咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是3741-3750 订阅
排序:
Research on failure model of software reliability based on the least squares support vector regression machines and simulated annealing algorithm
Research on failure model of software reliability based on t...
收藏 引用
IEEE International Conference on Management of Innovation and technology, ICMIT
作者: Xiaodong Zhu Renzuo Xu XiLun Chen Bing Chao State Key Laboratory of Software Engineering Wuhan University China Beijing Information Science & Technology University Computer College China
Building a software failure model (SFM) is an important means to compute the software reliability. While there are not enough faults data, the estimation for model parameters is not accurate, which would decrease the ... 详细信息
来源: 评论
Research on systematic metrics of network survivability
Research on systematic metrics of network survivability
收藏 引用
2nd International Conference on Information Science and engineering, ICISE2010
作者: Ming, Liang Wang, Dongxia Zhang, Lufeng Wang, Chunlei Tang, Jian Zhao, Jinjing Nation Key Laboratory of Science and Technology on Information System Security Beijing Institute System Engineering Beijing 100101 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
As networks develop into large-scale systems, survivability of network systems is imperative. The systematic metrics of network survivability are used to measure or evaluate network survivability. This Paper summarize... 详细信息
来源: 评论
A collaborative framework for privacy protection in online social networks
A collaborative framework for privacy protection in online s...
收藏 引用
International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
作者: Yan Zhu Zexing Hu Huaixi Wang Hongxin Hu Gail-Joon Ahn Key Laboratory of Network and Software Security Assurance Ministry of Education Peking University China Institute of Computer Science and Technology Peking University Beijing China School of Mathematical Sciences Peking University Beijing China Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University Tempe AZ USA
With the wide use of online social networks (OSNs), the problem of data privacy has attracted much attention. Several approaches have been proposed to address this issue. One of privacy management approaches for OSN l... 详细信息
来源: 评论
Modeling BPEL and BPEL4People with a Timed Interruptable pi-Calculus
Modeling BPEL and BPEL4People with a Timed Interruptable pi-...
收藏 引用
IEEE Annual International Computer software and Applications Conference (COMPSAC)
作者: Wei Jin Hanpin Wang Yongzhi Cao Zizhen Wang Xiaojuan Ban Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China Ministry of Education Key laboratory of High Confidence Software Technologies Beijing China Information Engineering School University of Science and Technology Beijing Beijing China
Business Processing Execution Language (BPEL) and BPEL for People (BPEL4People) are two web services orchestration languages for composing web services. To describe formally their semantics, we introduce the π it -ca... 详细信息
来源: 评论
Pairing-Based key Management Scheme for Heterogeneous Sensor Networks
Pairing-Based Key Management Scheme for Heterogeneous Sensor...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Kuiwu Yang Kangfeng Zheng Yixian Yang Shize Guo Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Institute of electronic technology Information and Engineering University Zhengzhou China
key management is challenging in wireless sensor networks (WSNs). Most existing key management schemes mainly consider using symmetric cryptosystems in homogeneous sensor network, but they often do not provide a satis... 详细信息
来源: 评论
Research of an Innovative P2P-Based Botnet
Research of an Innovative P2P-Based Botnet
收藏 引用
International Conference on Machine Vision and Human-Machine Interface (MVHI)
作者: Gao Jian YiXian Yang KangFeng Zheng ZhengMing Hu Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Key Laboratory of network and information attack & defence technology of MOE Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China
The research recently focuses on the integration of peer-to-peer frame as incremental improvements to botnet. In hybrid P2P botnet, it is important to find a mechanism to select neighbor list for every super node, in ... 详细信息
来源: 评论
A systematic gain setting method of the positive feedback anti-islanding scheme for inverter-based distributed generators
A systematic gain setting method of the positive feedback an...
收藏 引用
2010 International Conference on Power System technology: Technological Innovations Making Power Grid Smarter, POWERCON2010
作者: Wang, Xiaoyu Zhu, Shouzhen Yong, Jing Zheng, Jinghong Xu, Wilsun State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University Chongqing 400044 China State Key Lab. of Power Systems Department of Electrical Engineering Tsinghua University Beijing 100084 China Department of Electrical and Computer Engineering University of Alberta Edmonton AB T6G 2V4 Canada
This paper proposes a systematic gain setting method for the positive feedback anti-islanding scheme which is designed to protect the interconnected inverter-based distributed generators (DGs) from islanding operation... 详细信息
来源: 评论
Combinatorial Testing with Shielding Parameters
Combinatorial Testing with Shielding Parameters
收藏 引用
Asia-Pacific Conference on software engineering
作者: Baiqiang Chen Jun Yan Jian Zhang Chinese Academy of Sciences Beijing Beijing CN Technology Center of Software Engineering Institute of Software Chinese Academy and Sciences China State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences China
Combinatorial testing is an important approach to detecting interaction errors for a system with several parameters. Existing research in this area assumes that all parameters of the system under test are always effec... 详细信息
来源: 评论
Component Monitoring of OSGi-Based software
Component Monitoring of OSGi-Based Software
收藏 引用
IEEE International Conference on e-Business engineering (ICEBE)
作者: Tao Wang Xiaowei Zhou Jun Wei Wenbo Zhang Xin Zhu State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences Beijing China Chinese Academy of Sciences Beijing China Chinese Academy of Sciences Beijing Beijing CN Technology Center of Software Engineering China
OSGi is a widely used service-oriented platform which provides support for the development and execution of component-based e-business applications. The component monitoring of OSGi-based software is important to the ... 详细信息
来源: 评论
A new secret sharing scheme based on commutative encrypted function
A new secret sharing scheme based on commutative encrypted f...
收藏 引用
International Forum on Information technology and Applications
作者: He, Jun Li, Ximei Li, Lijuan Tang, Chunming Computer and Information Engineering Department HuaiHua Vocational and Technical College Huaihua Hunan 418000 China School of Computer and Communication Hunan University Changsha Hunan 410082 China School of Mathematics and Information Science Guangzhou University Guangzhou Guangdong 510006 China State Key Laboratory of Information Security Institute of Software Science CAS Beijing 100080 China
With the characteristic that the commutativity of modular exponential function makes the specific order of secret distribution process less important and on basis of the abstruseness of discrete logarithm, this paper ... 详细信息
来源: 评论