咨询与建议

限定检索结果

文献类型

  • 2,088 篇 期刊文献
  • 2,005 篇 会议
  • 10 册 图书

馆藏范围

  • 4,103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,968 篇 工学
    • 1,752 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 513 篇 信息与通信工程
    • 318 篇 土木工程
    • 292 篇 控制科学与工程
    • 272 篇 电气工程
    • 233 篇 电子科学与技术(可...
    • 231 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 218 篇 生物工程
    • 214 篇 建筑学
    • 213 篇 化学工程与技术
    • 149 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 126 篇 网络空间安全
    • 124 篇 安全科学与工程
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 103 篇 仪器科学与技术
    • 91 篇 生物医学工程(可授...
  • 1,443 篇 理学
    • 753 篇 数学
    • 404 篇 物理学
    • 241 篇 生物学
    • 208 篇 统计学(可授理学、...
    • 170 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 616 篇 管理学
    • 407 篇 管理科学与工程(可...
    • 234 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 12 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 59 篇 security
  • 58 篇 deep learning
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 40 篇 software
  • 40 篇 cloud computing
  • 39 篇 machine learning
  • 37 篇 optimization
  • 37 篇 accuracy
  • 35 篇 blockchain
  • 34 篇 robustness

机构

  • 226 篇 state key labora...
  • 162 篇 school of cyber ...
  • 150 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 38 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 29 篇 xiuli du
  • 24 篇 limin sun
  • 23 篇 wang wei
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 zhang lei
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 tan yang
  • 17 篇 jia yingmin

语言

  • 3,701 篇 英文
  • 209 篇 中文
  • 191 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4103 条 记 录,以下是3661-3670 订阅
排序:
Soundness verification and analysis of interorganizational logical workflow nets
Soundness verification and analysis of interorganizational l...
收藏 引用
2nd International Workshop on Education technology and Computer Science, ETCS 2010
作者: Liu, Wei Du, YuYue Sun, HaiChun Yan, Chun College of Information Science and Engineering Shandong University of Science and Technology Qingdao China State Key Laboratory of Computer Science Chinese Academy of Sciences Institute of Software Beijing China
Soundness is a vital property of Interorganizational Logical Workflow Nets (ILWN) which can efficiently model cooperative systems. But even though each logical workflow net(LWN) is sound, soundness of arbitrary ILWN i... 详细信息
来源: 评论
Extended software component model for testing and reuse
Extended software component model for testing and reuse
收藏 引用
2010 2nd IEEE International Conference on Information Management and engineering, ICIME 2010
作者: Jiang, Ying Lu, Yu-Ke Wang, Hai-Rui Li, Ying-Na Fu, Xiao-Dong Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming China Key Laboratory of High Confidence Software Technologies Peking University Ministry of Education Beijing China
Component Based software Development is gaining popularity in recent years. In this way of software development, software components, which are typically black-box components, are intensively reused to construct new s... 详细信息
来源: 评论
Enhancing fairness: A novel C2C e-commerce community member reputation algorithm based on transaction social networks
Enhancing fairness: A novel C2C e-commerce community member ...
收藏 引用
IADIS International Conference WWW/Internet 2010
作者: Feng, Wangsen Zhang, Bei Xia, Yunni Li, Jiajing Meng, Tao Key Laboratory of Network and Software Security Assurance of Ministry of Education Computing Center Peking University Beijing 100871 China College of Computer Science Chongqing University Chongqing 400044 China School of Mechanical Electronic and Information Engineering China University of Mining and Technology Beijing 100083 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Today, almost all the C2C e-commerce community member reputation evaluating algorithms are time sensitive. The reputation of a community member is accumulated after transactions and the increment of reputation after a... 详细信息
来源: 评论
Approach of degenerate test set generation based on secure state transition
收藏 引用
Ruan Jian Xue Bao/Journal of software 2010年 第3期21卷 539-547页
作者: Cheng, Liang Zhang, Yang Feng, Deng-Guo Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 China State Key Laboratory of Information Security Institute of Software The Chinese Academy of Sciences Beijing 100190 China
Based on predecessors' work, this propose the concept of degenerate test set (DTS) and an approach that performs test generation and redundancy elimination in the light of the special requirement of verification o... 详细信息
来源: 评论
A naive feature selection method and its application in network intrusion detection
A naive feature selection method and its application in netw...
收藏 引用
International Conference on Computational Intelligence and security
作者: Chen, Tieming Pan, Xiaoming Xuan, Yiguang Ma, Jixia Jiang, Jie College of Computer Sci. and Tech. Zhejiang University of Technology Hangzhou 310023 China State Key Lab. of Software Development Environment Beihang University Beijing 100191 China Zhejiang Key Laboratory of Information Security Hangzhou310012 China
Network intrusion detection system needs to handle huge data selected from network environments which usually contain lots of irrelevant or redundant features. It makes intrusion detection with high resource consumpti... 详细信息
来源: 评论
Multi-image based photon tracing for interactive global illumination of dynamic scenes
Multi-image based photon tracing for interactive global illu...
收藏 引用
作者: Yao, Chunhui Wang, Bin Chan, Bin Yong, Junhai Paul, Jean-Claude School of Software Tsinghua University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Key Laboratory for Information System Security Ministry of Education of China Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China University of Hong Kong Hongkong Hong Kong INRIA France
Image space photon mapping has the advantage of simple implementation on GPU without pre-computation of complex acceleration structures. However, existing approaches use only a single image for tracing caustic photons... 详细信息
来源: 评论
Research on cooperative anti-worm system model based on distributed honeypots
Research on cooperative anti-worm system model based on dist...
收藏 引用
International Conference on Internet technology and Applications, ITAP 2010
作者: Zhang, Ran Yao, Weili Jia, Zhongtian School of Software Engineering Beijing University of Technology Beijing China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
This paper presents a cooperative anti-worm system model based on distributed honeypots for local area network(LAN). This model deployes honeypot systems in DMZ, at the back of firewall and in the internal subnets res... 详细信息
来源: 评论
Automatic bug triage using semi-supervised text classification
Automatic bug triage using semi-supervised text classificati...
收藏 引用
作者: Xuan, Jifeng Jiang, He Ren, Zhilei Yan, Jun Luo, Zhongxuan School of Mathematical Sciences Dalian University of Technology Dalian 116024 China School of Software Dalian University of Technology Dalian 116621 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100190 China Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing 100190 China
In this paper, we propose a semi-supervised text classification approach for bug triage to avoid the deficiency of labeled bug reports in existing supervised approaches. This new approach combines naive Bayes classifi... 详细信息
来源: 评论
An extensible Hash function construction based on embedded chaos maps
An extensible Hash function construction based on embedded c...
收藏 引用
10th IEEE International Conference on Computer and Information technology, CIT-2010, 7th IEEE International Conference on Embedded software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and Communications, ScalCom-2010
作者: Zhang, Xiaohong Yang, Yixian Li, Lixiang Peng, Haipeng State Key Laboratory of Networking and Switching Technology Information Security Center Beijing University of Posts and Telecommunications P. O. Box 145 Beijing 100876 China School of Information Engineering Jiangxi University of Science and Technology Ganzhou 341000 China
Based on chaotic Tent map, this paper proposed a new 5×L (L ≥ 32) bits extensible Hash function with symmetric keys. The structure only performed Boolean algorithm and shift operation. In order to generate fast ... 详细信息
来源: 评论
Spatial Variations in Particle Size and Magnetite Concentration on Cedar Beach:Implications for Grain-Sorting Processes,Western Lake Erie,Canada
收藏 引用
Acta Geologica Sinica(English Edition) 2010年 第6期84卷 1520-1532页
作者: ZHANG Shuwei Maria T. CIOPPA ZHANG Shihong State Key Laboratory of Geological Processes and Mineral Resources China University of Geosciences Beijing 100083 China Department of Earth and Environmental Sciences University of Windsor Windsor ON N9B 3P4 Canada College of Computer Engineering and Software Taiyuan University of Technology Taiyuan 030024 China
This study examined spatial variations in the concentration,grain size and heavy mineral assemblages on Cedar Beach(Lake Erie,Canada).Magnetic studies of heavy mineral-enriched,dark-reddish sands present on the beac... 详细信息
来源: 评论