咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 326 篇 期刊文献

馆藏范围

  • 665 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 467 篇 工学
    • 327 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 105 篇 信息与通信工程
    • 56 篇 电子科学与技术(可...
    • 49 篇 控制科学与工程
    • 48 篇 电气工程
    • 46 篇 生物工程
    • 42 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 18 篇 安全科学与工程
    • 17 篇 土木工程
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 14 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 26 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 105 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 wang wei
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 lijuan duan
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao
  • 6 篇 gu lize

语言

  • 623 篇 英文
  • 24 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
665 条 记 录,以下是171-180 订阅
排序:
Detecting Unknown HTTP-based Malicious Communication Behavior via Generated Adversarial Flows and Hierarchical Traffic Features
arXiv
收藏 引用
arXiv 2023年
作者: Yun, Xiaochun Xie, Jiang Li, Shuhao Zhang, Yongzheng Sun, Peishuai National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China Key Laboratory of Network Assessment Technology University of Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Malicious communication behavior is the network communication behavior generated by malware (botnet, spyware, etc.) after victim devices are infected. Experienced adversaries often hide malicious information in HTTP t... 详细信息
来源: 评论
HSTF-Model: an HTTP-based Trojan Detection Model via the Hierarchical Spatio-Temporal Features of Traffics
arXiv
收藏 引用
arXiv 2023年
作者: Xie, Jiang Li, Shuhao Yun, Xiaochun Zhang, Yongzheng Chang, Peng Institute of Information Engineering Chinese Academy of Sciences Beijing China Key Laboratory of Network Assessment Technology University of Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
HTTP-based Trojan is extremely threatening, and it is difficult to be effectively detected because of its concealment and confusion. Previous detection methods usually are with poor generalization ability due to outda... 详细信息
来源: 评论
A microservice based generic consensus engine for BaaS
A microservice based generic consensus engine for BaaS
收藏 引用
IEEE International Conference on Industrial technology (ICIT)
作者: Huiyang Li Xu Zhang Jing Li Dongbin Wang Beijing University of Posts and Telecommunications Beijing China School of Cyber Security National Engineering Laboratory for Mobile Network Security Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing Tongbang Zhuoyi Technology Co. Ltd
Blockchain-as-a-Service (BaaS) has gradually serve as an infrastructure, providing underlying blockchain services for the rapid deployment and transaction on-chain of large-scale enterprise application scenarios. By h... 详细信息
来源: 评论
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023年 第4期2023卷 1-31页
作者: Yu, Qingyuan Dong, Xiaoyang Qin, Lingyue Kang, Yongze Jia, Keting Wang, Xiaoyun Zhang, Guoyan School of Cyber Science and Technology Shandong University Qingdao China Institute for Advanced Study BNRist Tsinghua University Beijing China BNRist Tsinghua University Beijing China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan China Institute for Network Sciences and Cyberspace BNRist Tsinghua University Beijing China Zhongguancun Laboratory Beijing China Shandong Institute of Blockchain Jinan China
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel information. Differential fault analysis (DFA) is one of the most powerful threats utilizing differential information between c... 详细信息
来源: 评论
Cross-heterogeneous Domain Authentication Scheme Based on Blockchain
收藏 引用
Journal of Artificial Intelligence and technology 2021年 第2期1卷 92-100页
作者: Jing Liu Yixin Liu Yingxu Lai Rongchen Li Siyu Wu Sami Mian College of Computer Science Faculty of Information TechnologyBeijing University of TechnologyBeijing 100124China Shaanxi Key Laboratory of Network and System Security Xi’an 710071China Science and Technology on Information Assurance Laboratory Beijing 100072China Engineering Research Center of Intelligent Perception and Autonomous Control Ministry of EducationBeijing 100124China Fan Gongxiu Honors College Beijing University of TechnologyBeijing 100124China University of Pittsburgh PittsburghPA 15260USA
With the rising popularity of the Internet and the development of big data technology,an increasing number of organizations are opting to cooperate across domains to maximize their *** organizations use public key inf... 详细信息
来源: 评论
Attentive Feature Focusing for Person Search by Natural Language  18th
Attentive Feature Focusing for Person Search by Natural La...
收藏 引用
18th International Forum of Digital Multimedia Communication, IFTC 2021
作者: Pan, Renjie Yang, Hua Yang, Xinxin Xiaodong, Mao Ye, Long Pan, Da The Institute of Image Communication and Network Engineering Department of Electronic Engineering Shanghai Jiao Tong University Shanghai China Shanghai Key Laboratory of Digital Media Processing and Transmission Shanghai Jiao Tong University Shanghai China Science and Technology Department of Shanghai Public Security Bureau Shanghai China State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China
Cross-modal Retrieval has made great improvement since social media and artificial intelligence is gradually changing our life style. Human interaction is no longer limited to a single mode. Cross-modal retrieval brin... 详细信息
来源: 评论
Ontology and Reinforcement Learning Based Intelligent Agent Automatic Penetration Test
Ontology and Reinforcement Learning Based Intelligent Agent ...
收藏 引用
2021 IEEE International Conference on Artificial Intelligence and Computer Applications, ICAICA 2021
作者: Qian, Kexiang Zhang, Daojuan Zhang, Peng Zhou, Zhihong Chen, Xiuzhen Duan, Shengxiong Institute of Information and Telecommunication Global Energy Interconnection Research Institute State Grid Key Laboratory of Information and Network Security Beijing China Shanghai Jiao Tong University Institute of Cyber Science and Technology Shanghai Key Laboratory of Integrated Administration Technologies for Information Security China Shanghai Jiao Tong University Institute of Cyber Science and Technology China
Penetration testing (PT) is the best method for vulnerabilities assessment and evaluating the security of the system under test, by planning and generating possible attack exploits, consist of a series of complex and ... 详细信息
来源: 评论
Bioaccumulation and behavioral response patterns of crucian carp (Carassius carassius) after carbamazepine exposure and elimination
收藏 引用
Science of the Total Environment 2024年 951卷 175519页
作者: Liu, Wei Li, Zhao Li, Feilong Zhang, Yuan Ding, Sen State Environmental Protection Key Laboratory of Estuarine and Coastal Environment Chinese Research Academy of Environmental Sciences Beijing100012 China Technology Development Co. Ltd. Wuhan430071 China China National Environmental Monitoring Centre Beijing100012 China Guangdong Basic Research Center of Excellence for Ecological Security and Green Development Guangdong Provincial Key Laboratory of Water Quality Improvement and Ecological Restoration for Watersheds School of Ecology Environment and Resources Guangdong University of Technology Guangzhou510006 China
The antiepileptic drug carbamazepine (CBZ) has been widely detected in freshwater, yet its toxic actions in fish at multiple endpoints and the subsequent recovery patterns of the impacted are less discussed. This stud... 详细信息
来源: 评论
HIDG-based PSO Algorithm: Suspicious Sensor Selection for Power Grid Monitoring System Under Data Integrity Attack
HIDG-based PSO Algorithm: Suspicious Sensor Selection for Po...
收藏 引用
Electrical Engineering and Control Technologies (CEECT), Conference on
作者: Pandeng Li Zhihong Liang Yiwei Yang Liangyu Dong Yuhan Suo Yi Hao Electric Power Research Institute CSG Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou Guangdong China China Industrial Control Systems Cyber Emergency Response Team Beijing China School of Automation Beijing Institute of Technology Beijing China
With the development of communication and sensing technology, it has become possible to monitor the operating status of the power grid system through a series of sensors. However, malicious adversaries may launch data...
来源: 评论
A Hybrid Routing Algorithm based on Destruction Resistance Cost and Reliability in Flying Ad-Hoc networks  7
A Hybrid Routing Algorithm based on Destruction Resistance C...
收藏 引用
7th International Conference on Computer and Communications, ICCC 2021
作者: Guo, Kun Wang, Dongbin Zhi, Hui Gao, Yibo Zhang, Tao Lv, Tiejun Lu, Yueming Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China Beijing University of Posts and Telecommunications National Engineering Laboratory For Mobile Network Beijing China TravelSky Technology Limited Beijing China Beijing University of Posts and Telecommunications Cyberspace Security Research Center Peng Cheng Laboratory Beijing China China Academy of Launch Vehicle Technology Beijing China
Existing routing algorithms in Flying Ad-Hoc Net- works (FANETs) lack the optimization consideration of destruction resistance cost caused by routing recovery when some nodes fail suddenly. In this paper, we propose a... 详细信息
来源: 评论