咨询与建议

限定检索结果

文献类型

  • 1,806 篇 会议
  • 1,567 篇 期刊文献

馆藏范围

  • 3,373 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,197 篇 工学
    • 1,552 篇 计算机科学与技术...
    • 1,250 篇 软件工程
    • 573 篇 信息与通信工程
    • 290 篇 电气工程
    • 234 篇 电子科学与技术(可...
    • 232 篇 控制科学与工程
    • 193 篇 生物工程
    • 159 篇 机械工程
    • 133 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 104 篇 光学工程
    • 98 篇 生物医学工程(可授...
    • 76 篇 化学工程与技术
    • 76 篇 核科学与技术
    • 70 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 安全科学与工程
  • 1,108 篇 理学
    • 533 篇 数学
    • 376 篇 物理学
    • 212 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 81 篇 化学
  • 582 篇 管理学
    • 361 篇 管理科学与工程(可...
    • 252 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 91 篇 法学
    • 48 篇 法学
  • 76 篇 医学
    • 61 篇 临床医学
    • 50 篇 基础医学(可授医学...
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 27 篇 军事学
  • 25 篇 农学
  • 15 篇 教育学
  • 13 篇 文学
  • 9 篇 艺术学

主题

  • 141 篇 feature extracti...
  • 122 篇 semantics
  • 106 篇 hadron colliders
  • 103 篇 accuracy
  • 95 篇 computational mo...
  • 88 篇 training
  • 83 篇 deep learning
  • 70 篇 data models
  • 62 篇 federated learni...
  • 52 篇 neural networks
  • 51 篇 security
  • 49 篇 privacy
  • 45 篇 adaptation model...
  • 43 篇 optimization
  • 43 篇 predictive model...
  • 42 篇 robustness
  • 41 篇 protocols
  • 41 篇 cloud computing
  • 40 篇 blockchain
  • 40 篇 cryptography

机构

  • 192 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 151 篇 centro brasileir...
  • 151 篇 yerevan physics ...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 149 篇 academy of scien...
  • 148 篇 universidad iber...
  • 148 篇 indian institute...
  • 147 篇 charles universi...
  • 147 篇 department of ph...
  • 146 篇 brunel universit...
  • 146 篇 university of de...
  • 144 篇 rwth aachen univ...
  • 142 篇 imperial college...
  • 139 篇 università di to...
  • 139 篇 zhejiang univers...
  • 139 篇 indian institute...
  • 136 篇 infn sezione di ...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,120 篇 英文
  • 158 篇 其他
  • 103 篇 中文
检索条件"机构=Key Laboratory of Computer Network Technology"
3373 条 记 录,以下是3261-3270 订阅
排序:
Access control architecture design issues in enterprise collaborative environment
Access control architecture design issues in enterprise coll...
收藏 引用
International Conference on Management and Service Science, MASS 2009
作者: Xiangrong, Zu Lianzhong, Liu Ruzhi, Xu Computer Sci. and Tech. Dept. North China Electric Power University Beijing 102206 China Key Laboratory of Beijing Network Technology School of Computer Sci.and Engineering Beihang University Beijing 100191 China
Enterprise collaborative systems often focus on building useful connections among people, tools, and information, access control is particularly important in the environment. This paper is concerned with enterprise ac... 详细信息
来源: 评论
Access model of web users based on multi-chains hidden Markov models
Access model of web users based on multi-chains hidden Marko...
收藏 引用
作者: Zheng, Kangfeng Yang, Yixian Wang, Xiujuan Guo, Shize Key Laboratory of Network and Information Attack and Defence Technology MOE Beijing University of Posts and Telecommunications Beijing China College of Computer Sciences Beijing University of Technology Beijing China No. 54 Research Institute of the General Staff PLA Beijing China
How to distinguish abnormal access from normal ones is the key problem in Distribution Denial of service(DDoS) attack detection. This research aims at finding out the major difference between the abnormal access and t... 详细信息
来源: 评论
A Logging Scheme for Database Audit
A Logging Scheme for Database Audit
收藏 引用
International Workshop on computer Science and Engineering (WCSE)
作者: Qiang Huang Lianzhong Liu School of Computer Science and Engineering Key Laboratory of Beijing Network Technology Beihang University Beijing China
Database audit can strengthen the security of database. Logging database activities is usually the first step of implementing database audit. In this paper, we present a logging scheme for database audit. Unlike nativ... 详细信息
来源: 评论
A Framework for Database Auditing
A Framework for Database Auditing
收藏 引用
International Conference on computer Sciences and Convergence Information technology (ICCIT)
作者: Lianzhong Liu Qiang Huang School of Computer Science and Engineering Key Laboratory of Beijing Network Technology Beihang University Beijing China
Database auditing can help strengthen the security of database. In this paper, we present a framework of database auditing, which log the database activities through analyzing network traffic, execute audit analysis t... 详细信息
来源: 评论
Bloom Filter Based Index for Query over Encrypted Character Strings in Database
Bloom Filter Based Index for Query over Encrypted Character ...
收藏 引用
computer Science and Information Engineering, CSIE, WRI World Congress on FLAGGED
作者: Lianzhong Liu Jingfen Gai Key Laboratory of Beijing Network Technology School of Computer Science and Engineering Beihang University Beijing China
It is important to construct more efficient index used for query over encrypted character strings in database. A few of approaches to deal with such issues have been worked out. In this paper, an bloom filter based in... 详细信息
来源: 评论
A real-time scheduling algorithm for industrial communication
A real-time scheduling algorithm for industrial communicatio...
收藏 引用
IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)
作者: Ming Tan Zhen Wei School of Computer and Information Key Laboratory of Network and Intelligent Information Processing Hefei University of Technology Hefei China
To overcome the drawback that switched Ethernet does not guarantee the timely delivery of real-time messages in industrial communication, an improved FTT (flexible time-triggered communication) paradigm was proposed f... 详细信息
来源: 评论
Policy-driven autonomic network resource management for observation and detection data communication
Policy-driven autonomic network resource management for obse...
收藏 引用
2009 International Conference on High Performance Computing, networking and Communication Systems, HPCNCS 2009
作者: Feng, Jing Ma, Weijun Liu, Dawei Yu, Xiaoxing Institute of Meteorology PLA University of Science and Technology Nanjing 211101 China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing 210096 China School of Information Science and Engineering Southeast University Nanjing 210096 China
The increase of the business and management complexity requires more adaptive and higher selfmanaged equipments, application processes and management systems, which promotes the development of autonomic computing and ... 详细信息
来源: 评论
A static method for detection of information theft malware
A static method for detection of information theft malware
收藏 引用
2nd International Symposium on Electronic Commerce and Security, ISECS 2009
作者: Li, JiaJing Wei, Tao Zou, Wei Mao, Jian Key Laboratory of Network and Software Security Assurance Ministry of Education Peking University Beijing 100871 China Institute of Computer Science and Technology Peking University Beijing 100871 China Department of Electronic and Information Engineering BeiHang University Beijing 10083 China
Existing techniques based on behavior semantics for information theft malware detection have the main shortcomings of low path coverage and disability of finding hidden malicious behaviors. In this paper we propose a ... 详细信息
来源: 评论
An efficient mesh simplification algorithm
An efficient mesh simplification algorithm
收藏 引用
作者: Wang, Hailing Yin, Guisheng Zhang, Jing Wang, Decai Wang, Jian National Defence Key Laboratory of Autonomous Underwater Vehicle Technology Harbin Engineering University Harbin Heilongjiang 150001 China College of Computer Science and Technology Harbin Engineering University Harbin Heilongjiang 150001 China Network and Information Center Harbin Engineering University Harbin Heilongjiang 150001 China
This paper presents a new mesh simplification algorithm based on edge collapse, it combines surface curvature and quadric error metric, the position of a new vertex for edge collapse depends on multiple-weighted appro... 详细信息
来源: 评论
RESEARCH AND IMPLEMENTATION ON SNORT-BASED HYBRID INTRUSION DETECTION SYSTEM
RESEARCH AND IMPLEMENTATION ON SNORT-BASED HYBRID INTRUSION ...
收藏 引用
2009 International Conference on Machine Learning and Cybernetics(2009机器学习与控制论国际会议)
作者: YU-XIN DING MIN XIAO AI-WU LIU Key Laboratory of Network Oriented Intelligent Computation Department of Computer Sciences and Technology Harbin Institute of Technology Shenzhen Graduate SchoolChina
Since most of current intrusion detection systems (IDS) only use one of the two detection methods, misused detection or anomaly detection, both of them have their own limitations. In this paper, the technique that com... 详细信息
来源: 评论