共 50 条
- [1] Design of application layer security system for CIMS network Xiaoxing Weixing Jisuanji Xitong, 1 (55-63):
- [2] Design and realization of information integrating in CIMS Jisuanji Gongcheng/Computer Engineering, 2000, 26 (11): : 29 - 30
- [3] Design and Realization of Network Security Audit and Monitoring System PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON TEST AUTOMATION & INSTRUMENTATION, VOLS 1-2, 2008, : 1029 - 1032
- [4] A network security policy model and its realization mechanism INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 168 - +
- [5] Design and Realization of Concurrent Processing System for Network Security Event 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 2, PROCEEDINGS, 2009, : 491 - 494
- [6] Design and realization of a network security information exchange format based on OWL Proceedings of 2006 International Conference on Artificial Intelligence: 50 YEARS' ACHIEVEMENTS, FUTURE DIRECTIONS AND SOCIAL IMPACTS, 2006, : 615 - 618
- [7] Study on security mechanism of network based mobile agent with its realization Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2002, 22 (03):
- [8] Architectural design of CIMS computer network Dongbei Daxue Xuebao/Journal of Northeastern University, 1994, 15 (04):
- [9] Camera Security Network Design and Realization Based on PCA Facial Recognition Algorithms 2016 IEEE INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION AND COMMUNICATION TECHNOLOGY ICEICT 2016 PROCEEDINGS, 2016, : 12 - 15
- [10] Camera Security Network Design and Realization Based on PCA Facial Recognition Algorithms 2015 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2015, : 727 - 730