咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3601-3610 订阅
排序:
A Disaster Recovery System Model in an E-government System
A Disaster Recovery System Model in an E-government System
收藏 引用
IEEE International Conference on Parallel and Distributed computing, Applications and Technologies (PDCAT)
作者: Kun Wang Lihua Zhou Zhen Cai Zengxin Li Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable com... 详细信息
来源: 评论
Study of Secure Complicated Information System Architecture Model
Study of Secure Complicated Information System Architecture ...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Kun Wang Ruidan Su Zengxin Li Zhen Cai Lihua Zhou Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ... 详细信息
来源: 评论
A new approach for early detection of Internet worms based on connection degree
A new approach for early detection of Internet worms based o...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Chen Bo Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin China National Computer Network and Information System Security Administration Center Beijing China
In recent years, Internet-scale worm incidents occurred many times. People wonder at the speediness of the worm spread and the severe damage to the Internet. So people began to find methods to detect worms as quickly ... 详细信息
来源: 评论
Efficient secret sharing scheme realizing graph-based adversary structures
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2005年 第5期42卷 877-882页
作者: Guo, Yuanbo Ma, Jianfeng Wang, Yadi Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China School of Electronic Technology Information Engineering University of PLA Zhengzhou 450004 China School of Computing and Automatization Tianjin Polytechnic University Tianjin 300160 China
Most of the existing secret sharing schemes are constructed to realize general access structure, which is defined in term of authorized groups of participants, and is unable to be applied directly to the design of an ... 详细信息
来源: 评论
Authenticated public-key encryption based on elliptic curve
Authenticated public-key encryption based on elliptic curve
收藏 引用
International Conference on Embedded Software and Systems
作者: Yiliang Han Xiaoyuan Yang Yupu Hu Key Laboratory of Network and Information Security A.P.FDepartment of Electronic Technology Engineering College of A. P. F Xi'an China College of Computer Science Xidian University Xi'an China
An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm EC... 详细信息
来源: 评论
A risk assessment approach for network information system
A risk assessment approach for network information system
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Yong-Zheng Zhang Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin Heilongjiang China Research Center of Computer Network and Information Security Technology Harbin Institute of Technology Harbin Heilongjiang China
Currently, risk assessment has been an effective technology of protecting network information system. In order to achieve more accurate result, a new assessment approach is presented in this paper. Our approach introd... 详细信息
来源: 评论
The precaution of the network virus and the quantitative analysis of the epidemic situation
The precaution of the network virus and the quantitative ana...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Bai-Ling Wang Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin Heilongjiang China National Computer Network and Information System Security Administration Center Beijing China
Comparing with the traditional host virus, the network virus has more attack ability and is more infectious in open network environment. So it is necessary to set a national virus precaution system to detect and contr... 详细信息
来源: 评论
An architecture for intrusion detection using honey pot
An architecture for intrusion detection using honey pot
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Zhi-Hong Tian Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin Heilongjiang China National Computer Network and Information System Security Administration Center Beijing China
The most common shortcomings in the existing intrusion detection systems (IDSs) are information overload, unknown attacks, false positives and false negatives. We present the design of AAIDHP (an architecture for intr... 详细信息
来源: 评论
Dynamic right-sizing in FTP (drsFTP): Enhancing Grid performance in user-space
Dynamic right-sizing in FTP (drsFTP): Enhancing Grid perform...
收藏 引用
International Symposium on High Performance Distributed computing
作者: M.K. Gardner Wu-chun Feng M. Fisk Research & Development in Advanced Network Technology (RADIANT) Computer & Computational Sciences Division Los Alamos National Laboratory Los Alamos NM USA Network Security Team Network Engineering Group Computing Communications & Networking Division Los Alamos National Laboratory Los Alamos NM USA
With the advent of computational grids, networking performance over the wide-area network (WAN) has become a critical component in the grid infrastructure. Unfortunately, many high-performance grid applications only u... 详细信息
来源: 评论
Multisequence synthesis over an integral domain  1
收藏 引用
International Conference on Cryptography and Lattices, CaLC 2001
作者: Wang, Li-Ping Zhu, Yue-Fei State Key Laboratory of Information Security Graduate School University of Science and Technology of China Beijing100039 China Department of Network Engineering Information Engineering University Zhengzhou450002 China
We first give an extension of F[x]-lattice basis reduction algorithm to the polynomial ring R[x] where F is a field and R an arbitrary integral domain. So a new algorithm is presented for synthesizing minimum length l... 详细信息
来源: 评论