咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是2811-2820 订阅
排序:
Study of Secure Complicated information System Architecture Model
Study of Secure Complicated Information System Architecture ...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Kun Wang Ruidan Su Zengxin Li Zhen Cai Lihua Zhou Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ... 详细信息
来源: 评论
A Disaster Recovery System Model in an E-government System
A Disaster Recovery System Model in an E-government System
收藏 引用
IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)
作者: Kun Wang Lihua Zhou Zhen Cai Zengxin Li Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable com... 详细信息
来源: 评论
Development of an Internet Home Automation System using Java and Dynamic DNS Service
Development of an Internet Home Automation System using Java...
收藏 引用
IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)
作者: Ximin Zhang Junding Sun Lihua Zhou Minstry of Education Key Lab of Computer and Information Security Xidian Univ. Multimedia Technology Institute Xidian University Xi'an China
This paper presents the design and implementation of an Internet home automation system. The design is based on an embedded controller which is connected to a PC-based home Web server via RS232 serial port. The home a... 详细信息
来源: 评论
Authenticated public-key encryption based on elliptic curve
Authenticated public-key encryption based on elliptic curve
收藏 引用
International Conference on Embedded Software and Systems
作者: Yiliang Han Xiaoyuan Yang Yupu Hu Key Laboratory of Network and Information Security A.P.FDepartment of Electronic Technology Engineering College of A. P. F Xi'an China College of Computer Science Xidian University Xi'an China
An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm EC... 详细信息
来源: 评论
Effective strategy of worm dynamic defence and containment
收藏 引用
Dalian Ligong Daxue Xuebao/Journal of Dalian University of Technology 2005年 第SUPPL.期45卷 S176-S179页
作者: Zhao, Yuan-Dong Yang, Xiong Yun, Xiao-Chun Information and Communication Dept. Nanjing University of Information Science and Technology Nanjing 210044 China National Computer Emergency Resolution Technology/Coordination Center Beijing 100029 China National Key Lab. on Computer Context Information Security Harbin Institute of Technology Harbin 150001 China
Based on the comparison and analysis of several worms containment strategy, a new and effective strategy of dynamic defence and worm containment (DDWC) is proposed. The effectiveness for containing top-speed scan worm... 详细信息
来源: 评论
An approach to the formal verification of the three-principal cryptographic protocols
An approach to the formal verification of the three-principa...
收藏 引用
作者: Zhang, Yuqing Liu, Xiuying State Key Laboratory of Information Security GSCAS Beijing 100039 China National Computer Network Intrusion Protection Center GSCAS Beijing 100039 China
Based on the model checking theory, we derive the Running-Mode Analysis of three-principal cryptographic protocols from the Running-Mode Analysis of two-principal cryptographic protocols. To test this method, we analy... 详细信息
来源: 评论
Enhancing the content of the intrusion alerts using logic correlation
收藏 引用
Advanced Workshop on Content Computing, AWCC 2004
作者: Wang, Liang-Min Ma, Jian-Feng Zhan, Yong-Zhao The Key Laboratory of Computer Network and Information Security Xidian University Ministry of Education Xian710071 China The Computer School of Jiangsu Univ Zhenjiang212013 China
To solve the problem of the alert flooding and information semantics in the existing IDS, the approach using the logic correction to enhance the content of the alerts is presented. The Chronicle based on time interval... 详细信息
来源: 评论
Signcryption based on elliptic curve and its multi-party schemes  04
Signcryption based on elliptic curve and its multi-party sch...
收藏 引用
3rd International Conference on information security, InfoSecu '04
作者: Han, Yiliang Yang, Xiaoyuan Hu, Yupu Department of Electronic Technology Engineering College of APF Xi'an China Key Lab. on Network and Information Security of Educational Ministry Xidian University Xi'an China
A new signcryption based on elliptic curve cryptosystems that combines ECDSA and PSCE-1 is presented. The signcryption scheme is a publicly verifiable scheme which can be verified by the third party after the specific... 详细信息
来源: 评论
A risk assessment approach for network information system
A risk assessment approach for network information system
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Yong-Zheng Zhang Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin Heilongjiang China Research Center of Computer Network and Information Security Technology Harbin Institute of Technology Harbin Heilongjiang China
Currently, risk assessment has been an effective technology of protecting network information system. In order to achieve more accurate result, a new assessment approach is presented in this paper. Our approach introd... 详细信息
来源: 评论
Aggregating local behaviors based upon a discrete lagrange multiplier method
Aggregating local behaviors based upon a discrete lagrange m...
收藏 引用
Proceedings - IEEE/WIC/ACM International Conference on Intelligent Agent Technology. IAT 2004
作者: Tang, Yi Liu, Timing Jin, Xiaolong Department of Information Science Guangzhou University Guangzhou 510405 China State Key Lab of Info. Security Institute of Software CAS Beijing 100039 China Department of Computer Science Hong Kong Baptist University Kowloon Tong Hong Kong
When solving a distributed problem based on a multiagent system, the local behaviors of agents will be aggregated to the global behaviors of the multi-agent system towards a solution state. This paper presents a distr... 详细信息
来源: 评论