咨询与建议

限定检索结果

文献类型

  • 2,088 篇 期刊文献
  • 2,005 篇 会议
  • 10 册 图书

馆藏范围

  • 4,103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,968 篇 工学
    • 1,752 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 513 篇 信息与通信工程
    • 318 篇 土木工程
    • 292 篇 控制科学与工程
    • 272 篇 电气工程
    • 233 篇 电子科学与技术(可...
    • 231 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 218 篇 生物工程
    • 214 篇 建筑学
    • 213 篇 化学工程与技术
    • 149 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 126 篇 网络空间安全
    • 124 篇 安全科学与工程
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 103 篇 仪器科学与技术
    • 91 篇 生物医学工程(可授...
  • 1,443 篇 理学
    • 753 篇 数学
    • 404 篇 物理学
    • 241 篇 生物学
    • 208 篇 统计学(可授理学、...
    • 170 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 616 篇 管理学
    • 407 篇 管理科学与工程(可...
    • 234 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 12 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 59 篇 security
  • 58 篇 deep learning
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 40 篇 software
  • 40 篇 cloud computing
  • 39 篇 machine learning
  • 37 篇 optimization
  • 37 篇 accuracy
  • 35 篇 blockchain
  • 34 篇 robustness

机构

  • 226 篇 state key labora...
  • 162 篇 school of cyber ...
  • 150 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 38 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 29 篇 xiuli du
  • 24 篇 limin sun
  • 23 篇 wang wei
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 zhang lei
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 tan yang
  • 17 篇 jia yingmin

语言

  • 3,701 篇 英文
  • 209 篇 中文
  • 191 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4103 条 记 录,以下是3641-3650 订阅
排序:
Construction of convolutional network coding for cyclic multicast networks
Construction of convolutional network coding for cyclic mult...
收藏 引用
IEEE Symposium on Web Society
作者: Guo, Qin Luo, Mingxing Li, Lixiang Wang, Licheng Yang, Yixian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
In this paper, we present a practical algorithm to construct the convolutional multicast network coding over any finite directed cyclic network. The dual line graph of a directed cyclic graph is considered as a system... 详细信息
来源: 评论
Comment on a novel non-interactive verifiable secret sharing scheme
Comment on a novel non-interactive verifiable secret sharing...
收藏 引用
2nd International Conference on Communication software and Networks, ICCSN 2010
作者: Wang, Feng Gu, Lize Zhou, Yousheng Yang, Yixian Zhou, Yajian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery China Beijing University of Posts and Telecommunications Beijing 100876 China
In 2006, Jun et al presented a novel non-interactive verifiable secret sharing scheme constructed by Shamir's secret sharing scheme for secure multi-party communication protocol in distributed networks. In their s... 详细信息
来源: 评论
Research of an innovative P2P-based botnet
Research of an innovative P2P-based botnet
收藏 引用
2010 International Conference on Machine Vision and Human-Machine Interface, MVHI 2010
作者: Jian, Gao Zheng, Kang Feng Yang, Yi Xian Hu, Zheng Ming Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications BUPT Beijing China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications BUPT Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications BUPT Beijing China
The research recently focuses on the integration of peer-to-peer frame as incremental improvements to botnet. In hybrid P2P botnet, it is important to find a mechanism to select neighbor list for every super node, in ... 详细信息
来源: 评论
Component monitoring of OSGi-based software
Component monitoring of OSGi-based software
收藏 引用
International Workshop on Cloud Services-Platform Accelerating E-Business
作者: Wang, Tao Zhou, Xiaowei Wei, Jun Zhang, Wenbo Zhu, Xin Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing 100190 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100190 China Graduate University Chinese Academy of Sciences Beijing 100049 China
OSGi is a widely used service-oriented platform which provides support for the development and execution of component-based e-business applications. The component monitoring of OSGi-based software is important to the ... 详细信息
来源: 评论
Towards runtime plug-and-play software
Towards runtime plug-and-play software
收藏 引用
10th International Conference on Quality software, QSIC 2010
作者: Wang, Tao Zhou, Xiaowei Wei, Jun Zhang, Wenbo Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing 100190 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100190 China Graduate University Chinese Academy of Sciences Beijing 100049 China
As applications grow more and more complex, the current software faces a great challenge in dynamism. This paper proposes to modernize legacy software towards runtime plug-and-play architecture using service-oriented ... 详细信息
来源: 评论
An adaptive fine-grained performance modeling approach for internetware  10
An adaptive fine-grained performance modeling approach for i...
收藏 引用
Proceedings of the Second Asia-Pacific Symposium on Internetware
作者: Huang, Xiang Wang, Wei Zhang, Wenbo Wei, Jun Huang, Tao Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing 100190 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100190 China Graduate University Chinese Academy of Sciences Beijing 100049 China
With the great success of internet technology, internetware has become one of the most important software paradigms. But the open, dynamic and uncertain network makes it difficult to guarantee the performance of inter... 详细信息
来源: 评论
A periodic integrity measurements authenticating scheme based on TNC architecture
A periodic integrity measurements authenticating scheme base...
收藏 引用
2010 6th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2010
作者: Yuqiong, Sun Xuelai, Wu Cheng, Song Yang, Xin Yixian, Yang Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China Beijing University of Posts and Telecommunications Beijing 100876 China
In this paper, we present a periodic authentication scheme of integrity measurements based on TNC architecture. In TNC architecture, server authenticates security posture of endpoint before an endpoint is allowed to a... 详细信息
来源: 评论
Nova: A robustness-oriented Byzantine Fault Tolerance protocol
Nova: A robustness-oriented Byzantine Fault Tolerance protoc...
收藏 引用
International Conference on Grid and Cloud Computing
作者: Pei, Xiang Wang, Yongjian Luan, Zhongzhi Sino-German Joint Software Institute School of Computer Science and Engineering Beihang University 100191 Beijing China Beijing Key Laboratory of Network Technology Beihang University 100191 Beijing China
With the increased complexity, malicious faults have become an important reasons that affect the reliability of the distributed system, especially the web-scale infrastructures, i.e. Amazon S3, Google AppEngine etc. M... 详细信息
来源: 评论
Chaotic Control of Network Traffic
收藏 引用
China Communications 2010年 第5期7卷 112-119页
作者: Yang Tan Guo Shize Jin Yuehui Cheng Shiduan School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 P. R. China State Key Laboratory of Networking and Switching Beijing University of Posts and Telecommunications Beijing 100876 P. R. China Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 P. R. China
This paper presents a chaotic control method on network traffic. By this method, the chaotic network traffic can be controlled to pre-assigned equifibrium point according to chaotic prediction and the Largest Lyapunov... 详细信息
来源: 评论
Research on failure model of software reliability based on the least squares support vector regression machines and simulated annealing algorithm
Research on failure model of software reliability based on t...
收藏 引用
5th IEEE International Conference on Management of Innovation and technology, ICMIT2010
作者: Zhu, Xiaodong Xu, Renzuo Chen, Xi-Lun Chao, Bing State Key Laboratory of Software Engineering Wuhan University Wuhan China Hebei Maintenance Engineering Research Institute Hebei China Beijing Information Science and Technology University Computer College Beijing China
Building a software failure model (SFM) is an important means to compute the software reliability. While there are not enough faults data, the estimation for model parameters is not accurate, which would decrease the ... 详细信息
来源: 评论