咨询与建议

限定检索结果

文献类型

  • 2,088 篇 期刊文献
  • 2,005 篇 会议
  • 10 册 图书

馆藏范围

  • 4,103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,968 篇 工学
    • 1,752 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 513 篇 信息与通信工程
    • 318 篇 土木工程
    • 292 篇 控制科学与工程
    • 272 篇 电气工程
    • 233 篇 电子科学与技术(可...
    • 231 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 218 篇 生物工程
    • 214 篇 建筑学
    • 213 篇 化学工程与技术
    • 149 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 126 篇 网络空间安全
    • 124 篇 安全科学与工程
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 103 篇 仪器科学与技术
    • 91 篇 生物医学工程(可授...
  • 1,443 篇 理学
    • 753 篇 数学
    • 404 篇 物理学
    • 241 篇 生物学
    • 208 篇 统计学(可授理学、...
    • 170 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 616 篇 管理学
    • 407 篇 管理科学与工程(可...
    • 234 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 12 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 59 篇 security
  • 58 篇 deep learning
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 40 篇 software
  • 40 篇 cloud computing
  • 39 篇 machine learning
  • 37 篇 optimization
  • 37 篇 accuracy
  • 35 篇 blockchain
  • 34 篇 robustness

机构

  • 226 篇 state key labora...
  • 162 篇 school of cyber ...
  • 150 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 38 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 29 篇 xiuli du
  • 24 篇 limin sun
  • 23 篇 wang wei
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 zhang lei
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 tan yang
  • 17 篇 jia yingmin

语言

  • 3,701 篇 英文
  • 209 篇 中文
  • 191 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4103 条 记 录,以下是3711-3720 订阅
排序:
Research on systematic metrics of network survivability
Research on systematic metrics of network survivability
收藏 引用
International Conference on Information Science and engineering (ICISE)
作者: Liang Ming Dongxia Wang Lufeng Zhang Chunlei Wang Jian Tang Jinjing Zhao Nation Key Laboratory of Science and Technology on Information System Security Beijing Institute of System Engineering Beijing China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
As networks develop into large-scale systems, survivability of network systems is imperative. The systematic metrics of network survivability are used to measure or evaluate network survivability. This Paper summarize... 详细信息
来源: 评论
A Framework for the Elicitation and Analysis of Information technology Service Requirements and Their Alignment with Enterprise Business Goals
A Framework for the Elicitation and Analysis of Information ...
收藏 引用
IEEE Annual Computer software and Applications Conference Workshops (COMPSACW)
作者: Didar Zowghi Zhi Jin School of Software Faculty of Engineering and IT Sydney University of Technology Sydney Australia Key Laboratory of High Confidence Software Technologies Peking University Beijing China
As the economies of the world have become increasingly dependant on Information technology (IT) services, there is a need for service designers and developers to focus on co-value creation between service providers an...
来源: 评论
On an attack on RSA with small CRT-exponents
收藏 引用
Science China(Information Sciences) 2010年 第8期53卷 1511-1518页
作者: HAN LiDong 1,2 , WANG XiaoYun 3 & XU GuangWu 3,4 1 key laboratory of Cryptologic technology and Information security, Ministry of Education, Shandong University, Jinan 250100, China 2 School of Mathematics, Shandong University, Jinan 250100, China 3 Institute for Advanced Study, Tsinghua University, beijing 100084, China 4 Department of Electrical engineering and Computer Science, University of Wisconsin-Milwaukee, Milwaukee, WI 53201, USA 1. Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan 250100 China2. School of Mathematics Shandong University Jinan 250100 China3. Institute for Advanced Study Tsinghua University Beijing 100084 China4. Department of Electrical Engineering and Computer Science University of Wisconsin-Milwaukee Milwaukee WI 53201 USA
This paper concerns the RSA system with private CRT-exponents. Since Chinese remainder representation provides efficiency in computation, such system is of some practical significance. In this paper, an existing attac... 详细信息
来源: 评论
Research on failure model of software reliability based on the least squares support vector regression machines and simulated annealing algorithm
Research on failure model of software reliability based on t...
收藏 引用
IEEE International Conference on Management of Innovation and technology, ICMIT
作者: Xiaodong Zhu Renzuo Xu XiLun Chen Bing Chao State Key Laboratory of Software Engineering Wuhan University China Beijing Information Science & Technology University Computer College China
Building a software failure model (SFM) is an important means to compute the software reliability. While there are not enough faults data, the estimation for model parameters is not accurate, which would decrease the ... 详细信息
来源: 评论
Research on systematic metrics of network survivability
Research on systematic metrics of network survivability
收藏 引用
2nd International Conference on Information Science and engineering, ICISE2010
作者: Ming, Liang Wang, Dongxia Zhang, Lufeng Wang, Chunlei Tang, Jian Zhao, Jinjing Nation Key Laboratory of Science and Technology on Information System Security Beijing Institute System Engineering Beijing 100101 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
As networks develop into large-scale systems, survivability of network systems is imperative. The systematic metrics of network survivability are used to measure or evaluate network survivability. This Paper summarize... 详细信息
来源: 评论
A collaborative framework for privacy protection in online social networks
A collaborative framework for privacy protection in online s...
收藏 引用
International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
作者: Yan Zhu Zexing Hu Huaixi Wang Hongxin Hu Gail-Joon Ahn Key Laboratory of Network and Software Security Assurance Ministry of Education Peking University China Institute of Computer Science and Technology Peking University Beijing China School of Mathematical Sciences Peking University Beijing China Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University Tempe AZ USA
With the wide use of online social networks (OSNs), the problem of data privacy has attracted much attention. Several approaches have been proposed to address this issue. One of privacy management approaches for OSN l... 详细信息
来源: 评论
Modeling BPEL and BPEL4People with a Timed Interruptable pi-Calculus
Modeling BPEL and BPEL4People with a Timed Interruptable pi-...
收藏 引用
IEEE Annual International Computer software and Applications Conference (COMPSAC)
作者: Wei Jin Hanpin Wang Yongzhi Cao Zizhen Wang Xiaojuan Ban Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China Ministry of Education Key laboratory of High Confidence Software Technologies Beijing China Information Engineering School University of Science and Technology Beijing Beijing China
Business Processing Execution Language (BPEL) and BPEL for People (BPEL4People) are two web services orchestration languages for composing web services. To describe formally their semantics, we introduce the π it -ca... 详细信息
来源: 评论
Pairing-Based key Management Scheme for Heterogeneous Sensor Networks
Pairing-Based Key Management Scheme for Heterogeneous Sensor...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Kuiwu Yang Kangfeng Zheng Yixian Yang Shize Guo Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Institute of electronic technology Information and Engineering University Zhengzhou China
key management is challenging in wireless sensor networks (WSNs). Most existing key management schemes mainly consider using symmetric cryptosystems in homogeneous sensor network, but they often do not provide a satis... 详细信息
来源: 评论
Research of an Innovative P2P-Based Botnet
Research of an Innovative P2P-Based Botnet
收藏 引用
International Conference on Machine Vision and Human-Machine Interface (MVHI)
作者: Gao Jian YiXian Yang KangFeng Zheng ZhengMing Hu Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Key Laboratory of network and information attack & defence technology of MOE Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China
The research recently focuses on the integration of peer-to-peer frame as incremental improvements to botnet. In hybrid P2P botnet, it is important to find a mechanism to select neighbor list for every super node, in ... 详细信息
来源: 评论
A systematic gain setting method of the positive feedback anti-islanding scheme for inverter-based distributed generators
A systematic gain setting method of the positive feedback an...
收藏 引用
2010 International Conference on Power System technology: Technological Innovations Making Power Grid Smarter, POWERCON2010
作者: Wang, Xiaoyu Zhu, Shouzhen Yong, Jing Zheng, Jinghong Xu, Wilsun State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University Chongqing 400044 China State Key Lab. of Power Systems Department of Electrical Engineering Tsinghua University Beijing 100084 China Department of Electrical and Computer Engineering University of Alberta Edmonton AB T6G 2V4 Canada
This paper proposes a systematic gain setting method for the positive feedback anti-islanding scheme which is designed to protect the interconnected inverter-based distributed generators (DGs) from islanding operation... 详细信息
来源: 评论