Showing 1 - 7 results of 7 for search 'De-guang LE', query time: 0.02s
Refine Results
-
1
Frame importance valuation cognition based error control mechanism on cognitive networks by De-guang LE, Yong JIN, Dong-hui GUO, Jin-yi CHANG
Published 2011-11-01
Article -
2
Frame importance valuation cognition based error control mechanism on cognitive networks by De-guang LE, Yong JIN, Dong-hui GUO, Jin-yi CHANG
Published 2011-11-01
Article -
3
Penetration test method using blind SQL injection based on second-order fragment and reassembly by De-guang LE, Sheng-rong GONG, Shao-gang WU, Feng XU, Wen-sheng LIU
Published 2017-10-01
Article -
4
Research on OLE object vulnerability analysis for RTF file by De-guang LE, Liang ZHANG, Sheng-rong GONG, Li-xin ZHENG, Shao-gang WU
Published 2016-01-01
Article -
5
Penetration test method using blind SQL injection based on second-order fragment and reassembly by De-guang LE, Sheng-rong GONG, Shao-gang WU, Feng XU, Wen-sheng LIU
Published 2017-10-01
Article -
6
Research on RTF array overflow vulnerability detection by De-guang LE, Sheng-rong GONG, Shao-gang WU, Feng XU, Wen-sheng LIU
Published 2017-05-01
Article -
7
Research on RTF array overflow vulnerability detection by De-guang LE, Sheng-rong GONG, Shao-gang WU, Feng XU, Wen-sheng LIU
Published 2017-05-01
Article