咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 337 篇 期刊文献

馆藏范围

  • 676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 479 篇 工学
    • 335 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 112 篇 信息与通信工程
    • 58 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 50 篇 控制科学与工程
    • 46 篇 网络空间安全
    • 45 篇 生物工程
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 机械工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
    • 15 篇 建筑学
    • 15 篇 化学工程与技术
    • 15 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 51 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 107 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 19 篇 法学
  • 16 篇 医学
    • 13 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 data privacy
  • 10 篇 computer securit...
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 16 篇 xin yang
  • 16 篇 duan lijuan
  • 10 篇 zhang yuqing
  • 10 篇 wang wei
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 lijuan duan
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 shen yulong
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao

语言

  • 633 篇 英文
  • 25 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
676 条 记 录,以下是151-160 订阅
排序:
An Energy-saving Algorithm for Wireless Sensor networks Based on network Coding and Compressed Sensing
收藏 引用
中国通信 2014年 第z1期11卷 171-178页
作者: QIN Tuanfa MENG Yunfan LI Liangliang WAN Haibin ZHANG Dongmei School of Computer and Electronic Information Guangxi University Nanning 530004 China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning 530004 China Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China
An energy-saving algorithm for wireless sensor networks based on network coding and compressed sensing (CS-NCES) is proposed in this paper. Along with considering the correlations of data spatial and temporal, the a... 详细信息
来源: 评论
Identification and addressing of internet of things based on distributed ID
Identification and addressing of internet of things based on...
收藏 引用
作者: Ma, Rui Liu, Yue Ma, Ke Wang, Xu An Beijing Key Laboratory of Software Security Engineering Technology School of Software Beijing Institute of Technology Beijing China Internet Center Institute of Communication Standard Research China Academy of Information and Communication Technology Beijing China Key Laboratory of Information and Network Security Engineering University of CAPF Xi’an Shanxi China
Identification and addressing the entity which accesses the internet through the wireless network with various short distance transmission protocols is a key issue. To solve the problem, by combining with the existing... 详细信息
来源: 评论
Microbiologically Influenced Corrosion Behavior of Fe_(40)(CoCrMnNi)_(60) and Fe_(60)(CoCrMnNi)_(40) Medium Entropy Alloys in the Presence of Pseudomonas Aeruginosa
收藏 引用
Acta Metallurgica Sinica(English Letters) 2023年 第3期36卷 379-390页
作者: Weiwei Chang Yangyang Li Huaibei Zheng Hongchang Qian Dawei Guo Shuyuan Zhang Yuntian Lou Chi Tat Kwok Lap Mou Tam Dawei Zhang National Materials Corrosion and Protection Data Center Institute for Advanced Materials and TechnologyUniversity of Science and Technology BeijingBeijing 100083China BRI Southeast Asia Network for Corrosion and Protection(MOE) Shunde Graduate School of University of Science and Technology BeijingFoshan 528399China State Key Laboratory of Metal Material for Marine Equipment and Application Anshan 114002China Department of Electromechanical Engineering University of MacaoMacao 999078China Institute for the Development and Quality Macao 999078China
In this work,the microbiologically influenced corrosion(MIC)of Fe_(40)(CoCrMnNi)_(60) and Fe_(60)(CoCrMnNi)_(40) medium entropy alloys(MEAs)induced by Pseudomonas aeruginosa(***)was *** behaviors during 14 days of imm... 详细信息
来源: 评论
Research on trusted bootstrap based on the universal smart card  7th
Research on trusted bootstrap based on the universal smart c...
收藏 引用
7th International Conference on the Theory, Technologies and Applications of Trusted Systems, INTRUST 2015
作者: Yan, Lin Zhang, Jianbiao College of Computer Science Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China
The trusted boot is a hot spot in trusted computing field. User’s identity authentication and trusted measurement are used to deal with security threats. But it is difficult to implement the general trusted boot base... 详细信息
来源: 评论
RbacIP: A RBAC-based method for intercepting and processing malicious applications in android platform  7th
RbacIP: A RBAC-based method for intercepting and processing ...
收藏 引用
7th International Conference on the Theory, Technologies and Applications of Trusted Systems, INTRUST 2015
作者: Lin, Li Ni, Jian Hu, Jian Zhang, Jianbiao College of Computer Science Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China
With the rapid development of Android-based smart phones and pads, android applications show explosive growth. Because third-party application market regulation is lax, many normal applications are embedded malicious ... 详细信息
来源: 评论
Epileptic Spike Detection Based on Deep Learning  23
Epileptic Spike Detection Based on Deep Learning
收藏 引用
9th International Conference on Computing and Artificial Intelligence, ICCAI 2023
作者: Duan, Lijuan Cui, Yuanqi Wang, Yao Wang, Zeyu Cao, Min Qiao, Yuanhua Faculty of Information Technology Beijing University of Technology Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China College of Applied Science Beijing University of Technology University Beijing China
Epilepsy is a chronic disease with high prevalence and high disease burden. Electroencephalogram (EEG) is one of the most important tools for diagnosing epilepsy. Detection of epileptic spikes from EEG can effectively... 详细信息
来源: 评论
Angle-resolved photoemission study of NbGeSb with non-symmorphic symmetry
收藏 引用
Chinese Physics B 2024年 第2期33卷 464-470页
作者: 马欢 谭宁 吴徐传 李满 王义炎 路洪艳 夏天龙 王善才 Department of Physics Key Laboratory of Quantum State Construction and Manipulation(Ministry of Education)Renmin University of ChinaBeijing 100872China Beijing Key Laboratory of Opto-Electronic Functional Materials&Micro-Nano Devices Renmin University of ChinaBeijing 100872China School of Information Network Security People’s Public Security University of ChinaBeijing 100038China Institute of Physical Science and Information Technology Anhui UniversityHefei 230601China School of Physics and Physical Engineering Qufu Normal UniversityQufu 273165China
We investigate the electronic structure of NbGeSb with non-symmorphic *** employ angle-resolved photoemission spectroscopy(ARPES)to observe and identify the bulk and surface states over the Brillouin *** utilizing hig... 详细信息
来源: 评论
An efficient mutation-based fuzz testing approach for detecting flaws of network protocol
An efficient mutation-based fuzz testing approach for detect...
收藏 引用
2012 International Conference on Computer Science and Service System, CSSS 2012
作者: Zhang, Zhao Wen, Qiao-Yan Tang, Wen State Key Laboratory of Network and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China IT Security Cooperate Technology Siemens Ltd. China Beijing 100102 China
security flaws existed in protocol implementations might be exploited by malicious attackers and the consequences can be very serious. Therefore, detecting vulnerabilities of network protocol implementations is becomi... 详细信息
来源: 评论
A scheme of trust management system for P2P network
A scheme of trust management system for P2P network
收藏 引用
12th International Conference on Advanced Communication technology: ICT for Green Growth and Sustainable Development, ICACT 2010
作者: Liang, Binbin Gu, Lize Sun, Bin Yang, Yixian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications China
P2P network has become an important branch of Internet recently, with the significant advantages of full resource utilization, dynamics, openness and high scalable, which helps it achieve wide applications. But securi... 详细信息
来源: 评论
Identification of frequency-hopping spread spectrum signals using SVMs with wavelet kernels
Identification of frequency-hopping spread spectrum signals ...
收藏 引用
2nd International Workshop on Intelligent Systems and Applications, ISA2010
作者: Sun, Na Zhou, Yajian Yang, Yixian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China
This paper proposes a novel method of using wavelet kernel functions in Support Vector Machines (SVMs), and this method is applied to identification of individual communication transmitter which works in frequency-hop... 详细信息
来源: 评论