CN111368231A
|
|
Method and device for testing heterogeneous redundant architecture website
|
CN111371743A
|
|
Security defense method, device and system
|
CN110135150A
|
|
A kind of program operation control method and system
|
CN107122657A
|
|
A kind of database broker device for defending SQL injection to attack
|
CN107092518A
|
|
A kind of Compilation Method for protecting mimicry system of defense software layer safe
|
US2016352770A1
|
|
Software/hardware device with uncertain service function and structural characterization, and scheduling method thereof
|
CN105553975A
|
|
Method for providing network service, device and system
|
CN105429953A
|
|
Method, device and system used for accessing websites
|
CN105245549A
|
|
Active defense method against DDoS attacks
|
CN105245530A
|
|
Information secure transmission agent system
|
CN105391697A
|
|
Trunking communication method based on information fragmentation processing
|
CN105205476A
|
|
Face recognition hardware framework based on LBP characteristics
|
CN105119836A
|
|
Dynamic operation method of routing protocol component based on state pool
|
CN105306251A
|
|
Mimicry network topology transformation method
|
CN105068766A
|
|
Method for fast reading file in disk array based on FPGA
|
CN105007191A
|
|
Perception, decision and execution separation method for pseudo-route switching system
|
CN105141519A
|
|
Pseudo-network node protection method based on load transformation
|
CN105072036A
|
|
Mimicry routing decision method of multi-instance routing unit
|
CN106155776A
|
|
Restructural resource parallel constructing method and system in reconfigurable system
|
CN106155755A
|
|
Program compiling method and compiler
|