咨询与建议

限定检索结果

文献类型

  • 2,088 篇 期刊文献
  • 2,005 篇 会议
  • 10 册 图书

馆藏范围

  • 4,103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,968 篇 工学
    • 1,752 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 513 篇 信息与通信工程
    • 318 篇 土木工程
    • 292 篇 控制科学与工程
    • 272 篇 电气工程
    • 233 篇 电子科学与技术(可...
    • 231 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 218 篇 生物工程
    • 214 篇 建筑学
    • 213 篇 化学工程与技术
    • 149 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 126 篇 网络空间安全
    • 124 篇 安全科学与工程
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 103 篇 仪器科学与技术
    • 91 篇 生物医学工程(可授...
  • 1,443 篇 理学
    • 753 篇 数学
    • 404 篇 物理学
    • 241 篇 生物学
    • 208 篇 统计学(可授理学、...
    • 170 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 616 篇 管理学
    • 407 篇 管理科学与工程(可...
    • 234 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 12 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 59 篇 security
  • 58 篇 deep learning
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 40 篇 software
  • 40 篇 cloud computing
  • 39 篇 machine learning
  • 37 篇 optimization
  • 37 篇 accuracy
  • 35 篇 blockchain
  • 34 篇 robustness

机构

  • 226 篇 state key labora...
  • 162 篇 school of cyber ...
  • 150 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 38 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 29 篇 xiuli du
  • 24 篇 limin sun
  • 23 篇 wang wei
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 zhang lei
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 tan yang
  • 17 篇 jia yingmin

语言

  • 3,701 篇 英文
  • 209 篇 中文
  • 191 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4103 条 记 录,以下是3611-3620 订阅
排序:
Robustify a job-shop schedule according to the payload of the machine
Robustify a job-shop schedule according to the payload of th...
收藏 引用
7th International Conference on Service Systems and Service Management, ICSSSM'10
作者: You, Zhiyang Sun, Zhigang Zhao, Xibin Zang, Daxin Department of Computer Science and Technology Tsinghua University Beijing 100084 China School of Software Tsinghua University Beijing China Key Laboratory of Information System Security Ministry of Education School of Software Tsinghua University Beijing 100084 China Software Engineering Institute Beijing University of Aeronautics and Astronautics Beijing 100084 China
Robust scheduling is an effective way to solve job-shop scheduling problem (JSP) under a dynamic and stochastic environment with uncertainties, which may lead to numerous schedule disruptions. Maintaining the optimiza... 详细信息
来源: 评论
Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of Computer Science & technology 2010年 第6期25卷 1293-1304页
作者: 王怀习 朱岩 冯荣权 Stephen S.Yau LMAM School of Mathematical SciencesPeking University Electronic Engineering Institute Institute of Computer Science and Technology Peking University Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education Information Assurance Center and School of Computing Informatics and Decision Systems Engineering Arizona State University
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement ***... 详细信息
来源: 评论
Research on XML-based key management service for identity-based cryptography
Research on XML-based key management service for identity-ba...
收藏 引用
International Conference on Multimedia Information Networking and security
作者: Chen, Tieming Jiang, Jie Chen, Bo Li, Wei College of Computer Science and Technology Zhejiang University of Technology Hangzhou China State Key Laboratory of Software Development Environment Beihang University Beijing China Zhejiang Key Laboratory of Information Security Hangzhou China
Research on the certificate-less public key cryptography has been widely concerned recently. Identity-based cryptography, ***, is the most successful certificateless solution. It can employ an arbitrary ID of a user a... 详细信息
来源: 评论
A realistic mobility model for urban traffic scenario in Vehicular Delay Tolerant Network
A realistic mobility model for urban traffic scenario in Veh...
收藏 引用
International Conference on Wireless Sensor Network
作者: Yang, Wei-Dong Sun, Li-Min Liu, Ji-Zhao College of Information Science and Engineering Henan University of Technology Zhengzhou Henan 450001 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
The vehicular mobility models have great significance and serious effect on simulation of Vehicular Delay Tolerant Networks. Most of the existing vehicular mobility models can be classified into synthetic mobility mod... 详细信息
来源: 评论
A mobility model based on traffic flow theory for Vehicular Delay Tolerant Network
A mobility model based on traffic flow theory for Vehicular ...
收藏 引用
International Conference on Bio-Inspired Computing: Theories and Applications, BICTA
作者: Yang, Wei-Dong Liu, Ji-Zhao Zhu, Hong-Song College of Information Science and Engineering Henan University of Technology Zhengzhou Henan 450001 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
The choice of the mobility models affect seriously the simulation results of the key technologies for Vehicular Delay Tolerant Networks. Most of the existing vehicular mobility models can be classified into synthetic ... 详细信息
来源: 评论
GLP: A group link prediction algorithm in DTMNs
GLP: A group link prediction algorithm in DTMNs
收藏 引用
International Conference on Educational and Information technology (ICEIT)
作者: Wu, Junying Xia, Chunhe Lv, Liangshuang Wang, Haiquan Beijing Key Laboratory of Network Technology School of Computer Science and Engineering Beihang University Beijing China College of Software Beihang University Beijing China
In DTNs, links are rare. Making full use of every link shows great importance to routing protocols. Link Prediction (LP) can predict future links between two nodes. Plenty of algorithms for link prediction have been p... 详细信息
来源: 评论
Implicit detection of stealth software with a local-booted Virtual machine
Implicit detection of stealth software with a local-booted V...
收藏 引用
3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010
作者: Wen, Yan Huang, Minhuan Zhao, Jinjing Kuang, Xiaohui Beijing Institute of System Engineering Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
Resource hiding is commonly used by stealth malware to evade detection by anti-malware scanners. In this paper, we present the design, implementation, and evaluation of Libra, a new VM-based anti-stealth-malware appro... 详细信息
来源: 评论
A routing-based dynamic workflow
收藏 引用
Information technology Journal 2010年 第3期9卷 561-568页
作者: Zhu, Chang Yan Du, Yuyue Li, Peng College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
The changes in dynamic workflows are various, such as role-based dynamic workflows, resource based dynamic workflows and so on. A routing-based dynamic workflow is proposed in this study and Agent technology is introd... 详细信息
来源: 评论
Improved impossible differential cryptanalysis on SMS4
Improved impossible differential cryptanalysis on SMS4
收藏 引用
2010 International Conference on Communications and Intelligence Information security, ICCIIS 2010
作者: Wang, Gaoli School of Computer Science and Technology Donghua University Shanghai China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China
This paper presents an improved impossible differential attack on the block cipher SMS4 which is used in WAPI (the Chinese WLAN national standard). Combining with some new observations, this paper can filter out the w... 详细信息
来源: 评论
A novel VoIP flooding detection method basing on call duration
A novel VoIP flooding detection method basing on call durati...
收藏 引用
International Conference on Pervasive Computing, Signal Processing and Applications
作者: Yang, Tianlu Zheng, Kangfeng Yang, Yixian Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing China
Through deeply analysis of INVITE flooding attack of SIP based VoIP system, a novel VoIP flooding detection scheme called CDVFD (Call Duration based VoIP Flooding Detection) is presented. The CDVFD method makes use of... 详细信息
来源: 评论