Font Size: a A A
Keyword [Malicious]
Result: 1 - 20 | Page: 1 of 10
1. Research On Real-Time Classification Of URLs In Large Scale Network Traffic
2. Research On Recongnition Of Malicious Behavior For Binary Executables Based On Model Checking
3. Research On Theory Of Practical Secure Two-Party Computation
4. Research On Technology Of Software Protection And Malicious Code Detection Based On Code Obfuscation
5. Research On Secure Consensus For Multi-agent Systems Under Malicious Attacks
6. Mobile Code Protection Against Malicious Hosts
7. Image Authentication Technique Based On Digital Watermarking
8. Research On Mechanism And Defense Of Malicious Code
9. Research On Detection And Control Of Network Malicious Flows
10. Research On Survival Secure DBMS And Its Key Technologies
11. DoS Defense Based On Packet Marking
12. The Analysis And Design Of Certificateless Cryptographic Schemes And Proxy Cryptographic Schemes
13. Evaluation Of Reputation Under Peer-to-peer Environment
14. Research On The Technique Of Countering Malicious Nodes In Wireless Sensor Networks
15. Research Of Reverse Analysis On Self-Modifying Code
16. Mobile Code Security Based On Trusted Computing Technology
17. Research On Wireless Transmission Based On Network Coding
18. Research On Peer-to-Peer Malicious Worm Networks
19. On The Modeling Of Malicious Mobile Code Propagation And Monitoring
20. Research On Key Technology Of Network Threat Detection And Defense
  <<First  <Prev  Next>  Last>>  Jump to