Strted in 1985 Monthly
ISSN 1005-0302
CN 21-1315/TG
Impact factor:2.267

The journal has been awarded the excellent periodical in China, and its articles are covered by SCI, EI, CA, SA, JST, AJ, CSA, MA, EMA, AIA etc., PASCAL web. ISI web of Science,SCOPUS.

Other articles related with "

TP393.08

":
  Zhang Hongbin, Cao Yiqin
  A New Classifier Design in a Topic Search Engine by Combining Multi-layer Classifier with Naive Bayes Classification Model
    Data Analysis and Knowledge Discovery   2011 Vol.27 (3): 73-79 [Abstract] (1547) [PDF 697 KB] (805)
  Shi Hongjuan,Li Chaoyang
  The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example
    Data Analysis and Knowledge Discovery   2009 Vol.25 (6): 85-88 [Abstract] (1356) [PDF 499 KB] (1026)
  Ma Jing,Li Qv
  The Essential Elements of System Behavior and Design of Its Inspect Mechanism
    Data Analysis and Knowledge Discovery   2007 Vol.2 (1): 77-80 [Abstract] (1590) [PDF 551 KB] (526)
  Li Hui,Liu Dongsu,Wang Yu
  A Security Management Framework for E-commerce Based on OWL
    Data Analysis and Knowledge Discovery   2006 Vol.1 (11): 69-72 [Abstract] (1590) [PDF 0 KB] (218)
  Zhang Dexiang,Mu Jianbo,Wang Xiaoyan,Jia Xiaozhu
  Design and Implementation of Network Security System for the Library Based on Virtual Technique
    Data Analysis and Knowledge Discovery   2006 Vol.1 (6): 73-76 [Abstract] (2279) [PDF 0 KB] (224)
  Wu Zhenxin,Li Guangjian,Xu Yandong,Ma Ming
  Building a Network Security System for a Library
    Data Analysis and Knowledge Discovery   2005 Vol.21 (10): 67-69 [Abstract] (1161) [PDF 0 KB] (225)
  Miao Yuanzhao,Yang Yang,Yu Peng
  Study on Computer Network Safety System of the College Library Based on Network Layer
    Data Analysis and Knowledge Discovery   2005 Vol.21 (8): 61-64 [Abstract] (1316) [PDF 0 KB] (265)
  Yang Yingquan,Wen Ru
  Application of Microsoft Fail over Cluster in Library
    Data Analysis and Knowledge Discovery   2005 Vol.21 (1): 32-35 [Abstract] (1377) [PDF 0 KB] (233)
  Zhang Hongwu
  Application and Optimize of Proxy Server in Library Local Area Network
    Data Analysis and Knowledge Discovery   2004 Vol.20 (5): 27-29 [Abstract] (1179) [PDF 0 KB] (192)
  Jiang Jihong
  The Network s Encryption and Authentication Technique
    Data Analysis and Knowledge Discovery   2003 Vol.19 (4): 78-80 [Abstract] (1302) [PDF 0 KB] (223)
  Lin Zeming
  The Application Research of Library's Web Database System Based on ASP
    Data Analysis and Knowledge Discovery   2003 Vol.19 (1): 51-53 [Abstract] (1495) [PDF 0 KB] (303)
  Lin Zeming,Xie Kesheng
  Dissertation on Security System of Library's Hard Disk Array
    Data Analysis and Knowledge Discovery   2002 Vol.18 (6): 84-86 [Abstract] (1413) [PDF 0 KB] (262)
  Shen Wenyu,Liu Zongren
  Clear Method and Countermeasure of Trojan Horse[J]. 现代图书情报技术, 2002,18(2): 92-93')"/> Clear Method and Countermeasure of Trojan Horse
    Data Analysis and Knowledge Discovery   2002 Vol.18 (2): 92-93 [Abstract] (1331) [PDF 0 KB] (214)
  Xu Jinjun,Ni Bo
  Research of Information Network Security
    Data Analysis and Knowledge Discovery   2001 Vol.17 (1): 60-61 [Abstract] (1190) [PDF 0 KB] (178)
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn