咨询与建议

限定检索结果

文献类型

  • 1,687 篇 会议
  • 1,331 篇 期刊文献

馆藏范围

  • 3,018 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,994 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 1,159 篇 软件工程
    • 542 篇 信息与通信工程
    • 278 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 203 篇 控制科学与工程
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 125 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 95 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 64 篇 化学工程与技术
    • 52 篇 安全科学与工程
    • 42 篇 建筑学
  • 910 篇 理学
    • 529 篇 数学
    • 218 篇 生物学
    • 196 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 74 篇 化学
  • 561 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 243 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 94 篇 法学
    • 59 篇 社会学
  • 71 篇 医学
    • 58 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 21 篇 军事学
  • 10 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 93 篇 accuracy
  • 76 篇 computational mo...
  • 76 篇 training
  • 64 篇 data models
  • 60 篇 deep learning
  • 60 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 privacy
  • 43 篇 neural networks
  • 42 篇 security
  • 42 篇 robustness
  • 41 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 predictive model...
  • 38 篇 optimization
  • 37 篇 authentication

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 156 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 63 篇 computer network...
  • 58 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 40 篇 school of comput...
  • 37 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...
  • 35 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 46 篇 zhao yao
  • 36 篇 zhou deyu
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 25 篇 zhang min-ling
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 19 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe
  • 16 篇 wang jin
  • 15 篇 zhenrong zhang

语言

  • 2,733 篇 英文
  • 176 篇 其他
  • 121 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3018 条 记 录,以下是2981-2990 订阅
排序:
A new type of digital multisignature
A new type of digital multisignature
收藏 引用
9th International Conference on computer Supported Cooperative Work in Design 2005
作者: Wang, Ying-Long Wang, Lian-Hai School of Information Science and Engineering Shandong University Jinan China Key Laboratory for Computer Network of Shandong Province Jinan China
information security is very important in CSCW and digital signature is one of the valid methods to resolve these problems. Based on researches on multisignature and proxy signature, we present a new type of signature... 详细信息
来源: 评论
Modeling the intrusion by using capability of attackers
Modeling the intrusion by using capability of attackers
收藏 引用
International Conference on Machine Learning and Cybernetics, ICMLC 2005
作者: Wang, Liang-Min Zhang, Jian-Ming Ma, Jian-Fenc Department of Computer Science Jiangsu University Zhenjiang 212013 China Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University 710071 China
Modeling the intrusion is an open problem which is necessary to be solved in Intrusion Tolerance System. A model of state transition and its constructing algorithm is presented which is described with the capability o... 详细信息
来源: 评论
A new approach for early detection of internet worms based on connection degree
A new approach for early detection of internet worms based o...
收藏 引用
International Conference on Machine Learning and Cybernetics, ICMLC 2005
作者: Bo, Chen Bin-Xingfang Yun, Xiao-Chun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin 150001 China National Computer Network and Information System Security Administration Center Beijing 100031 China
In recent years, internet-scale worm incidents occurred many times. People wonder at the speediness of the worm spread and the severe damage to the internet. So people began to find methods to detect worms as quickly ... 详细信息
来源: 评论
Ubicast: An enhanced application-level multicast protocol
Ubicast: An enhanced application-level multicast protocol
收藏 引用
6th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005
作者: Chu, Zi Yang, Yin-Yin Tu, Hao Kong, Wei-Ning Department of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing 210096 China
This paper presents Ubicast, an enhanced application-level multicast protocol. Ubicast is built upon Pastry, a scalable and self-organizing peer-to-peer substrate overlay, and leverages its merits of reliable applicat... 详细信息
来源: 评论
An enhanced application-level multicast protocol: A Qos perspective
An enhanced application-level multicast protocol: A Qos pers...
收藏 引用
8th International Symposium on Parallel Architectures, Algorithms and networks, I-SPAN 2005
作者: Chu, Zi Yang, Yin-Yin Department of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing 210096 China
Ubicast, an enhanced application-level multicast protocol, is presented in this paper. It is built upon Pastry, a robust and self-organizing peer-to-peer substrate overlay, and leverages its merits of reliable applica... 详细信息
来源: 评论
New methods to construct cheating immune multisecret sharing scheme
收藏 引用
1st SKLOIS Conference on information Security and Cryptology, CISC 2005
作者: Ma, Wen Ping Zhang, Fu Tai Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Mathematics and Computer Science Nanjing Normal University Nanjing 210097 China
In this paper, the constructions of cheating immune secret sharing and multisecret sharing are studied. Based on the theories of matrix and linear block codes over finite field, some new methods to construct cheating ... 详细信息
来源: 评论
Study of secure complicated information system architecture model
Study of secure complicated information system architecture ...
收藏 引用
1st International Conference on Semantics, Knowledge and Grid, SKG 2005
作者: Wang, Kun Su, Ruidan Li, Zengxin Cai, Zhen Zhou, Lihua Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China National Info Security Engineering and Technology Research Center Beijing 100093 China
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ... 详细信息
来源: 评论
A mathematical approach to disaster recovery planning
A mathematical approach to disaster recovery planning
收藏 引用
1st International Conference on Semantics, Knowledge and Grid, SKG 2005
作者: Wang, Kun Yin, Zhonghai Yuan, Feng Zhou, Lihua Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China National Info Security Engineering and Technology Research Center Beijing 100093 China
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u... 详细信息
来源: 评论
Packet-level adaptive sampling on multi-fluctuation scale traffic
Packet-level adaptive sampling on multi-fluctuation scale tr...
收藏 引用
International Conference on Communications, Circuits and Systems (ICCCAS)
作者: Li-Bo Xu Guo-Xin Wu Jian-Fei Li Key Laboratory of Computer Network and Information Integration South-East University Nanjing China
In high-speed Internet links, an effective and efficient packet sampling technology in traffic measurement becomes more and more indispensable for its benefits of reducing data quantity and saving various resources. W... 详细信息
来源: 评论
E-μTESLA: An efficient broadcast authentication protocol for wireless sensor network
收藏 引用
Journal of Computational information Systems 2005年 第3期1卷 433-438页
作者: Wang, Liang-Min Zhang, Jian-Ming Zhan, Yong-Zhao Ma, Jian-Feng Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China The Computer School Jiangsu University Zhenjiang 212013 China
Due to wide application of the wireless sensor network (WSN), the WSN security problems have become very critical. In broadcast authentication mechanisms, the traditional protocols are confronted with large challenges... 详细信息
来源: 评论