咨询与建议

限定检索结果

文献类型

  • 2,809 篇 会议
  • 2,358 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,170 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,455 篇 工学
    • 2,599 篇 计算机科学与技术...
    • 2,076 篇 软件工程
    • 923 篇 信息与通信工程
    • 446 篇 电气工程
    • 366 篇 电子科学与技术(可...
    • 358 篇 控制科学与工程
    • 299 篇 生物工程
    • 285 篇 网络空间安全
    • 196 篇 机械工程
    • 152 篇 光学工程
    • 139 篇 仪器科学与技术
    • 125 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 96 篇 化学工程与技术
    • 88 篇 交通运输工程
    • 88 篇 安全科学与工程
    • 82 篇 建筑学
    • 75 篇 土木工程
  • 1,497 篇 理学
    • 905 篇 数学
    • 321 篇 物理学
    • 321 篇 生物学
    • 279 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 105 篇 化学
  • 893 篇 管理学
    • 533 篇 管理科学与工程(可...
    • 393 篇 图书情报与档案管...
    • 179 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 104 篇 医学
    • 86 篇 临床医学
    • 77 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 61 篇 经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 188 篇 feature extracti...
  • 161 篇 semantics
  • 139 篇 accuracy
  • 131 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 103 篇 authentication
  • 103 篇 security
  • 99 篇 federated learni...
  • 96 篇 privacy
  • 94 篇 deep learning
  • 94 篇 information secu...
  • 92 篇 protocols
  • 79 篇 data models
  • 72 篇 cloud computing
  • 68 篇 robustness
  • 65 篇 object detection
  • 65 篇 neural networks
  • 63 篇 machine learning
  • 62 篇 optimization

机构

  • 259 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 161 篇 state key labora...
  • 160 篇 school of comput...
  • 144 篇 school of comput...
  • 118 篇 school of cyber ...
  • 83 篇 institute of inf...
  • 81 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 63 篇 shandong provinc...
  • 54 篇 information secu...
  • 53 篇 peng cheng labor...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 50 篇 key laboratory o...
  • 48 篇 shandong fundame...
  • 46 篇 key laboratory o...
  • 45 篇 college of compu...
  • 44 篇 school of comput...

作者

  • 39 篇 yang xiaoyuan
  • 38 篇 cao xiaochun
  • 36 篇 yang yang
  • 36 篇 huang qingming
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 33 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 yichuan wang
  • 27 篇 xu an wang
  • 27 篇 xiaoyuan yang
  • 26 篇 xiaoming wu
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 23 篇 min-ling zhang
  • 23 篇 yang jian
  • 23 篇 zhang min-ling
  • 22 篇 ma jianfeng
  • 22 篇 ma xiao

语言

  • 4,416 篇 英文
  • 634 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5170 条 记 录,以下是4971-4980 订阅
排序:
Predictive algorithm of handoff in heterogeneous wireless networks
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第1 A期30卷 63-67页
作者: Kang, Ya-Bo Xu, Kun Shen, Yu-Long Ma, Jian-Feng Communication Engineering Institute of Xidian University Xi'an 710071 China Key Laboratory of Computer Networks and Information Security Ministry of Education Xi'an 710071 China
In view of the problem that mobile terminal handoffs among wireless heterogeneous networks, a predictive algorithm of handoff in teminal was proposed. The cost function, the algorithm of normalized network parameters,... 详细信息
来源: 评论
A Provable Secure ID-Based Explicit Authenticated key Agreement Protocol Without Random Oracles
收藏 引用
Journal of computer Science & Technology 2008年 第5期23卷 832-842页
作者: 田海博 Willy Susilo 明洋 王育民 School of Information Science and Technology Sun Yat-Sen University Guangdong Key Laboratory of Information Security Technology Centre for Computer and Information Security Research (CCISR) School of Computer Science and Software Engineering University of Wollongong School of Information Engineering Chang'an University State Key Laboratory on ISN Xidian University
In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key confirmatio... 详细信息
来源: 评论
Dynamic evolution model of short message complex network
收藏 引用
Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University 2009年 第6期43卷 5-9页
作者: Sun, Qindong Sun, Yahong Guan, Xiaohong Wang, Qian School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China MOE Key Laboratory for Intelligent and Network Security Xi'an Jiaotong University Xi'an 710049 China
The law of SMS (short message service) network growth is analyzed to understand the evolution of SMS communication network, and the deficiencies of existing complex network models that are used to describe real SMS ne... 详细信息
来源: 评论
Combining opportunistic routing with dynamic source routing for wireless mesh networks
Combining opportunistic routing with dynamic source routing ...
收藏 引用
IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2009)
作者: Qiang Shen Xuming Fang Sunmyeng Kim Rong He High Performance Network Lab Institute of Acoustics Chinese Academy and Sciences Beijing China Provincial Key Laboratory of Information Coding and Transmission Southwest Jiaotong University Chengdu China School of Computer and Software Engineering Kumoh National Institute of Technology Gyeongbuk South Korea
Routing in wireless mesh networks presents a great challenge due to unreliable wireless links and collisions. Recently, a new routing method, opportunistic routing (OR), is proposed to deal with them by exploiting bro...
来源: 评论
Algorithm for sensing insider threat based on cloud model
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2009年 第4期32卷 784-792页
作者: Zhang, Hong-Bin Pei, Qing-Qi Ma, Jian-Feng Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China Institute of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang 050054 China
Using the access control relationship, the partial-order structures of subjects and objects in the system and their mapping relationship are defined, and a hierarchy-mapping based insider threat model is developed on ... 详细信息
来源: 评论
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer networks
收藏 引用
Transactions of Tianjin University 2008年 第1期14卷 66-72页
作者: 王方伟 张运凯 马建峰 Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Network Center Hebei Normal University
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... 详细信息
来源: 评论
Novel evidence combination method based on proportional conjunctive and complementary pooling criterion
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2009年 第1期37卷 95-100页
作者: Lang, Feng-Hua Gu, Li-Ze Yang, Yi-Xian Niu, Xin-Xin Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
To solve the drawbacks of Dempster rule and improved rule of combination, a novel evidence combination method based on proportional conjunctive and complementary pooling criterion was presented. Firstly, the advantage... 详细信息
来源: 评论
Cryptanalysis of a Type of CRT-Based RSA Algorithms
收藏 引用
Journal of computer Science & Technology 2008年 第2期23卷 214-221页
作者: 秦宝东 李明 孔凡玉 College of Computer Science and Technology Southwest University of Science and TechnologyMianyang 621010China Institute of Network Security Shandong UniversityJinan 250100China Key Laboratory of Cryptographic Technology and Information SecurityJinan 250100China
It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is ca... 详细信息
来源: 评论
Overview security analysis of 3G authentication protocols and technical specifications
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2009年 第SUPPL. 2期49卷 2193-2199页
作者: Cao, Chenlei Zhang, Ru Niu, Xinxin Zhou, Linna Zhang, Zhentao Information Security Centre of State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China Department of Electronic Engineering Tsinghua University Beijing 100084 China National Cyber-Net Security Ltd Beijing 100088 China
This paper presents an analysis of 3GPP (3rd generation partnership project) security protocols and related technical specifications to further development of the 3G (3rd-generation) security protocol standards. A mat... 详细信息
来源: 评论
Design of high-speed network intrusion detection system architecture
收藏 引用
Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology 2009年 第SUPPL. 1期41卷 198-200页
作者: Yao, Wen-Bin Wang, Cong Liu, Jian-Yi Si, Yan-Fang Yang, Yi-Xian National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Department of Computer Science and Technology Harbin Engineering University Harbin 150001 China
Parallel approach is an important way to improve the performance of networked based intrusion detection system. A parallel architecture of intrusion detection system based on the ideas of combining twice data-flow par... 详细信息
来源: 评论