已选(0)清除
条数/页: 排序方式:
|
| A CM-based model for 802.11 networks security policies enforcement 会议论文 作者: Mabiala Dondia, Karl; Ma, Jing; Feng Tao 收藏  |  浏览/下载:3/0  |  提交时间:2019/11/15
|
| 企业网络改造及优化的研究和设计 学位论文 2011, 2010 张少菲 收藏  |  浏览/下载:2/0  |  提交时间:2016/02/14
|
| 一种可信局域网计算环境原型系统的实现 期刊论文 2010, 2010 林劼; 李晓哲; 戴一奇; LIN Jie; LI Xiao-zhe; DAI Yi-qi 收藏  |  浏览/下载:1/0 |
| 安全局域网环境下安全邮件系统的设计与实现 期刊论文 2010, 2010 王姗姗; 付位刚; WANG Shan-shan; FU Wei-gang 收藏  |  浏览/下载:1/0 |
| Secure local area network based on dynamical monitor 期刊论文 2010, 2010 Cheng Lei; Si Tian-ge; Dai Yi-qi 收藏  |  浏览/下载:2/0 |
| Admission control scheme based on channel time classifications 期刊论文 2010, 2010 Zhuanq Jinjun; Lin Chuang; Ren Fengyuan 收藏  |  浏览/下载:3/0 |
| On Designing the Security System for LAN-based Educational Management Information System 会议论文 2nd International Conference on E-Business and Information System Security (EBISS), Wuhan, PEOPLES R CHINA, MAY 22-23, 2010 作者: Guo, Fangming*; Song, Hua 收藏  |  浏览/下载:7/0  |  提交时间:2019/12/04
|
| Multi-agent based intrusion detection architecture 会议论文 作者: Zhang, R; Qian, DP; Bao, CM; Wu, WG; Guo, XB 收藏  |  浏览/下载:3/0  |  提交时间:2020/01/07
|
| Research on Operation and Management of Mobile Informationization 会议论文 2010 作者: TangMin; XieZhong; WangChun 收藏  |  浏览/下载:5/0  |  提交时间:2020/01/04
|
| Analysis on Cloud-Based Security Vulnerability Assessment 会议论文 2010 作者: Huan-ChungLi; Po-HueiLiang; Shiang-JiunChen; Jiann-MinYang 收藏  |  浏览/下载:6/0  |  提交时间:2020/01/04
|