咨询与建议

限定检索结果

文献类型

  • 15 篇 会议
  • 11 篇 期刊文献

馆藏范围

  • 26 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 11 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 4 篇 信息与通信工程
    • 3 篇 网络空间安全
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 1 篇 工商管理
  • 3 篇 理学
    • 1 篇 化学
    • 1 篇 系统科学
  • 2 篇 医学
    • 2 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 3 篇 data mining
  • 3 篇 computational mo...
  • 2 篇 deep learning
  • 2 篇 natural language...
  • 2 篇 logic gates
  • 2 篇 vectors
  • 2 篇 real-time system...
  • 2 篇 accuracy
  • 2 篇 measurement
  • 2 篇 attention mechan...
  • 2 篇 nonhomogeneous m...
  • 1 篇 industrial inter...
  • 1 篇 phenology
  • 1 篇 text categorizat...
  • 1 篇 intrusion detect...
  • 1 篇 conservation bio...
  • 1 篇 similar measure
  • 1 篇 learning systems

机构

  • 6 篇 shandong provinc...
  • 6 篇 shandong branch ...
  • 5 篇 key laboratory o...
  • 4 篇 shandong enginee...
  • 2 篇 shandong enginee...
  • 2 篇 software enginee...
  • 2 篇 key laboratory o...
  • 2 篇 security in netw...
  • 2 篇 group of network...
  • 2 篇 network departme...
  • 2 篇 college of compu...
  • 1 篇 college of marin...
  • 1 篇 biology departme...
  • 1 篇 faculty of comme...
  • 1 篇 navarre institut...
  • 1 篇 respiratory unit...
  • 1 篇 biodiversity cen...
  • 1 篇 génome québec mo...
  • 1 篇 health sciences ...
  • 1 篇 women’s college ...

作者

  • 5 篇 jianqiang zhang
  • 5 篇 gongpeng song
  • 5 篇 qin lu
  • 4 篇 shuo zhao
  • 3 篇 maher salem
  • 3 篇 ulrich buehler
  • 2 篇 lu qin
  • 2 篇 qiliang gu
  • 2 篇 song gongpeng
  • 2 篇 zhang jianqiang
  • 2 篇 hofbauer stefan
  • 2 篇 yu zhang
  • 2 篇 quirchmayr geral...
  • 2 篇 beckers kristian
  • 2 篇 zhao shuo
  • 1 篇 cindy cart
  • 1 篇 mairi ward
  • 1 篇 karen chesters
  • 1 篇 chetan parmar
  • 1 篇 réka várnai

语言

  • 26 篇 英文
检索条件"机构=Group of Network and Data Security"
26 条 记 录,以下是1-10 订阅
排序:
A circuit area optimization of MK-3 S-box
收藏 引用
Cybersecurity 2025年 第1期8卷 61-71页
作者: Yanjun Li Weiguo Zhang Yiping Lin Jian Zou Jian Liu Information Industry Information Security Evaluation Center The 15th Research Institute of China Electronic Technology Group CorporationBeijing 100083China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China Beijing Electronic Science and Technology Institute No.7 Fufeng RoadFengtai DistricBeijing 100083China College of Computer and Data Science Fuzhou UniversityFuzhou 350108China
In MILCOM 2015,Kelly et *** the authentication encryption algorithm MK-3,which applied the 16-bit *** paper aims to implement the 16-bit S-box with less circuit ***,we classifed the irreducible polynomials over F_(2n)... 详细信息
来源: 评论
Spatial-Temporal Reconstruction Error for AIGC-based Forgery Image Detection
Spatial-Temporal Reconstruction Error for AIGC-based Forgery...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Chengji Shen Zhenjiang Liu Kaixuan Chen Jie Lei Mingli Song Zunlei Feng State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security Idlefish Network Technology Alibaba Group College of Computer Science and Technology Zhejiang University of Technology
The remarkable success of AI-Generated Content (AIGC), especially diffusion image generation models, brings about unprecedented creative applications, but also creates fertile ground for malicious counterfeiting and c... 详细信息
来源: 评论
Efficient implementation of zero-knowledge proofs for watermark detection in multimedia data
Efficient implementation of zero-knowledge proofs for waterm...
收藏 引用
Transactions on data Hiding and Multimedia security I
作者: Adelsbach, André Rohe, Markus Sadeghi, Ahmad-Reza Department of Network and Data Security Ruhr-Universität Bochum Germany Applied Data Security Group Ruhr-Universität Bochum Germany
Robust digital watermarking systems are important building blocks in applications such as fingerprinting, dispute resolving or direct proofs of authorship, where the presence of a watermark serves as evidence for some... 详细信息
来源: 评论
Reinforcing network security by converting massive data flow to continuous connections for IDS
Reinforcing network security by converting massive data flow...
收藏 引用
International Conference for Internet Technology and Secured Transactions (ICITST)
作者: Maher Salem Ulrich Buehler Group of Network and Data Security University of Applied Sciences Fulda Germany
Processing massive data flow in intrusion detection systems (IDS) become a serious challenge. It is considered as a major deficiency while handling heterogeneous and nonstationary data stream to uncover anomaly in the... 详细信息
来源: 评论
An Enhanced GHSOM for IDS
An Enhanced GHSOM for IDS
收藏 引用
IEEE International Conference on Systems, Man, and Cybernetics
作者: Maher Salem Ulrich Buehler Group of Network and Data Security University of Applied Sciences Fulda Fulda Germany
Artificial neural network, recently, is considered as a vibrant area in machine learning. Particularly, Growing Hierarchical Self Organizing Map (GHSOM) model, as an intelligent neural network, is vital in intrusion d... 详细信息
来源: 评论
Persistent dataset generation using real-time operative framework
Persistent dataset generation using real-time operative fram...
收藏 引用
International Conference on Computing, networking and Communications (ICNC)
作者: Maher Salem Sven Reißmann Ulrich Buehler Group of Network and Data Security (NDSec) University of Applied Sciences Fulda Germany
During the widening of information technology, the need to a framework that efficiently constructs connection vectors from online data flow for evaluating intrusion detection models has become fundamental. Moreover, k... 详细信息
来源: 评论
An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第1期138卷 903-915页
作者: Senshan Ouyang Xiang Liu Lei Liu Shangchao Wang Baichuan Shao Yang Zhao School of Mechanical Engineering Northwestern Polytechnical UniversityXi’anChina Department of Process and Information Technology Chengdu Aircraft Industrial(Group)Co.Ltd.ChengduChina School of Information and Software Engineering The Network and Data Security Key Laboratory of Sichuan ProvinceUniversity of Electronic Science and Technology of ChinaChengduChina
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce ***,the channel between cloud servers and smart equipment is... 详细信息
来源: 评论
A lightweight privacy preserving approach for analyzing communication records to prevent voip attacks using toll fraud as an example
A lightweight privacy preserving approach for analyzing comm...
收藏 引用
11th IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom-2012
作者: Hofbauer, Stefan Beckers, Kristian Quirchmayr, Gerald Sorge, Christoph Network Department Danube Data Center GmbH Vienna Austria Software Engineering Paluno University of Duisburg-Essen Dusiburg Germany Multimedia Information Systems Research Group University of Vienna Vienna Austria School of Computer and Information Security University of South Australia Adelaide SA Australia Security in Networks University of Paderborn Paderborn Germany
Voice-over-IP systems are quite frequently attacked with the intent of service theft. While VoIP security has been intensively researched in the past, devised solutions often demand significant changes to the VoIP sys... 详细信息
来源: 评论
A method for re-using existing ITIL processes for creating an ISO 27001 ISMS process applied to a high availability video conferencing cloud scenario
A method for re-using existing ITIL processes for creating a...
收藏 引用
IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference on Availability, Reliability, and security in Information Systems and HCI, CD-ARES 2013
作者: Beckers, Kristian Hofbauer, Stefan Quirchmayr, Gerald Wills, Christopher C. University of Duisburg-Essen Paluno - The Ruhr Institute for Software Technology Germany Amadeus Data Processing GmbH Network Integration Services Germany University of Vienna Multimedia Information Systems Research Group Australia University of South Australia School of Computer and Information Security Australia CARIS Research Ltd. United Kingdom
Many companies have already adopted their business processes to be in accordance with defined and organized standards. Two standards that are sought after by companies are IT Infrastructure Library (ITIL) and ISO 2700... 详细信息
来源: 评论
A Secure Device Management Scheme with Audio-Based Location Distinction in IoT
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第1期138卷 939-956页
作者: Haifeng Lin Xiangfeng Liu Chen Chen Zhibo Liu Dexin Zhao Yiwen Zhang Weizhuang Li Mingsheng Cao College of Economics and Management Nanjing University of Aeronautics and AstronauticsNanjing211106China Chengdu Aircraft Industrial(Group)Co. Ltd.Chengdu610073China Academy of Military Sciences of PLA Beijing100091China School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu610054China Ningbo Web King Technology Joint Stock Co. Ltd.Ningbo315000China The Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China
Identifying a device and detecting a change in its position is critical for secure devices management in the Internet of Things(IoT).In this paper,a device management system is proposed to track the devices by using a... 详细信息
来源: 评论