咨询与建议

限定检索结果

文献类型

  • 1,837 篇 会议
  • 1,582 篇 期刊文献

馆藏范围

  • 3,419 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,295 篇 工学
    • 1,682 篇 计算机科学与技术...
    • 1,313 篇 软件工程
    • 613 篇 信息与通信工程
    • 305 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,073 篇 理学
    • 635 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 91 篇 化学
  • 673 篇 管理学
    • 389 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 107 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 140 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 78 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 62 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 visualization
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 43 篇 security
  • 43 篇 robustness
  • 42 篇 adaptation model...
  • 41 篇 optimization
  • 41 篇 predictive model...

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 63 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,097 篇 英文
  • 190 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3419 条 记 录,以下是3381-3390 订阅
排序:
Modeling the intrusion by using capability of attackers
Modeling the intrusion by using capability of attackers
收藏 引用
International Conference on Machine Learning and Cybernetics, ICMLC 2005
作者: Wang, Liang-Min Zhang, Jian-Ming Ma, Jian-Fenc Department of Computer Science Jiangsu University Zhenjiang 212013 China Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University 710071 China
Modeling the intrusion is an open problem which is necessary to be solved in Intrusion Tolerance System. A model of state transition and its constructing algorithm is presented which is described with the capability o... 详细信息
来源: 评论
A new approach for early detection of internet worms based on connection degree
A new approach for early detection of internet worms based o...
收藏 引用
International Conference on Machine Learning and Cybernetics, ICMLC 2005
作者: Bo, Chen Bin-Xingfang Yun, Xiao-Chun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin 150001 China National Computer Network and Information System Security Administration Center Beijing 100031 China
In recent years, internet-scale worm incidents occurred many times. People wonder at the speediness of the worm spread and the severe damage to the internet. So people began to find methods to detect worms as quickly ... 详细信息
来源: 评论
New methods to construct cheating immune multisecret sharing scheme
收藏 引用
1st SKLOIS Conference on information Security and Cryptology, CISC 2005
作者: Ma, Wen Ping Zhang, Fu Tai Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Mathematics and Computer Science Nanjing Normal University Nanjing 210097 China
In this paper, the constructions of cheating immune secret sharing and multisecret sharing are studied. Based on the theories of matrix and linear block codes over finite field, some new methods to construct cheating ... 详细信息
来源: 评论
Study of secure complicated information system architecture model
Study of secure complicated information system architecture ...
收藏 引用
1st International Conference on Semantics, Knowledge and Grid, SKG 2005
作者: Wang, Kun Su, Ruidan Li, Zengxin Cai, Zhen Zhou, Lihua Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China National Info Security Engineering and Technology Research Center Beijing 100093 China
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ... 详细信息
来源: 评论
A mathematical approach to disaster recovery planning
A mathematical approach to disaster recovery planning
收藏 引用
1st International Conference on Semantics, Knowledge and Grid, SKG 2005
作者: Wang, Kun Yin, Zhonghai Yuan, Feng Zhou, Lihua Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China National Info Security Engineering and Technology Research Center Beijing 100093 China
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u... 详细信息
来源: 评论
E-μTESLA: An efficient broadcast authentication protocol for wireless sensor network
收藏 引用
Journal of Computational information Systems 2005年 第3期1卷 433-438页
作者: Wang, Liang-Min Zhang, Jian-Ming Zhan, Yong-Zhao Ma, Jian-Feng Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China The Computer School Jiangsu University Zhenjiang 212013 China
Due to wide application of the wireless sensor network (WSN), the WSN security problems have become very critical. In broadcast authentication mechanisms, the traditional protocols are confronted with large challenges... 详细信息
来源: 评论
New algorithm for minimum delay overlay multicast tree
收藏 引用
Jisuanji Gongcheng/computer Engineering 2005年 第14期31卷 4-6页
作者: Wu, Jiagao Jiang, Aiquan Ye, Xiaoguo Department of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
This paper studies the problem of degree constrained minimum radius (DCMR) spanning tree in overlay multicast routing. A new heuristic greedy routing algorithm called degree-delay compact tree (DDCT), which is based o... 详细信息
来源: 评论
A new type of digital multisignature
A new type of digital multisignature
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Ying-Long Wang Lian-Hai Wang The School of Information Science and Engineering Shandong University Jinan China The Key Laboratory for Computer Network Jinan China
information security is very important in CSCW and digital signature is one of the valid methods to resolve these problems. Based on research on multisignature and proxy signature, we present a new type of signature: ... 详细信息
来源: 评论
Interaction based, service oriented model of network architecture
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2005年 第5期33卷 804-809页
作者: Yang, Peng Wu, Jia-Gao Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
By paying attention to tussle's impact on the research of network architecture, a set of design principles for constructing new generation network architecture are summarized in this paper, and then an interaction... 详细信息
来源: 评论
Modeling the intrusion by using capability of attackers
Modeling the intrusion by using capability of attackers
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Liang-Min Wang Jian-Ming Zhang Jian-Feng Ma The Department of Computer Science Jiangsu University Zhenjiang China The Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University China
Modeling the intrusion is an open problem which is necessary to be solved in intrusion tolerance system. A model of state transition and its constructing algorithm is presented which is described with the capability o... 详细信息
来源: 评论