,the following is 1 to 50(Search took 0.075 seconds)
- Active Defense and the Intrusion Forensics Researches Based on the Associated Weaknesses and Game Theory,NiuTong/Harbin Institute of Technology,0/32
- Research on Active Intrusion Defense System Based on Chaotic Time Series Forecasting,YuQing/Tianjin University,0/18
- Research on Android Application Source Code Analysis and Runtime Security Defense Technology,WuShaoMei/Harbin Institute of Technology,0/62
- Research on Active Defense Measures for Ship to Aviod Colliding with Bridge in Construction,GeLiLi/Jilin University,0/28
- Analysis and Design to Browser-Based Sandbox System,ZhaoChangLin/Beijing University of Posts and Telecommunications,1/105
- Research of User’s Privacy Protection on Cloud-based Anti-malware System,HuGang/Huazhong University of Science and Technology,0/36
- Research and Implementation of Active Defense System Based on Linkage,WangGuangXu/North China Electric Power University,0/54
- Research and Design of Campus Network Range Based on Honeypot Technology,XuLunZhang/Beijing Jiaotong University,0/105
- Research on Key Technologies of a New Honeynet Architecture and Alert Clustering,ZuoXiaoBo/Beijing University of Posts and Telecommunications,0/261
- Design and Implementation of Android Privacy Protecting Software,ZengYang/Beijing University of Posts and Telecommunications,0/119
- Evolution of the People’s Liberation Army: Doctrine, Threats and Leadership,JieSen/Tsinghua University,0/10
- Study on Technology of Emergency Prevention and Control under Regional Road Network,SongZiXiang/Chang'an University,0/64
- Research on Domain Name System Security,Wang/Harbin Institute of Technology,3/406
- Key Technique Research on the Short-range Active Defense System Radar,XiongZhangLiang/Nanjing University of Technology and Engineering,7/514
- Research on Active Defense Based on Attack-Defense Game Model,JiangWei/Harbin Institute of Technology,0/259
- Empirical Study on G2G E-government Information Sharing and Security,FanJing/Shanghai Jiaotong University,1/772
- Research and Implementation of the Active Network Defense Technology Based on Deception,YaoLan/Xi'an University of Electronic Science and Technology,0/132
- Some Key Technology Research of Phase-Coded Radar,ZhaoZhao/Nanjing University of Technology and Engineering,0/51
- Research on Large-scale Network Security Situation Assessment and Defense Technology,ZhuLiNa/Harbin Engineering University,1/305
- Research on Classification Algorithms of Trojan Horse Detection Based on Behavior Analysis,GuYuJie/Zhejiang University of Technology,9/407
- Research and Application of Network Active Defense System,ZuoJun/Shanghai Jiaotong University,2/207
- Research and Implementation of Active Defense System Based on Dynamic Tracing,XueZhiPing/Shanghai Jiaotong University,3/317
- The Research and Implementation of Active Defending Worm System Based on Honeyfarm,FuGuangQuan/Suzhou University,1/116
- Research and Design of Network Security System Based on Intrusion Deception Technology,GaoWeiMin/Hunan University,3/238
- Study of Security Defense Technology on Campus Network,ZhongPing/Guangdong University of Technology,9/808
- Automatic response system based on the data link layer topology discovery research and,ZhangZhengFan/Central South University,1/81
- Research on Information Service and Its Security of Digital Campus Network,WuLiZuo/Central South University,2/345
- Research on Yi Zhou Shu’s Military Thoughts,JiaJingFeng/Jilin University,0/183
- Software Vulnerability Test Technology,WangHang/Institute of Software,1/319
- Research on Robust Gateway System,XiangJi/Institute of Electronics,1/41
- Honeypot Network System Research and Implementation,MaLiangYu/Guizhou University,0/192
- Research and Implemention of System for Protecting from Denial of Service Attacks Based on Linux,LiuYaGuang/Tianjin University,3/109
- \,ZhanYing/Guizhou University,5/292
- Study of Active Defense to Internet Worm in Architectural Counter-attack,TangZhanYong/Northwestern University,7/168
- The Research and Implementation of Honeynet,ShiLiXian/Dalian Maritime University,5/149
- A Secure End-system Based on Proactive Defense Strategy,LiangXing/Huazhong University of Science and Technology,0/268
- ODD_NAD-The Design and Develop of a Distributed Network Active Defense System,CaiZuo/Chongqing University,0/113
- The Research of How to Deceive and Lure Network Attack,DengJian/Guangxi Normal University,4/253
- Active Defense System Based on Honeypot Research and Design,ZhangJun/Central South University,3/135
- Research on Active Measures for Ship to Avoid Colliding with Inland Bridge in Constructing Period,ZhangJingCheng/Wuhan University of Technology,3/185
- Research and Implementation of an Active Website Defacement-Proof Mechanism,QiXiaoTong/Beijing Jiaotong University,4/180
- Research in Active Defense Based on Program Behavior Analysis,ZhangYuFei/Changchun University of Science and Technology,1/101
- Research and Implementation of Host Security Technology,ZuoXiaoLiang/Beijing University of Posts and Telecommunications,4/200
- Network Active Prevention and Centralized Monitoring Control System,NiuYingYing/Daqing Petroleum Institute,0/73
- Research and Design One Active Defence System,LeiZhen/Chengdu University of Technology,4/233
- Research on the Artificial Immunity-Based Proactive Defense System,YuHongXiao/Nanhua University,0/71
- Research and Implementation of smart Honeynet architecture and its key technologies,ChengQian/University of Electronic Science and Technology,1/123
- Active defense technology research and,XiangLinZuo/University of Electronic Science and Technology,2/130
- Designand Implementation of Transitive Trust,ZhongJing/South China University of Technology,0/37
- A Comparison of the "Anti-Access/Area Denial" Military Strategy as Formulated by the United States and China’s Active Defense Military Strategy,LiAnDong(Anton Lee Wishik Ⅱ)/Nanjing University,0/78
Total 2 Pages First Previous 1 2 Next Last
© 2012 www.DissertationTopic.Net Mobile
|