咨询与建议

限定检索结果

文献类型

  • 2,088 篇 期刊文献
  • 2,005 篇 会议
  • 10 册 图书

馆藏范围

  • 4,103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,968 篇 工学
    • 1,752 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 513 篇 信息与通信工程
    • 318 篇 土木工程
    • 292 篇 控制科学与工程
    • 272 篇 电气工程
    • 233 篇 电子科学与技术(可...
    • 231 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 218 篇 生物工程
    • 214 篇 建筑学
    • 213 篇 化学工程与技术
    • 149 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 126 篇 网络空间安全
    • 124 篇 安全科学与工程
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 103 篇 仪器科学与技术
    • 91 篇 生物医学工程(可授...
  • 1,443 篇 理学
    • 753 篇 数学
    • 404 篇 物理学
    • 241 篇 生物学
    • 208 篇 统计学(可授理学、...
    • 170 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 616 篇 管理学
    • 407 篇 管理科学与工程(可...
    • 234 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 12 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 59 篇 security
  • 58 篇 deep learning
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 40 篇 software
  • 40 篇 cloud computing
  • 39 篇 machine learning
  • 37 篇 optimization
  • 37 篇 accuracy
  • 35 篇 blockchain
  • 34 篇 robustness

机构

  • 226 篇 state key labora...
  • 162 篇 school of cyber ...
  • 150 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 38 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 29 篇 xiuli du
  • 24 篇 limin sun
  • 23 篇 wang wei
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 zhang lei
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 tan yang
  • 17 篇 jia yingmin

语言

  • 3,701 篇 英文
  • 209 篇 中文
  • 191 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4103 条 记 录,以下是3601-3610 订阅
排序:
Towards detecting the interaction vulnerabilities in large distributed system
Towards detecting the interaction vulnerabilities in large d...
收藏 引用
10th IEEE International Conference on Computer and Information technology, CIT-2010, 7th IEEE International Conference on Embedded software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and Communications, ScalCom-2010
作者: Zhao, Jinjing Zhao, Gang Wen, Yan Li, Xiang National Key Laboratory of Science and Technology on Information System Security Beijing Institute of System Engineering Beijing China
In this paper, we proposed a novel approach, called LDS-IVD, to model the entity interaction vulnerabilities in Large Distributed System (LDS) which results from the absence of necessary security mechanisms. LDS-IVD c... 详细信息
来源: 评论
A user model based on mobile environment
收藏 引用
Ruan Jian Xue Bao/Journal of software 2011年 第SUPPL. 2期22卷 120-128页
作者: Du, Yi Tian, Feng Dai, Guo-Zhong Wang, Feng Wang, Hong-An Intelligence Engineering Laboratory Institute of Software Chinese Academy of Sciences Beijing 100190 China School of Information Science and Engineering Graduate University Chinese Academy of Sciences Beijing 100190 China Yunnan Provincial Key Laboratory of Computer Application Kunming University of Science and Technology Kunming 650500 China
It's very important to help developers design user interface for application in an intelligent user interface. Nowadays, the number of mobile based applications increases greatly, but there are no proper user mode... 详细信息
来源: 评论
Aggregation capacity of wireless sensor networks: Extended network case
Aggregation capacity of wireless sensor networks: Extended n...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Cheng Wang Changjun Jiang Yunhao Liu Xiang-Yang Li Shaojie Tang Huadong Ma Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science University of Tongji Shanghai China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China TNLIST School of Software Tsinghua University China Department of Computer Science Illinois Institute of Technology Chicago IL USA Department of Computer Science Beijing University of Posts and Telecommunications Beijing China
A critical function of wireless sensor networks (WSNs) is data gathering. While, one is often only interested in collecting a relevant function of the sensor measurements at a sink node, rather than downloading all th... 详细信息
来源: 评论
Quantum secure direct communication with cluster states
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2010年 第7期53卷 1271-1275页
作者: CAO WeiFeng YANG YuGuang WEN QiaoYan College of Electric and Information Engineering Zhengzhou University of Light IndustryZhengzhou 450002China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China College of Computer Science and Technology Beijing University of TechnologyBeijing 100124China State Key Laboratory of Integrated Services Network Xidian UniversityXi’an 710071China State key Laboratory of Information Security Gradute University of Chinese Academy of Sciences Beijing 100049China
A quantum secure direct communication protocol with cluster states is *** with the deterministic secure quantum communication protocol with the cluster state proposed by Yuan and Song(***.,2009,7:689),this protocol ca... 详细信息
来源: 评论
Network traffic classification based on semi-supervised clustering
收藏 引用
Journal of China Universities of Posts and Telecommunications 2010年 第SUPPL. 2期17卷 84-88页
作者: Lin, Guan-Zhou Xin, Yang Niu, Xin-Xin Jiang, Hui-Bai Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China Beijing Safe-Code Technology Co. Ltd Beijing 100876 China
The diminished accuracy of port-based and payload-based classification motivates use of transport layer statistics for network traffic classification. A semi-supervised clustering approach based on improved K-Means cl... 详细信息
来源: 评论
Variable-rate convolutional network coding
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2010年 第3期17卷 91-96,117页
作者: MA Song-ya CHEN Xiu-bo LUO Ming-xing Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China School of Mathematics and Information Sciences Henan University Kaifeng 475004 China
Four types of variable-rate convolutional network codes are investigated over a single-source finite cyclic network. It is found that variable-rate generic, dispersion and broadcast can be implemented on the same netw... 详细信息
来源: 评论
Authentication protocols to support fast handoff for 802.11s mesh networks
Authentication protocols to support fast handoff for 802.11s...
收藏 引用
International Conference on Multimedia Information Networking and security (MINES)
作者: Yang, Wei-Dong Liu, Ji-Zhao Wang, Ke Sun, Li-Ming College of Information Science and Engineering Henan University of Technology Zhengzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China
In this paper, we propose authentication protocols for 802.11s mesh networks, which support the mesh point's fast handoff between Mesh key distributors (MKDs). The protocols consist of the initial authentication p... 详细信息
来源: 评论
An trace based vehicular mobility model for simulation of vehicular delay tolerant networks
An trace based vehicular mobility model for simulation of ve...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Yang, Wei-Dong Liu, Ji-Zhao Zhou, Xin-Yun College of Information Science and Engineering Henan University of Technology Zhengzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China
The vehicular mobility models will seriously affect the simulation results of the key technologies for Vehicular Delay Tolerant Networks. Most of the existing vehicular mobility models are synthetic mobility models wh... 详细信息
来源: 评论
Secure network coding in the presence of eavesdroppers
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 648-658页
作者: LUO MingXing1,2,3, YANG YiXian1,2,3, WANG LiCheng1,2,3 & NIU XinXin1,2,3 1Information security Center, State key laboratory of Networking and Switching technology, beijing University of Posts and Telecommunications, beijing 100876, China 2key laboratory of Network and Information Attack and Defence technology of MOE, beijing University of Posts and Telecommunications, beijing 100876, China 3National engineering laboratory for Disaster Backup and Recovery, beijing University of Posts and Telecommunications, beijing 100876, China 1. Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China3. National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network... 详细信息
来源: 评论
A unified result for variable-rate linear network coding
收藏 引用
Journal of Harbin Institute of technology(New Series) 2010年 第5期17卷 657-660页
作者: 马松雅 卓新建 郭钦 罗明星 杨义先 Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications National Engineering Laboratory for Disaster Backup and Recovery School of Mathematics and Information Sciences Henan University School of Science Beijing University of Posts and Telecommunications
Fong et *** variable-rate linear network coding for linear ***,the authors didn't investigate it for the other three types of linear network *** this paper,by simple and clear proofs,it is found that there are sim... 详细信息
来源: 评论