Funding Data Link References Status API Help
Page 1 of 149 results
Sort by: relevance publication year

Network and System Security

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 1 to 1

Research and design of network security coordinated recovery system

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 19 to 23

Authors: J Xia, L Jiao, S Zhao, L Li

Front Matter

Other published 29 Jun 2015 in Network Security and Communication Engineering on pages i to xv

Author index

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 669 to 671

Grid and Cloud Computing

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 121 to 121

Data mining

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 389 to 389

Security defense model of Modbus TCP communication based on Zone/Border rules

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 79 to 86

Authors: W Shang, L Li, M Wan, P Zeng

Network communication based on 6LoWPAN and ZigBee

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 499 to 504

Authors: F Di, B Luo, Z Sun

The research on the space–time statistic characteristics of moving Sonar reverberation and its simulation method

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 635 to 638

Authors: J Liu, L Zhu

Research on MDA and SOA integrated software craftsmanship

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 653 to 656

Authors: Q Wang, L Liu, J Chen, J Lian, Z Pei

Research on key technology of three-dimensional talking-head driven by the Chinese text

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 597 to 600

Authors: L Shi, P Feng, J Zhao, J Tao

Research on text classification based on inverted-index in cloud computing data center

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 167 to 171

Authors: G Yang, L Chen, L Chen, B Meng

Research of a high power factor mobile phone charger based on L6561 and TinySwitch

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 163 to 166

Authors: D Chen

Research on the correlation of Shanghai composite index and the S&P500 index based on M-Copula-EGARCH

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 395 to 398

Authors: C Liu, X Gao, H Pan, J Li, X Liu

Analysis and research on information management of SME based on BPR method

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 549 to 551

Authors: Z Lu, Y Han, R Wang

Protect the semantic network identity: Attribute-based searchable encryption over routing in named data network

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 11 to 14

Authors: X Jiang, Q Huang

Mandatory access control scheme based on security label for state power control system

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 25 to 29

Authors: K Gao, Z Guo, Z Wang, X Li

Application of a security protocol to wireless multiple access systems

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 97 to 100

Authors: Ajung Kim

Cloud storage security

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 123 to 126

Authors: T Galibus, H Vissia

The security protection system design for the state grid with trusted computing technology

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 115 to 119

Authors: B Yang, B Zhao, H Zhang