咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是3821-3830 订阅
排序:
A DIGITAL SIGNATURE-BASED VISUAL CRYPTOGRAPHY SCHEME FOR IMAGE DISCRIMINATION AND MANAGEMENT
收藏 引用
Journal of Electronics(China) 2009年 第5期26卷 631-636页
作者: Han Yanyan Hu Yupu He Wencai Engineering Research Center of Information Security Beijing Electronic Science and Technology Institute Beijing 100070 China Ministry of Education Key Laboratory of Computer Networks & Information Security Xidian University Xi'an 710071 China Department of Scientific Research Beijing Electronic Science and Technology Institute Beijing 100070 China
Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no informat... 详细信息
来源: 评论
Customer behavior pattern discovering based on mixed data clustering
Customer behavior pattern discovering based on mixed data cl...
收藏 引用
2009 International Conference on Computational Intelligence and software engineering, CiSE 2009
作者: Cheng, Mingzhi Xin, Yang Tian, Yangge Wang, Cong Yang, Yixian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack and Defence Technology Ministry of Education Beijing University of Posts and Telecommunications China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China International School of Software Wuhan University Wuhan China
To be effective to retain customers and enhance the marketing capabilities, it is necessary to improve the personalization of e-commerce systems. Clustering is a reliable and efficient technology to provide personal s... 详细信息
来源: 评论
A practical database intrusion detection system framework
A practical database intrusion detection system framework
收藏 引用
IEEE 9th International Conference on Computer and Information technology, CIT 2009
作者: Zhang, Yawei Ye, Xiaojun Xie, Feng Peng, Yong Key Laboratory for Information System Security School of Software Tsinghua University Beijing 100084 China China Information Technology Security Evaluation Center Building A No. 8 Yard of Shangdi Xilu Haidian District Beijing 100085 China
security mechanisms within DBMSs are far from effective to detect and prevent anomalous behavior of applications and intrusions from attackers. In fact, intrusions executed by unauthorized users to explore system vuln... 详细信息
来源: 评论
A problem-driven scenario-based approach to collaborative requirement elicitation  09
A problem-driven scenario-based approach to collaborative re...
收藏 引用
1st Asia-Pacific Symposium on Internetware, Internetware 2009
作者: Zhao, Haiyan Yi, Li Zhang, Wei Mei, Hong Key Laboratory of High Confidence Software Technology School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
Stakeholders play critical roles in requirements elicitation, since they are the source of requirements, and the quality of elicited requirements is significantly influenced by the degree of stakeholders' particip... 详细信息
来源: 评论
A service-oriented programming platform for internet-based virtual computing environment
A service-oriented programming platform for internet-based v...
收藏 引用
15th International Conference on Parallel and Distributed Systems, ICPADS '09
作者: Cao, Donggang Xiao, Zan Shao, Weizhong School of Electronics Engineering and Computer Science Peking University Key Laboratory of High Confidence Software Technology Beijing 100871 China
This paper describes a service oriented programming platform for Internet-based Virtual Computing Environment (iVCE), which is targetted for enabling collaboration among autonomous entities over Internet. This platfor... 详细信息
来源: 评论
A static method for detection of information theft malware
A static method for detection of information theft malware
收藏 引用
2nd International Symposium on Electronic Commerce and security, ISECS 2009
作者: Li, JiaJing Wei, Tao Zou, Wei Mao, Jian Key Laboratory of Network and Software Security Assurance Ministry of Education Peking University Beijing 100871 China Institute of Computer Science and Technology Peking University Beijing 100871 China Department of Electronic and Information Engineering BeiHang University Beijing 10083 China
Existing techniques based on behavior semantics for information theft malware detection have the main shortcomings of low path coverage and disability of finding hidden malicious behaviors. In this paper we propose a ... 详细信息
来源: 评论
A modeling approach of mobile ad hoc networks survivability model
A modeling approach of mobile ad hoc networks survivability ...
收藏 引用
1st International Conference on Information Science and engineering, ICISE2009
作者: Wang, Haiquan Ma, Xinyi Xia, Chunhe Hao, Senshen State Key Laboratory of Virtual Reality Technology and System Beihang University Beijing China Key Laboratory of Beijing Network Technology Beihang University Beijing China College of Software Beihang University Beijing China Shool of Computer Science and Engineering Beihang University Beijing China
Survivability has become a focal point of research. Simulation is a common method for experimental verification to identify the advantages and deficiencies of survivability models and architectures. This paper propose... 详细信息
来源: 评论
A task-deployment model for the simulation of computer network attack and defense exercises
A task-deployment model for the simulation of computer netwo...
收藏 引用
1st International Conference on Information Science and engineering, ICISE2009
作者: Yang, Yi Jiao, Jian Wang, Haiquan Xia, Chunhe State Key Laboratory of Virtual Reality Technology and System Beihang University Beijing China Key Laboratory of Beijing Network Technology Beihang University Beijing China College of Software Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China
The task-deployment models of simulation, is mainly used to solve the problem of the unreasonable tasks partition in the simulation of distributed computer network attack and defense exercises. This paper gives a task... 详细信息
来源: 评论
A novel symbolic execution framework for multi-procedure program analysis
A novel symbolic execution framework for multi-procedure pro...
收藏 引用
2009 2nd IEEE International Conference on Broadband Network and Multimedia technology, IEEE IC-BNMT2009
作者: Wenqing, Fan Hongling, Liang Yixian, Yang Guoai, Xu Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China
Modern software systems, which are often largescale, with multi-procedure and complex data structures, must be extremely high quality. We present a novel framework based on symbolic execution for automatic analysis of... 详细信息
来源: 评论
TBDRM: A TPM-based secure DRM architecture
TBDRM: A TPM-based secure DRM architecture
收藏 引用
7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2009
作者: Yu, Aimin Feng, Dengguo Liu, Ren State Key Laboratory Of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China National Engineering Research Center of Information Security Beijing 100190 China School of Business Administration North China Electric Power University Beijing 102206 China
Digital Rights Management (DRM) is the technological solution to control the distribution and usage of digital assets. However, existing solutions are vulnerable to various attacks in the context where the consumer ca... 详细信息
来源: 评论