咨询与建议

限定检索结果

文献类型

  • 1,743 篇 会议
  • 1,347 篇 期刊文献

馆藏范围

  • 3,090 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,005 篇 工学
    • 1,479 篇 计算机科学与技术...
    • 1,156 篇 软件工程
    • 538 篇 信息与通信工程
    • 272 篇 电气工程
    • 213 篇 电子科学与技术(可...
    • 204 篇 控制科学与工程
    • 199 篇 生物工程
    • 135 篇 机械工程
    • 125 篇 网络空间安全
    • 99 篇 仪器科学与技术
    • 94 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 66 篇 化学工程与技术
    • 66 篇 交通运输工程
    • 63 篇 动力工程及工程热...
    • 54 篇 安全科学与工程
    • 42 篇 建筑学
  • 912 篇 理学
    • 525 篇 数学
    • 219 篇 生物学
    • 198 篇 物理学
    • 162 篇 统计学(可授理学、...
    • 81 篇 系统科学
    • 76 篇 化学
  • 559 篇 管理学
    • 340 篇 管理科学与工程(可...
    • 241 篇 图书情报与档案管...
    • 123 篇 工商管理
  • 93 篇 法学
    • 60 篇 社会学
  • 70 篇 医学
    • 57 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 31 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 150 篇 feature extracti...
  • 123 篇 semantics
  • 119 篇 accuracy
  • 89 篇 computational mo...
  • 85 篇 training
  • 82 篇 federated learni...
  • 70 篇 data models
  • 58 篇 deep learning
  • 53 篇 robustness
  • 49 篇 privacy
  • 48 篇 adaptation model...
  • 47 篇 protocols
  • 46 篇 transformers
  • 46 篇 neural networks
  • 46 篇 cryptography
  • 45 篇 optimization
  • 45 篇 data mining
  • 45 篇 security
  • 43 篇 visualization
  • 41 篇 authentication

机构

  • 265 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 158 篇 school of comput...
  • 85 篇 key laboratory o...
  • 67 篇 college of compu...
  • 66 篇 computer network...
  • 64 篇 shandong provinc...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 49 篇 beijing key labo...
  • 45 篇 institute of inf...
  • 41 篇 school of comput...
  • 40 篇 school of cyber ...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...
  • 36 篇 university of ch...
  • 35 篇 key laboratory o...
  • 33 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 xiaoming wu
  • 26 篇 min-ling zhang
  • 26 篇 guo wenzhong
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 xiangzhi liu
  • 19 篇 guang cheng
  • 19 篇 du bo
  • 19 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 15 篇 jianfeng ma

语言

  • 2,613 篇 英文
  • 381 篇 其他
  • 116 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3090 条 记 录,以下是3071-3080 订阅
排序:
A Mathematical Approach to Disaster Recovery Planning
A Mathematical Approach to Disaster Recovery Planning
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Kun Wang Zhonghai Yin Feng Yuan Lihua Zhou Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u... 详细信息
来源: 评论
Study of Secure Complicated information System Architecture Model
Study of Secure Complicated Information System Architecture ...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Kun Wang Ruidan Su Zengxin Li Zhen Cai Lihua Zhou Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ... 详细信息
来源: 评论
A Disaster Recovery System Model in an E-government System
A Disaster Recovery System Model in an E-government System
收藏 引用
IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)
作者: Kun Wang Lihua Zhou Zhen Cai Zengxin Li Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable com... 详细信息
来源: 评论
Authenticated public-key encryption based on elliptic curve
Authenticated public-key encryption based on elliptic curve
收藏 引用
International Conference on Embedded Software and Systems
作者: Yiliang Han Xiaoyuan Yang Yupu Hu Key Laboratory of Network and Information Security A.P.FDepartment of Electronic Technology Engineering College of A. P. F Xi'an China College of Computer Science Xidian University Xi'an China
An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm EC... 详细信息
来源: 评论
Improving the quality of 3D-QSAR by using flexible-ligand receptor models
Improving the quality of 3D-QSAR by using flexible-ligand re...
收藏 引用
作者: Pei, Jianfeng Chen, Hao Liu, Zhenming Han, Xiaofeng Wang, Qi Shen, Bin Zhou, Jiaju Lai, Luhua State Key Laboratory for Structural Chemistry of Stable and Unstable Species College of Chemistry and Molecular Engineering Peking University Beijing 100871 China Center for Theoretical Biology Peking University Beijing 100871 China Computer Network Information Center Chinese Academy of Sciences Beijing 100080 China Institute of Process Engineering Chinese Academy of Sciences Beijing 100080 China College of Chemistry and Molecular Engineering Peking University Beijing 100871 China
To address the problems associated with molecular conformations and alignments in the 3D-QSAR studies, we have developed the Flexible Ligand - Atomic Receptor Model (FLARM) 2.0 method. The FLARM 2.0 method has three u... 详细信息
来源: 评论
An enhanced application-level multicast protocol: a QoS perspective
An enhanced application-level multicast protocol: a QoS pers...
收藏 引用
International Symposium on Parallel Architectures, Algorithms and networks (ISPAN)
作者: Zi Chu Yin-yin Yang Key Laboratory of Computer Network and Information Integration Ministry of Education South-East University Nanjing China Southeast University Nanjing Jiangsu CN Dept. of Comput. Sci. & Eng. Southeast Univ. Nanjing China
Ubicast, an enhanced application-level multicast protocol, is presented in this paper. It is built upon Pastry, a robust and self-organizing peer-to-peer substrate overlay, and leverages its merits of reliable applica... 详细信息
来源: 评论
An approach to the formal verification of the three-principal cryptographic protocols
An approach to the formal verification of the three-principa...
收藏 引用
作者: Zhang, Yuqing Liu, Xiuying State Key Laboratory of Information Security GSCAS Beijing 100039 China National Computer Network Intrusion Protection Center GSCAS Beijing 100039 China
Based on the model checking theory, we derive the Running-Mode Analysis of three-principal cryptographic protocols from the Running-Mode Analysis of two-principal cryptographic protocols. To test this method, we analy... 详细信息
来源: 评论
Enhancing the content of the intrusion alerts using logic correlation
收藏 引用
Advanced Workshop on Content Computing, AWCC 2004
作者: Wang, Liang-Min Ma, Jian-Feng Zhan, Yong-Zhao The Key Laboratory of Computer Network and Information Security Xidian University Ministry of Education Xian710071 China The Computer School of Jiangsu Univ Zhenjiang212013 China
To solve the problem of the alert flooding and information semantics in the existing IDS, the approach using the logic correction to enhance the content of the alerts is presented. The Chronicle based on time interval... 详细信息
来源: 评论
A risk assessment approach for network information system
A risk assessment approach for network information system
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Yong-Zheng Zhang Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin Heilongjiang China Research Center of Computer Network and Information Security Technology Harbin Institute of Technology Harbin Heilongjiang China
Currently, risk assessment has been an effective technology of protecting network information system. In order to achieve more accurate result, a new assessment approach is presented in this paper. Our approach introd... 详细信息
来源: 评论
An architecture for intrusion detection using honey pot
An architecture for intrusion detection using honey pot
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Zhi-Hong Tian Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin Heilongjiang China National Computer Network and Information System Security Administration Center Beijing China
The most common shortcomings in the existing intrusion detection systems (IDSs) are information overload, unknown attacks, false positives and false negatives. We present the design of AAIDHP (an architecture for intr... 详细信息
来源: 评论