咨询与建议

限定检索结果

文献类型

  • 345 篇 会议
  • 339 篇 期刊文献

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 484 篇 工学
    • 339 篇 计算机科学与技术...
    • 278 篇 软件工程
    • 111 篇 信息与通信工程
    • 58 篇 电子科学与技术(可...
    • 53 篇 控制科学与工程
    • 51 篇 电气工程
    • 46 篇 生物工程
    • 44 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 14 篇 建筑学
    • 14 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 216 篇 理学
    • 96 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 17 篇 化学
  • 109 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 13 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 24 篇 key laboratory o...
  • 21 篇 beijing key labo...
  • 21 篇 school of cyber ...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 9 篇 shandong provinc...
  • 8 篇 henan key labora...
  • 8 篇 university of ch...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 wang changwei
  • 9 篇 xu shibiao
  • 9 篇 zhang ru
  • 9 篇 xu rongtao
  • 8 篇 wang wei
  • 8 篇 weng jian
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 guo li
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 guoai xu

语言

  • 628 篇 英文
  • 37 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
684 条 记 录,以下是431-440 订阅
排序:
Packet: a privacy-aware access control policy composition method for services composition in cloud environments
收藏 引用
Frontiers of Computer Science 2016年 第6期10卷 1142-1157页
作者: Li LIN Jian HU Jianbiao ZHANG College of Computer Science Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing Beijing 100124 China National Engineering Laboratory for Classified Information Security Protection Beijing 100124 China
Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service p... 详细信息
来源: 评论
Study on the method of transmission line foreign body detection based on deep learning
Study on the method of transmission line foreign body detect...
收藏 引用
2017 IEEE Conference on Energy Internet and Energy System Integration, EI2 2017
作者: Wang, Bixiao Wu, Runze Zheng, Zhe Zhang, Weilong Guo, Jinghong School of Electrical and Electronic Engineering North China Electric Power University Beijing China Global Energy Interconnection Research Institute Co. Ltd. State Grid Key Laboratory of Information AndNetwork Security State Grid Laboratory of Electric Power Communication Network Technology Beijing China
Target detection methods based on region proposal are complicated and the detection speed is slow, which is difficult to meet the requirement of real-time detection of massive power inspection pictures. SSD (Single Sh... 详细信息
来源: 评论
Mars: New insights and unresolved questions
arXiv
收藏 引用
arXiv 2021年
作者: Changela, Hitesh G. Chatzitheodoridis, Elias Antunes, Andre Beaty, David Bouw, Kristian Bridges, John C. Capova, Klara Anna Cockell, Charles S. Conley, Catharine A. Dadachova, Ekaterina Dallas, Tiffany D. de Mey, Stefaan Dong, Chuanfei Ellery, Alex Ferus, Martin Foing, Bernard Fu, Xiaohui Fujita, Kazuhisa Lin, Yangtin Jheeta, Sohan Hicks, Leon J. Hu, Sen Kereszturi, Akos Krassakis, Alexandros Liu, Yang Oberst, Juergen Michalski, Joe Ranjith, P.M. Rinaldi, Teresa Rothery, David Stavrakakis, Hector A. Selbmann, Laura Sinha, Rishitosh K. Wang, Alian Williford, Ken Vaci, Zoltan Vago, Jorge L. Waltemathe, Michael Hallsworth, John E. Key Laboratory of Earth & Planetary Physics Institute of Geology & Geophysics Chinese Academy of Sciences Beijing China Department of Earth & Planetary Science University of New Mexico New Mexico United States Department of Geological Sciences National Technical University of Athens School of Mining and Metallurgical Engineering Athens Greece Network of Researchers on the Chemical Evolution of Life Leeds United Kingdom China Mars Program Office Jet Propulsion Laboratory California Institute of Technology PasadenaCA United States Creative Division Notion Theory MiamiFL33131 United States Space Research Centre School of Physics and Astronomy University of Leicester LeicesterLE17RH United Kingdom Noordwijk Netherlands School of Physics and Astronomy University of Edinburgh James Clerk Maxwell Building Peter Guthrie Tait Road EdinburghEH9 3FD United Kingdom NASA Ames Research Center Mountain ViewCA94035 United States College of Pharmacy and Nutrition University of Saskatchewan Canada Institute for Global Food Security School of Biological Sciences Queen's University Belfast 19 Chlorine Gardens BelfastBT9 5DL United Kingdom Department of Astrophysical Sciences Princeton Plasma Physics Laboratory Princeton University United States Department of Mechanical and Aerospace Engineering Carleton University OttawaON Canada J. Heyrovsky Institute of Physical Chemistry Czech Academy of Sciences Prague Czech Republic Shandong Province China Tokyo Japan Research Centre for Astronomy and Earth Sciences Budapest Hungary Athens Greece National Space Science Centre NSSC Chinese Academy of Sciences Beijing China DLR Institute of Planetary Research Berlin Germany Hong Kong University Hong Kong Department of Biology and Biotechnology Sapienza University of Rome Rome Italy School of Physical Sciences The Open University Milton Keynes United Kingdom Department of Ecological and Biological Sciences University of Tuscia Viterbo Italy Physical Research Lab
Mars exploration motivates the search for extraterrestrial life, the development of space technologies, and the design of human missions and habitations. Here, we seek new insights and pose unresolved questions relati... 详细信息
来源: 评论
Cross-site scripting attacks on android hybrid applications  17
Cross-site scripting attacks on android hybrid applications
收藏 引用
2017 International Conference on Cryptography, security and Privacy, ICCSP 2017
作者: Bao, Wenying Yao, Wenbin Zong, Ming Wang, Dongbin Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications No. 10 Xitucheng Road Beijing100876 China YingCai Honors College University of Electronic Science and Technology of China Chengdu610054 China National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications No. 10 Xitucheng Road Beijing100876 China
Hybrid mobile applications are coded in both standard web languages and native language. The including of web technologies results in that Hybrid applications introduce more security risks than the traditional web app... 详细信息
来源: 评论
Discovering and understanding the security hazards in the interactions between iot devices, mobile apps, and clouds on smart home platforms
arXiv
收藏 引用
arXiv 2018年
作者: Zhou, Wei Jia, Yan Yao, Yao Zhu, Lipeng Guan, Le Mao, Yuhang Liu, Peng Zhang, Yuqing National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China School of Cyber Engineering Xidian University China Department of Computer Science University of Georgia United States College of Information Sciences and Technology Pennsylvania State University United States State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China
A smart home connects tens of home devices to the Internet, where an IoT cloud runs various home automation applications. While bringing unprecedented convenience and accessibility, it also introduces various security... 详细信息
来源: 评论
A User-Centric Data Secure Creation Scheme in Cloud Computing
收藏 引用
Chinese Journal of Electronics 2016年 第4期25卷 753-760页
作者: SU Mang LI Fenghua SHI Guozhen GENG Kui XIONG Jinbo School of Computer Science and Engineering Nanjing University of Science and Technology State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Department of Information Security Beijing Electronic Science and Technology Institute State Key Laboratory of Integrated Services Network Xidian University
Due to the use of the cloud computing technology,the ownership is separated from the administration of the data in cloud and the shared data might be migrated between different clouds,which would bring new challenges ... 详细信息
来源: 评论
A New Triage Process Model for Digital Investigations
A New Triage Process Model for Digital Investigations
收藏 引用
2016 IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference(IMCEC 2016)
作者: Bo Yang Ning Li Jianguo Jiang Institute of Information Engineering Chinese Academy of Sciences Beijing Key Laboratory of Network Security Technology
As the amount of crimes involving the digital dimension grows,an ever increasing number of digital artifacts collected from a forensic investigation needs plenty of resources to process in a forensically sound *** for... 详细信息
来源: 评论
A fibonacci based batch auditing protocol for cloud data  1
收藏 引用
9th International Symposium on Cyberspace Safety and security, CSS 2017
作者: Shen, Jian Shen, Jun Wang, Chen Wang, Anxi Jiangsu Engineering Center of Network Monitoring Nanjing China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China
As cloud storage is developing fast with time going by, the design of auditing protocols has caught a large number of researchers’ eyes. However, though most of the existing auditing protocols have considered batch a... 详细信息
来源: 评论
Revisiting Recent and Current Anomaly Detection based on Machine Learning in Ad-Hoc networks
收藏 引用
Journal of Physics: Conference Series 2019年 第1期1288卷
作者: Zhixiao Wang Mingyu Chen Wenyao Yan Wendong Wang Ang Gao Gaoyang Nie Feng Wang Shaobo Yang Xi'an University of Technology Xi'an 710048 China Goettingen University Goettingen 37077 Germany Xi'an Jiaotong University Xi'an 710049 China Shaanxi Provincial Key Laboratory of Network Computing and Security Technology Xi'an 710048 China College of Xi'an Innovation Yan'an University Xi'an 710100 China Yan'an University Yan'an 716000 China National Satellite Meteorological Center China Meteorological Administration Beijing 100081 China
Ad-Hoc network which is one kind of self-organized networks is much more vulnerable than the infrastructural network with the properties of highly changeable linkage, dynamic structure, and wireless connections so tha...
来源: 评论
Utilizing Dynamic Properties of Sharing Bits and Registers to Estimate User Cardinalities over Time
arXiv
收藏 引用
arXiv 2018年
作者: Wang, Pinghui Jia, Peng Zhang, Xiangliang Tao, Jing Guan, Xiaohong Towsley, Don MOE Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University China Shenzhen Research Institute of Xi’an Jiaotong University Shenzhen China King Abdullah University of Science and Technology Thuwal Saudi Arabia Zhejiang Research Institute of Xi’an Jiaotong University Hangzhou China Department of Automation and NLIST Lab Tsinghua University Beijing China School of Computer Science University of Massachusetts Amherst MA United States
—Online monitoring user cardinalities (or degrees) in graph streams is fundamental for many applications. For example in a bipartite graph representing user-website visiting activities, user cardinalities (the number... 详细信息
来源: 评论