咨询与建议

限定检索结果

文献类型

  • 2,809 篇 会议
  • 2,365 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,454 篇 工学
    • 2,599 篇 计算机科学与技术...
    • 2,076 篇 软件工程
    • 923 篇 信息与通信工程
    • 446 篇 电气工程
    • 366 篇 电子科学与技术(可...
    • 358 篇 控制科学与工程
    • 299 篇 生物工程
    • 285 篇 网络空间安全
    • 196 篇 机械工程
    • 152 篇 光学工程
    • 139 篇 仪器科学与技术
    • 125 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 96 篇 化学工程与技术
    • 88 篇 交通运输工程
    • 88 篇 安全科学与工程
    • 82 篇 建筑学
    • 75 篇 土木工程
  • 1,497 篇 理学
    • 904 篇 数学
    • 321 篇 物理学
    • 321 篇 生物学
    • 278 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 105 篇 化学
  • 893 篇 管理学
    • 533 篇 管理科学与工程(可...
    • 393 篇 图书情报与档案管...
    • 179 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 104 篇 医学
    • 86 篇 临床医学
    • 77 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 61 篇 经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 186 篇 feature extracti...
  • 161 篇 semantics
  • 137 篇 accuracy
  • 127 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 103 篇 authentication
  • 103 篇 security
  • 99 篇 federated learni...
  • 96 篇 privacy
  • 94 篇 deep learning
  • 94 篇 information secu...
  • 91 篇 protocols
  • 79 篇 data models
  • 71 篇 cloud computing
  • 68 篇 robustness
  • 65 篇 object detection
  • 65 篇 neural networks
  • 63 篇 machine learning
  • 62 篇 optimization

机构

  • 258 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 164 篇 state key labora...
  • 160 篇 school of comput...
  • 141 篇 school of comput...
  • 117 篇 school of cyber ...
  • 83 篇 institute of inf...
  • 80 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 63 篇 shandong provinc...
  • 54 篇 information secu...
  • 53 篇 peng cheng labor...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 50 篇 key laboratory o...
  • 49 篇 shandong fundame...
  • 46 篇 key laboratory o...
  • 44 篇 school of comput...
  • 44 篇 college of compu...

作者

  • 39 篇 cao xiaochun
  • 36 篇 yang yang
  • 36 篇 huang qingming
  • 36 篇 yang xiaoyuan
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 30 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 xu an wang
  • 27 篇 xiaoyuan yang
  • 26 篇 xiaoming wu
  • 26 篇 yichuan wang
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 24 篇 yang jian
  • 23 篇 min-ling zhang
  • 22 篇 ma jianfeng
  • 21 篇 wang wei
  • 21 篇 yang yixian

语言

  • 4,423 篇 英文
  • 634 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5177 条 记 录,以下是4981-4990 订阅
排序:
Combining opportunistic routing with dynamic source routing for wireless mesh networks
Combining opportunistic routing with dynamic source routing ...
收藏 引用
IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2009)
作者: Qiang Shen Xuming Fang Sunmyeng Kim Rong He High Performance Network Lab Institute of Acoustics Chinese Academy and Sciences Beijing China Provincial Key Laboratory of Information Coding and Transmission Southwest Jiaotong University Chengdu China School of Computer and Software Engineering Kumoh National Institute of Technology Gyeongbuk South Korea
Routing in wireless mesh networks presents a great challenge due to unreliable wireless links and collisions. Recently, a new routing method, opportunistic routing (OR), is proposed to deal with them by exploiting bro...
来源: 评论
Algorithm for sensing insider threat based on cloud model
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2009年 第4期32卷 784-792页
作者: Zhang, Hong-Bin Pei, Qing-Qi Ma, Jian-Feng Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China Institute of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang 050054 China
Using the access control relationship, the partial-order structures of subjects and objects in the system and their mapping relationship are defined, and a hierarchy-mapping based insider threat model is developed on ... 详细信息
来源: 评论
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer networks
收藏 引用
Transactions of Tianjin University 2008年 第1期14卷 66-72页
作者: 王方伟 张运凯 马建峰 Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Network Center Hebei Normal University
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... 详细信息
来源: 评论
Novel evidence combination method based on proportional conjunctive and complementary pooling criterion
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2009年 第1期37卷 95-100页
作者: Lang, Feng-Hua Gu, Li-Ze Yang, Yi-Xian Niu, Xin-Xin Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
To solve the drawbacks of Dempster rule and improved rule of combination, a novel evidence combination method based on proportional conjunctive and complementary pooling criterion was presented. Firstly, the advantage... 详细信息
来源: 评论
Cryptanalysis of a Type of CRT-Based RSA Algorithms
收藏 引用
Journal of computer Science & Technology 2008年 第2期23卷 214-221页
作者: 秦宝东 李明 孔凡玉 College of Computer Science and Technology Southwest University of Science and TechnologyMianyang 621010China Institute of Network Security Shandong UniversityJinan 250100China Key Laboratory of Cryptographic Technology and Information SecurityJinan 250100China
It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is ca... 详细信息
来源: 评论
Overview security analysis of 3G authentication protocols and technical specifications
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2009年 第SUPPL. 2期49卷 2193-2199页
作者: Cao, Chenlei Zhang, Ru Niu, Xinxin Zhou, Linna Zhang, Zhentao Information Security Centre of State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China Department of Electronic Engineering Tsinghua University Beijing 100084 China National Cyber-Net Security Ltd Beijing 100088 China
This paper presents an analysis of 3GPP (3rd generation partnership project) security protocols and related technical specifications to further development of the 3G (3rd-generation) security protocol standards. A mat... 详细信息
来源: 评论
Design of high-speed network intrusion detection system architecture
收藏 引用
Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology 2009年 第SUPPL. 1期41卷 198-200页
作者: Yao, Wen-Bin Wang, Cong Liu, Jian-Yi Si, Yan-Fang Yang, Yi-Xian National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Department of Computer Science and Technology Harbin Engineering University Harbin 150001 China
Parallel approach is an important way to improve the performance of networked based intrusion detection system. A parallel architecture of intrusion detection system based on the ideas of combining twice data-flow par... 详细信息
来源: 评论
Anonymous proxy authorization signature scheme with forward security
Anonymous proxy authorization signature scheme with forward ...
收藏 引用
International Conference on computer Science and Software engineering, CSSE 2008
作者: Xuanwu, Zhou Ping, Wei Key Laboratory of Network and Information Security APF Engineering College of the APF Xi'an 710086 China Key Laboratory of Network and Information Security Ministry of Education Xidian University Xi'an 710071 China
The paper analyzed the security threats and system flaws of present proxy authorization signatures, and a forward secure proxy authorization signature scheme with conditionally anonymity based on ECC (Elliptic Curves ... 详细信息
来源: 评论
New ECDSA-verifiable multi-receiver generalization signeryption
New ECDSA-verifiable multi-receiver generalization signerypt...
收藏 引用
10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008
作者: Yang, Xiaoyuan Li, Maotang Wei, Lixian Han, Yiliang Key Laboratory of Network and Information Security of APF Engineering College of APF Xi'an 710086
Multi-receiver signeryption is a new cryptographic primitive that simultaneously fulfills both the functions of signature and multi-receiver encryption. Generalized Multi-Receiver signeryption can provide authenticity... 详细信息
来源: 评论
Privacy preserving online spam filtering
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第1 A期30卷 145-149页
作者: Yang, Zhen Fan, Ke-Feng Lei, Jian-Jun School of Computer Beijing University of Technology Beijing 100124 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electronic Information Engineering Tianjin University Tianjin 300072 China
In text information processing field, with the rapid development of information technology and Internet, it was no longer difficult to collect large scale of corpus for training. Privacy preserving data mining was nee... 详细信息
来源: 评论