http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Study on Evaluation Techniques of Intrusion Detection Systems
Dong, X.-m.; Xiao, K.; Yu, G. GAI-KAN BIAJIBU 2005 p.568-571
Research and Design of a New Network Dynamic Service Management Model
Xiao, Z.; Wei, W.; Sun, Y.-l. GAI-KAN BIAJIBU 2005 p.572-577
New Web Server Performance Benchmark System
Long, T.-j.; Sun, Z.-s.; Li, C.-w. GAI-KAN BIAJIBU 2005 p.578-581
Design and Implementation of iSCSI Target
Zeng, D.; Zhou, J.-l.; Yu, S.-s. GAI-KAN BIAJIBU 2005 p.582-584
Design and Implementation of a Datagrams Retransmission Timeout Based OS Fingerprinting Technique
Pu, Q. GAI-KAN BIAJIBU 2005 p.585-588
Design and Implementation of a Distributed Accounting Management Model
Huang, J.-y.; Xiong, Y.; Hua, B. GAI-KAN BIAJIBU 2005 p.589-592
Design of a Speech Secure Communication Software with Chaos Encryption
Sun, K.-h.; Chen, Y.-h.; Sheng, L.-y. GAI-KAN BIAJIBU 2005 p.596-599
Parallel Processing Model of the Block Cipher
Yin, X.-c.; Chen, W.-h.; Xie, L. GAI-KAN BIAJIBU 2005 p.600-603