About 2810 item dissertation in line with network security query results,the following is 1 to 50(Search took 0.091 seconds)
- Design and Implementation of A Network Access Monitoring System for User,LiuQiao/Northeastern University,0/1
- Security Module Based on Command Code for Resource Constrained Wireless Sensor Networks,HanYu/Harbin Institute of Technology,0/2
- Design and Application of Higher Vocational Colleges and Universities Campus Network,ZhengYeMeng/Qilu Industrial University,0/163
- Campus intelligent network construction,ZhengZhou/Nanjing University of Technology and Engineering,0/14
- Study of Fujian Business School Campus Network Based on Engineering Design,ZhengZuo/University of Electronic Science and Technology,0/45
- Research and Design of University Network Construction,YangXiaoZuo/Nanjing University of Technology and Engineering,0/22
- The Design of Fiber Ethernet Intelligent Splitter Based on FPGA,SongWei/South China University of Technology,0/32
- Research and Implemention of IP Packet Reinstall System Based on VPN,MaTeng/Dalian University of Technology,0/4
- Research on Intrusion Detection Based on Clustering Algorithm,WuLongChang/Northeastern University,0/5
- Study the Technology of Extraction Situation Factor for Network Security Situation Awareness,GuoJian/Northeastern University,0/4
- The Electronic Reading Room ARP Virus Detection and Localization System Research,LiJin/Xi'an University of Petroleum,0/1
- Study and Deployment on Communication Security and Optimizations for VPN Networks,XuHaiDong/Northeastern University,0/5
- Research on Key Technologies of Network Traffic Analysis and System Implementation,ZhangZuoXiao/National University of Defense Science and Technology,0/70
- A Network Security Risk Computation Approach Based on Attack Graphs,YeYun/National University of Defense Science and Technology,1/0
- University Network Security Problems and Countermeasures,Xu/Yanshan University,1/0
- Research and Application of Network Monitor,YuJiLai/Hunan University,0/1
- The Network Inside and Outside Isolation of Guizhou ATC System Design and Implementation,PanPingShan/University of Electronic Science and Technology,0/5
- Honeypot Technology in Network Security Design and Application,ChenZuo/University of Electronic Science and Technology,0/2
- Based on the Firewall and Intrusion Detection Linkage System Research and Implementation,DaiLiang/University of Electronic Science and Technology,0/9
- Research and Application of the ARP Defense System in the Industrial Ethernet Ring Network,LianYueZhao/Tianjin University,0/0
- Modeling the Propagation and Defense Study of Internet Worms,WenZuo/Central South University,0/98
- A Study and Realization on Network Sniffing Technology of MFC Net Based on WinPcap,YuRong/Hunan University,0/90
- Design and Implementation of Vulnerability Scanner Scheduling System Based on Cloud Platform,ZhouMei/Beijing University of Posts and Telecommunications,0/56
- Research of Fast-flux Bot Detection and System Implementation,LiuZiMao/Huazhong University of Science and Technology,0/11
- Design and Implementation of Network Layer Attacks Platform Based on B/S Architecture,YangZuo/Xi'an University of Electronic Science and Technology,0/16
- The Mix Honeypot Application in Network Security,LinHaiJing/Harbin University of Science and Technology,0/12
- A Honeypot System Based on Honeyd the Technology for Detecting the Botnet,FanLeiPeng/Changchun University of Science and Technology,0/0
- Design and Implementation of Security of Campus Card Network Boundary,ZhuFuHai/Hunan University,0/5
- Research and Implementation of Intrusion Detection System,WangZuo/University of Electronic Science and Technology,0/2
- The Research about Security of Special Police Detachment’s Internal Information Network,XiaoZuo/Xi'an University of Architecture and Technology,0/6
- Research on Network Security Situation Assessment Based on Autonomic Computing,ZhangDan/Henan University of Science and Technology,0/5
- The Design and Implementation of Safety Network Architecture for the Digital Library,JuFang/Nanjing University of Posts and Telecommunications,0/30
- Research on Security Performance Based on Embedded Network Firewall,RenZhou/Central South University,0/22
- Research on Anomaly Detection Method Based on Fusion of NetFlow and sFlow Network Flow,ChenXin/Harbin Engineering University,0/41
- The Research on Firewall Policy in Cloud Environment Conflict Detecting and Resolving,XiaoZuo/Hunan University,0/1
- Design and Implementation of Optimization and Reconstruction of Putian University Campus Network,GuoHaiBin/Nanjing University of Posts and Telecommunications,0/53
- Design and Optimization of Deep Packet Inspection System in Multicore Environment,AiZuo/Harbin Institute of Technology,0/15
- Testing for Safety of Network Protocol Based on Fuzz Testing,HuangWeiBin/Sun Yat-sen University,0/47
- Design and Implementation of Secure Bank File Transfer System Based on Physical Isolation Network Gap,WuZuo/University of Electronic Science and Technology,0/25
- Virtual Honeypots in the Campus Network of Research and Application,WuXiangZhe/University of Electronic Science and Technology,0/21
- Design and Implementation of the Information Network of Nanping Tobacco Company Based on Security Domain,GuoXiangFei/Xiamen University,0/6
- Analysis and Design of a Tobacco Company Network Reconstruction Plan,LiFan/Xiamen University,0/26
- Campus Network Security Defense System Construction and Implementation,LiChunXia/Lanzhou University,0/110
- The Design and Implementation of Network Security Schema for an Organization,ShiYu/University of Chinese Academy of Sciences,College of Engineering&Information Technology,0/3
- The Implementation of Firewall Network Security Design under the LINUX Environment,LaiYueFang/South China University of Technology,0/51
- Application on Hybrid Packet Flitering Firewall in the Office Network of Communication Industry,XieMing/University of Electronic Science and Technology,0/19
- The Research and Designation of Network and Security System of Type Electronic Power Enterprise,TanXiao/Nanchang University,0/14
- The Research on Intrusion Detection Based on Support Vector Machine,HeQiBei/Northeast Normal University,0/21
- The Optimization Design for Network Security System of Shijiazhuang Information Engineering Vocational College,LiYang/Hebei University of Science and Technology,0/41
- Research on the Key Technology of Intelligent Threat Traceback,XiaKunPeng/Beijing Jiaotong University,0/41
Total 57 Pages First Previous 1 2 3 4 5 6 7 8 9 10 Next Last
© 2012 www.DissertationTopic.Net Mobile
|