咨询与建议

限定检索结果

文献类型

  • 76 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 78 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 63 篇 工学
    • 52 篇 计算机科学与技术...
    • 20 篇 信息与通信工程
    • 19 篇 软件工程
    • 16 篇 电气工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 仪器科学与技术
    • 2 篇 生物工程
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 水利工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
  • 6 篇 理学
    • 3 篇 物理学
    • 2 篇 数学
    • 2 篇 生物学
    • 1 篇 大气科学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 8 篇 network security
  • 6 篇 security
  • 4 篇 trust
  • 3 篇 intrusion detect...
  • 3 篇 resource managem...
  • 3 篇 cryptography
  • 2 篇 computer science
  • 2 篇 access control
  • 2 篇 mobile ad hoc ne...
  • 2 篇 communication sy...
  • 2 篇 fault tolerance
  • 2 篇 authentication
  • 2 篇 remote attestati...
  • 2 篇 cloud
  • 2 篇 computer system ...
  • 2 篇 network coding
  • 2 篇 wireless sensor ...
  • 2 篇 game theory
  • 2 篇 systems analysis
  • 2 篇 mobile computing

机构

  • 4 篇 chinese acad sci...
  • 2 篇 hp
  • 2 篇 pucrs
  • 2 篇 dalian univ tech...
  • 2 篇 id-imag grenoble
  • 1 篇 sungkyunkwan uni...
  • 1 篇 ibm global solut...
  • 1 篇 univ wisconsin d...
  • 1 篇 univ michigan an...
  • 1 篇 chinese acad sci...
  • 1 篇 department of co...
  • 1 篇 univ aizu div in...
  • 1 篇 electrical engin...
  • 1 篇 department of co...
  • 1 篇 dalian univ tech...
  • 1 篇 politechnic scho...
  • 1 篇 nyu comp sci & e...
  • 1 篇 evergreen state ...
  • 1 篇 univ waikato cyb...
  • 1 篇 hosei univ dept ...

作者

  • 2 篇 bouhoula adel
  • 1 篇 liang fengrui
  • 1 篇 jankowiak i.
  • 1 篇 cherfaoui véroni...
  • 1 篇 li sen
  • 1 篇 giffin jonathon ...
  • 1 篇 o. richard
  • 1 篇 ateniese giusepp...
  • 1 篇 kong huafeng
  • 1 篇 f.i. massetto
  • 1 篇 jacob florian
  • 1 篇 yao wei
  • 1 篇 maillard n.
  • 1 篇 chenyu yan
  • 1 篇 kim hyoungshick
  • 1 篇 li xin
  • 1 篇 coombes peter j
  • 1 篇 yu wang
  • 1 篇 fengrui liang
  • 1 篇 yang bo

语言

  • 73 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"任意字段=14th Symposium on Network and Distributed System Security, NDSS 2007"
78 条 记 录,以下是11-20 订阅
排序:
14th International Workshop on Data Privacy Management, DPM 2019, and the 3rd International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2019, held in conjunction with the 24th European symposium on Research in Computer security, ESORICS 2019
14th International Workshop on Data Privacy Management, DPM ...
收藏 引用
14th International Workshop on Data Privacy Management, DPM 2019, and the 3rd International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2019, held in conjunction with the 24th European symposium on Research in Computer security, ESORICS 2019
the proceedings contain 25 papers. the special focus in this conference is on Data Privacy Management. the topics include: PINFER: Privacy-Preserving Inference: Logistic Regression, Support Vector Machines, and More, ...
来源: 评论
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control  25
Exposing Congestion Attack on Emerging Connected Vehicle bas...
收藏 引用
25th Annual network and distributed system security symposium (ndss)
作者: Chen, Qi Alfred Yin, Yucheng Feng, Yiheng Mao, Z. Morley Liu, Henry X. Univ Michigan Ann Arbor MI 48109 USA
Connected vehicle (CV) technology will soon transform today's transportation systems by connecting vehicles and the transportation infrastructure through wireless communication. Having demonstrated the potential t... 详细信息
来源: 评论
Opaque: An Oblivious and Encrypted distributed Analytics Platform  14
Opaque: An Oblivious and Encrypted Distributed Analytics Pla...
收藏 引用
14th USENIX symposium on networked systems Design and Implementation (NSDI)
作者: Zheng, Wenting Dave, Ankur Beekman, Jethro G. Popa, Raluca Ada Gonzalez, Joseph E. Stoica, Ion Univ Calif Berkeley Berkeley CA 94720 USA
Many systems run rich analytics on sensitive data in the cloud, but are prone to data breaches. Hardware enclaves promise data confidentiality and secure execution of arbitrary computation, yet still suffer from acces... 详细信息
来源: 评论
Probabilistic energy-aware scheduling for wireless networked control systems
收藏 引用
COMPUTER systemS SCIENCE AND ENGINEERING 2017年 第6期32卷 499-506页
作者: Lin, Qiang Wu, Guowei Ren, Jiankang Dalian Univ Technol Sch Software Technol Dalian Peoples R China Dalian Inst Sci & Technol Dalian Peoples R China Dalian Univ Technol Sch Comp Sci & Technol Dalian Peoples R China
As a special application of real-time systems, Wireless networked Control system (WNCS) is composed of distributed fields and plant devices interconnected via a wireless network and energy management is a key issue. I... 详细信息
来源: 评论
Joint correlation exploitation and network coding in two-way relaying systems
收藏 引用
COMPUTER systemS SCIENCE AND ENGINEERING 2017年 第6期32卷 445-450页
作者: ZhuanSun, Zongliang Li, Keqiu Qi, Heng Chen, Guolong Dalian Univ Technol Sch Comp Sci & Technol Dalian Peoples R China Suzhou Univ Sch Informat Informat Engn Suzhou Peoples R China
In this paper, we focus on the encoding/decoding designing and its performance analysis for a two-way relaying system. In the two-way relaying system, two source points broadcast their information to a group of relays... 详细信息
来源: 评论
Research on the nonintrusive resource level fault injection technology for windows system  15
Research on the nonintrusive resource level fault injection ...
收藏 引用
Joint 15th IEEE International Conference on Trust, security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International symposium on Parallel and distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
作者: Jianyong, Fang Jiangsu Automation Research Institute Lianyungang China
there are often a few harsh testing scenarios need to simulate, such as the bandwidth of the network is limited, the memory is overload or the file system access is denied. Now, there have been some traditional method... 详细信息
来源: 评论
Securing Mobile Ad Hoc networks Using distributed Firewall with PKI  14
Securing Mobile Ad Hoc Networks Using Distributed Firewall w...
收藏 引用
14th IEEE International symposium on Applied Machine Intelligence and Informatics (SAMI)
作者: Filipek, Jozef Hudec, Ladislav Slovak Univ Technol Bratislava Fac Informat & Informat Technol Ilkovicova 2 Bratislava 84216 Slovakia
the MANETs (Mobile Ad Hoc networks) are increasing on popularity due to their dynamic nature, minimal infrastructure requirements, deployment cost and their self-configuring attributes. Advances in low power computing... 详细信息
来源: 评论
Model checking probabilistic network propagation protection strategies  15
Model checking probabilistic network propagation protection ...
收藏 引用
Joint 15th IEEE International Conference on Trust, security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International symposium on Parallel and distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
作者: Zonghao, Guo Ou, Wei Peng, Yu Lansheng, Han Weiming, Wu College of Computer Science and Technology Nanjing University of Aeronautic and Astronautics Nanjing211100 China School of Computer Science and Technonlgy Huazhong University of Science and Technology Wuhan430074 China
network exists widely in nature and human society. the spread of infections such as computer viruses, diseases and rumors poses great challenges to economic and social system. It is an important issue in the network p... 详细信息
来源: 评论
An accurate FDD-based approach for discovering distributed firewalls misconfigurations  15
An accurate FDD-based approach for discovering distributed f...
收藏 引用
Joint 15th IEEE International Conference on Trust, security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International symposium on Parallel and distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016
作者: Saâdaoui, Amina Souayeh, Nihel Ben Youssef Ben Bouhoula, Adel University of Carthage Tunisia
Problems arising from firewalls are common, cost time and money and have dramatic consequences for the operations of networks, especially in multi-firewall enterprise network. In fact, any misconfiguration that can ar... 详细信息
来源: 评论
Fault-tolerant and secure distributed data storage using random linear network coding  14
Fault-tolerant and secure distributed data storage using ran...
收藏 引用
14th International symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless networks, WiOpt 2016
作者: Ostovari, Pouya Wu, Jie Department of Computer and Information Sciences Temple University PhiladelphiaPA19122 United States
network coding is a technique which can be used in wired and wireless networks to increase the throughput of the networks and provide reliable transmissions. Also, it can be used in distributed storage systems to stor... 详细信息
来源: 评论