咨询与建议

限定检索结果

文献类型

  • 8 篇 期刊文献
  • 6 篇 会议

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 5 篇 信息与通信工程
    • 4 篇 交通运输工程
    • 3 篇 电气工程
    • 3 篇 计算机科学与技术...
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 农业工程
    • 1 篇 食品科学与工程(可...
    • 1 篇 城乡规划学
    • 1 篇 安全科学与工程
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 理论经济学
  • 1 篇 教育学
    • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 14 篇 security functio...
  • 3 篇 on-line operatio...
  • 3 篇 lyapunov methods
  • 3 篇 v2x communicatio...
  • 2 篇 power system con...
  • 2 篇 security assessm...
  • 2 篇 information tech...
  • 2 篇 emergency commun...
  • 2 篇 security
  • 2 篇 wireless access ...
  • 2 篇 stability
  • 2 篇 large-scale syst...
  • 2 篇 dynamic stabilit...
  • 2 篇 security assuran...
  • 1 篇 service chaining
  • 1 篇 cyber security
  • 1 篇 european telecom...
  • 1 篇 scalability
  • 1 篇 advanced driver ...
  • 1 篇 security managem...

机构

  • 2 篇 univ twente nl-7...
  • 2 篇 univ ulm d-89069...
  • 2 篇 volkswagen ag d-...
  • 1 篇 inst mines telec...
  • 1 篇 tencent tech eng...
  • 1 篇 school of crimin...
  • 1 篇 natl elect & com...
  • 1 篇 department of el...
  • 1 篇 e.e. department ...
  • 1 篇 natl univ def te...
  • 1 篇 ucl jill dando i...
  • 1 篇 shahid beheshti ...
  • 1 篇 queen's universi...
  • 1 篇 cnrs umr 5157 sa...
  • 1 篇 central china po...
  • 1 篇 audi ag 85045 in...
  • 1 篇 audi ag d-85045 ...
  • 1 篇 electric power r...
  • 1 篇 electric power r...
  • 1 篇 volkswagen ag 38...

作者

  • 2 篇 zhou lin
  • 2 篇 chen yingmei
  • 2 篇 gao mei
  • 2 篇 he haiguang
  • 2 篇 knapik peter
  • 2 篇 fu shuti
  • 2 篇 kargl frank
  • 2 篇 schoch elmar
  • 2 篇 he zhuzhen
  • 2 篇 mao zhijie
  • 2 篇 jing feng
  • 1 篇 chen jianlin
  • 1 篇 meddahi ahmed
  • 1 篇 shameli-sendi al...
  • 1 篇 nalla mahesh k.
  • 1 篇 he ruan
  • 1 篇 laufs julian
  • 1 篇 novak ludek
  • 1 篇 p. rousseaux
  • 1 篇 mueller maik

语言

  • 14 篇 英文
检索条件"主题词=security functions"
14 条 记 录,以下是1-10 订阅
排序:
A Scalable Stateful Approach for Virtual security functions Orchestration
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2021年 第6期32卷 1383-1394页
作者: Moradi, Niloofar Shameli-Sendi, Alireza Khajouei, Alireza Shahid Beheshti Univ SBU Fac Comp Sci & Engn Tehran *** Iran
Previous works suggested different approaches to implementing service chaining. Their goal is to enhance the performance of the middleboxes and satisfy the expectations of the cloud providers and users. To meet these ... 详细信息
来源: 评论
Functional security and Trust in Ultra-Connected 6G Ecosystem
EAI Endorsed Transactions on Industrial Networks and Intelli...
收藏 引用
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 2022年 第4期9卷 e5-e5页
作者: Sharma, Vishal Queen's University NI BelfastBT7 1NN United Kingdom
security and trust are the entangled role players in the future generation of wireless networks. security in 5G networks is currently supported using several functions. Given the advantages of such a system, this arti... 详细信息
来源: 评论
security and the smart city: A systematic review
收藏 引用
SUSTAINABLE CITIES AND SOCIETY 2020年 55卷
作者: Laufs, Julian Borrion, Herve Bradford, Ben UCL Jill Dando Inst Secur & Crime Sci 35 Tavistock Sq London WC1H 9EZ England
The implementation of smart technology in cities is often hailed as the solution to many urban challenges such as transportation, waste management, and environmental protection. Issues of security and crime prevention... 详细信息
来源: 评论
A Construction Method of security Mechanism Requirement for Wireless Access
A Construction Method of Security Mechanism Requirement for ...
收藏 引用
International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)
作者: Zhou Lin Jing Feng He Haiguang Mao Zhijie Chen Yingmei Gao Mei He Zhuzhen Natl Univ Def Technol Xian 710106 Shaanxi Peoples R China
Aiming at the incomplete and incomplete security mechanism of wireless access system in emergency communication network, this paper proposes a security mechanism requirement construction method for wireless access sys... 详细信息
来源: 评论
NFV security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures
收藏 引用
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS 2018年 第4期20卷 3330-3368页
作者: Pattaranantakul, Montida He, Ruan Song, Qipeng Zhang, Zonghua Meddahi, Ahmed Inst Mines Telecom IMT Lille Douai F-59650 Lille France CNRS UMR 5157 SAMOVAR Lab F-91000 Evry France Natl Elect & Comp Technol Ctr Cybersecur Lab Pathum Thani 12120 Thailand Orange Orange Lab Serv F-92320 Chatillon France Tencent Tech Engn Grp Shenzhen 518000 Peoples R China
Network functions virtualization (NFV), along with software-defined networking (SDN), drives a new change in networking infrastructure with respect to designing, deploying, and managing various network services. In pa... 详细信息
来源: 评论
A Construction Method of security Mechanism Requirement for Wireless Access System Based on CC Standard
A Construction Method of Security Mechanism Requirement for ...
收藏 引用
作者: Zhou Lin Jing Feng He Haiguang Mao Zhijie Chen Yingmei Gao Mei He Zhuzhen National University of Defense Technology
Aiming at the incomplete and incomplete security mechanism of wireless access system in emergency communication network,this paper proposes a security mechanism requirement construction method for wireless access syst... 详细信息
来源: 评论
REGULATION OF CYBER security IN THE BANKING SECTOR  25
REGULATION OF CYBER SECURITY IN THE BANKING SECTOR
收藏 引用
25th Digitalization in Management, Society and Economy Conference
作者: Novak, Ludek Doucek, Petr Univ Econ Fac Informat & Stat Prague Czech Republic
Extensive use of information systems and information technologies in regular practice and in particular in the banking sector has led to its critical dependency on these systems and technologies. This is why it is nec... 详细信息
来源: 评论
Electronic Decal: A security Function Based on V2X Communication
Electronic Decal: A Security Function Based on V2X Communica...
收藏 引用
77th IEEE Vehicular Technology Conference (VTC)
作者: Knapik, Peter Schoch, Elmar Kargl, Frank Volkswagen AG D-38440 Wolfsburg Germany Audi AG D-85045 Ingolstadt Germany Univ Twente NL-7500 AE Enschede Netherlands Univ Ulm D-89069 Ulm Germany
New technologies such as vehicle-to-X (V2X) communication and advanced driver assistance systems (ADAS) are on the rise. They are mainly used to increase road safety as well as traffic efficiency and to provide custom... 详细信息
来源: 评论
Electronic Decal: A security Function Based on V2X Communication
Electronic Decal: A Security Function Based on V2X Communica...
收藏 引用
IEEE Vehicular Technology Conference
作者: Peter Knapik Elmar Schoch Frank Kargl Volkswagen AG 38440 Wolfsburg Germany Audi AG 85045 Ingolstadt Germany University of Twente 7500 AE Enschede The Netherlands
New technologies such as vehicle-to-X (V2X) communication and advanced driver assistance systems (ADAS) are on the rise. They are mainly used to increase road safety as well as traffic efficiency and to provide custom... 详细信息
来源: 评论
Understanding Vehicle Related Crime to Elaborate on Countermeasures Based on ADAS and V2X Communication
Understanding Vehicle Related Crime to Elaborate on Counterm...
收藏 引用
IEEE Vehicular Networking Conference (VNC)
作者: Knapik, Peter Schoch, Elmar Mueller, Maik Kargl, Frank Volkswagen AG D-38440 Wolfsburg Germany Univ Twente NL-7500 AE Enschede Netherlands Univ Ulm D-89069 Ulm Germany
Among numerous types of criminal activities, vehicle related crime contributes to personal injury as well as to economic losses. Over the last 10 years vehicle related crime continuously constitutes over 10% of all cr... 详细信息
来源: 评论