咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 326 篇 期刊文献

馆藏范围

  • 665 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 467 篇 工学
    • 327 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 105 篇 信息与通信工程
    • 56 篇 电子科学与技术(可...
    • 49 篇 控制科学与工程
    • 48 篇 电气工程
    • 46 篇 生物工程
    • 42 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 18 篇 安全科学与工程
    • 17 篇 土木工程
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 14 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 26 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 105 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 wang wei
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 lijuan duan
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao
  • 6 篇 gu lize

语言

  • 623 篇 英文
  • 24 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
665 条 记 录,以下是611-620 订阅
排序:
network Worm Propagating Model Based on network Topology Unit
Network Worm Propagating Model Based on Network Topology Uni...
收藏 引用
The First International Conference on Multimedia Information networking and security(第一届国际多媒体网络信息安全会议 MINES 2009)
作者: Wei Zhang Shize Guo Kangfeng Zheng Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Key Laboratory of Network and Information Attack & Defence Technology of MOE Beijing University of Posts and Tele
The existing analytic models on network worm propagation rarely consider the effect of topology structure, and it usually considers the probability and spread parameter as fixed values. They are not coinciding with re... 详细信息
来源: 评论
SkyF2F: Censorship Resistant via Skype Overlay network
SkyF2F: Censorship Resistant via Skype Overlay Network
收藏 引用
WASE International Conference on Information Engineering, ICIE
作者: Shoufeng Cao Longtao He Zhongxian Li Yixian Yang Information Security Center State Key Laboratory of Networking and Switching Technology Key Laboratory of network and information attack & defence technology of MOE Beijing University of Posts and Telecommunications China Research Center of Information Security Institute of Computing Technology Chinese Academy and Sciences Beijing China
Internet censorship is on the rise as an increasing number of countries and companies block or monitor access to parts of the Internet. Many censorship resistant systems have been proposed, which rely on deploying man... 详细信息
来源: 评论
DYNAMIC DATA FLOW GRAPH-BASED SOFTWARE WATERMARKING
DYNAMIC DATA FLOW GRAPH-BASED SOFTWARE WATERMARKING
收藏 引用
2009 IEEE International Conference on network Infrastructure and Digital Content(2009年IEEE网络基础设施与数字内容国际会议 IEEE IC-NIDC2009)
作者: Xinxin Niu Zhengming Hu Bo Feng Miao Zhang Guoai Xu Information Security Center State Key Laboratory of Networking and Switching Technology Beijing Un Key Laboratory of network and information attack & defense technology of MOE Beijing University of National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Te
In this paper we indicate the concept of Dynamic Data Flow Graph based on the dynamic data dependency during execution of software. On this basis, we propose a dynamic software watermarking algorithm, which embeds wat... 详细信息
来源: 评论
A NEW CREDENTIAL ROUTING MODEL BASED ON TRUST THEORY
A NEW CREDENTIAL ROUTING MODEL BASED ON TRUST THEORY
收藏 引用
2009 IEEE International Conference on network Infrastructure and Digital Content(2009年IEEE网络基础设施与数字内容国际会议 IEEE IC-NIDC2009)
作者: Daofeng Li Lize Gu Bin Sun Xinxin Niu Yixian Yang Information Security Center State Key Laboratory of Networking and Switching Technology Key Laboratory of network and information attack & defense technology of MOE National Engineering Laboratory for Disaster Backup and RecoveryBeijing University of Po
Router has acted as more and more important role in the large-scale network. In the meantime, the security of the router become more seriously. In this paper, we propose a new algorithm to decide a credential routing ... 详细信息
来源: 评论
A security-Enhanced Remote Platform Integrity Attestation Scheme
A Security-Enhanced Remote Platform Integrity Attestation Sc...
收藏 引用
International Conference on Wireless Communications, networking and Mobile Computing (WiCom)
作者: Song Cheng Liu Bing Xin Yang Yang Yixian Zhongxian Li Yin Han Key Laboratory of network and information attack & defence technology of MOE Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing China National Cybernet Security Ltd Beijing China Huawei Technology Ltd Beijing China
Remote platform integrity attestation is a method by which a client attests its hardware and software configuration to a remote server. The goal of remote integrity platform attestation is to enable a remote challenge... 详细信息
来源: 评论
Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP
Research on Man-in-the-Middle Denial of Service Attack in SI...
收藏 引用
International Conference on networks security, Wireless Communications and Trusted Computing, NSWCTC
作者: Zhe Chen Shize Guo Kangfeng Zheng Haitao Li Key Laboratory of network and information attack & defence technology of MOE National Engineering Laboratory of Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China Information Security Center State Key Laboratory of Networking and Switching Technology National Engineering Laboratory of Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China
As the number of VoIP users increase and as the deployment of SIP devices gains ground, security has risen as a potential issue worthy of our consideration. VoIP is an application running on the data network and as su... 详细信息
来源: 评论
security Analysis of Two Password Authentication Schemes
Security Analysis of Two Password Authentication Schemes
收藏 引用
第八届国际移动商务会议(Eighth International Conference on Mobile Business)
作者: Zuowen Tan School of Information Technology Jiangxi University of Finance & EconomicsNanchang 330013JiangxiChina State Key Laboratory of Information Security Institute of Software of Chinese Academy of SciencesBeijing 100080China Key Lab of Network Security and
Recently,Rhee,Kwon and Lee proposed a practical authentication scheme only based on the common storage *** the scheme the remote user does not need to use smart *** is convenient for the users to use a common storage ... 详细信息
来源: 评论
An improved algorithm for IP alias resolution in network topology measurement
An improved algorithm for IP alias resolution in network top...
收藏 引用
9th International Conference on Electronic Measurement and Instruments, ICEMI 2009
作者: Yong, Zhang Shize, Guo Kangfeng, Zheng Yixian, Yang Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
Internet topology measurement is an important part of network measurement. Nowadays, traceroute probing method is widely used to obtain the original route data, and the IP alias resolution technique is to identify IP ... 详细信息
来源: 评论
A New Data Streaming Method for Locating Hosts with Large Connection Degree
A New Data Streaming Method for Locating Hosts with Large Co...
收藏 引用
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference
作者: Xiaohong Guan Pinghui Wang Tao Qin MOE Key Laboratory of Intelligent Networks and Network Security State Key Laboratory of Manufacturing Systems Xi'an Jiaotong University Xi'an China Department of Automation Tsinghua National Laboratory of Information Science and Technology Tsinghua University Beijing China
Locating hosts with large connection degree is very important for monitoring anomalous network traffics. The in-degree (out-degree), defined as the number of distinct sources (destinations) that a network host is conn... 详细信息
来源: 评论
Measurement of micro-scale two-phase flow in a pulsating heat pipe using electrical capacitance tomography
收藏 引用
Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering 2009年 第17期29卷 103-107页
作者: Li, Jing-Tao Xiao, Hai-Ping Dong, Xiang-Yuan Liu, Shi Key Laboratory of Power System Protection and Dynamic Security Monitoring and Control North China Electric Power University Changping District Beijing 102206 China School of Energy and Environmental Engineering Zhongyuan Institute of Technology Zhengzhou 450007 Henan Province China
The electrical capacitance tomography (ECT) system was used to the visualization of the two-phase flow as well as the measurement of the film thickness in a pulsating heat pipe (PHP). The new-developed micro-sensor wa... 详细信息
来源: 评论