1.
The development of network requires more deliberate researches on network security technologies (including network attacking technology and network defense technology).
网络的发展对网络安全技术(包括网络防御技术和网络攻击技术)的研究提出了更高的要求。
2.
Research on Techniques of Intrusion Traceback Based on Controlled Network;
基于可控域的网络攻击追踪技术研究
3.
Countermeasures of Attacks for IEEE8021x Network Access Authentication Techniques;
IEEE802.1x网络访问认证技术的攻击应对策略
4.
Research on Network Anti-Attack Techniques Aimed at Mobile Codes;
针对移动代码的网络反攻击技术研究
5.
Technology of Discovery and Analysis for Evidence on Network Invasion and Attack;
网络入侵与攻击线索发现和关联技术
6.
Research and Practice in Buffer Overflow Attack Technology Based on Multi-stage Network Attack Model;
基于多阶段网络攻击模型的缓冲区溢出攻击技术研究与实践
7.
Applying Data Mining to Intrusion Detection Technology
数据挖掘技术在网络攻击检测中的应用
8.
The Anatomy of Technology and Its Implement Model for Network Attacker-Tracing System;
网络攻击追踪方法的技术分析与实现模型
9.
Research on Defensive Denial of Service Attacks and IP Traceback Technology
拒绝服务攻击的防御与网络追踪技术研究
10.
Cooperative Silence Attack Technology of Fighter Based on Networked Warfare
网络化条件下战斗机静默攻击技术研讨
11.
Study on Social Engineering Attack in Network Confrontation Technology
网络对抗技术中社会工程学攻击的研究
12.
Optical Fiber Sensing Technique in Attack Detection Methods for All-Optical Networks Applications;
光纤传感技术在全光网络攻击测试方法中的应用
13.
Research on Attack Detection Technology of Wireless Sensor Network Based on LEACH Protocol
基于LEACH协议的无线传感器网络攻击检测技术研究
14.
The Research and Implementation of Attack Model and Event Correlation Technology in Network Security
网络安全攻击模型与事件关联技术的研究与实现
15.
Research and Implementation of Network Intrusion Detection and Protection Technology Based on HTTP-Flood Attack
基于HTTP-FLOOD攻击的网络入侵检测防御技术研究与实现
16.
Defense Strategy of DDOS Attacks Based on Honeynet Technology
基于蜜网技术的DDOS攻击防御策略
17.
Research on Network Attack Taxonomy and Network Attack System Model;
网络攻击分类及网络攻击系统模型研究
18.
Research on the Techniques of Network Attack and Defense Based on Rootkit in Linux;
Linux环境中基于Rootkit的网络攻防技术研究