咨询与建议

限定检索结果

文献类型

  • 24 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 31 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25 篇 工学
    • 19 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 5 篇 信息与通信工程
    • 2 篇 机械工程
    • 2 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 化学工程与技术
    • 1 篇 农业工程
    • 1 篇 生物工程
  • 13 篇 理学
    • 10 篇 数学
    • 2 篇 地质学
    • 2 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 8 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学

主题

  • 4 篇 intrusion detect...
  • 4 篇 network security
  • 2 篇 image segmentati...
  • 2 篇 visualization
  • 2 篇 image recognitio...
  • 1 篇 outlier detectio...
  • 1 篇 cyber security
  • 1 篇 adaptive systems
  • 1 篇 software visuali...
  • 1 篇 separation
  • 1 篇 antenna arrays
  • 1 篇 clustering
  • 1 篇 class diagram
  • 1 篇 relays
  • 1 篇 tcpdump
  • 1 篇 noise measuremen...
  • 1 篇 human computer i...
  • 1 篇 signal to noise ...
  • 1 篇 hypergraph
  • 1 篇 intuitive fuzzy

机构

  • 8 篇 lab of computer ...
  • 7 篇 lab. of computer...
  • 5 篇 school of mechat...
  • 4 篇 lab. for compute...
  • 3 篇 beijing institut...
  • 2 篇 department of in...
  • 2 篇 beijing aviation...
  • 2 篇 college of infor...
  • 2 篇 beijing laborato...
  • 2 篇 school of comput...
  • 1 篇 national mobile ...
  • 1 篇 department of ne...
  • 1 篇 the chien-shiung...
  • 1 篇 the school of ma...
  • 1 篇 state key lab of...
  • 1 篇 lab of computer ...
  • 1 篇 department of bi...
  • 1 篇 college of infor...
  • 1 篇 courant institut...
  • 1 篇 algorithm lab ch...

作者

  • 8 篇 changzhen hu
  • 5 篇 hu changzhen
  • 4 篇 shuping yao
  • 4 篇 wang zhigang
  • 4 篇 zhigang wang
  • 3 篇 wu peng
  • 2 篇 yan huaizhi
  • 2 篇 jiadong ren
  • 2 篇 xiaoyin wang
  • 2 篇 junhua chen
  • 2 篇 yinzhao li
  • 2 篇 guoqiang wang
  • 2 篇 zhongyang kan
  • 2 篇 wang guoqiang
  • 2 篇 lu fang
  • 1 篇 tian donghai
  • 1 篇 jianqiao wang
  • 1 篇 wang ran
  • 1 篇 min lin
  • 1 篇 wang jianqiao

语言

  • 28 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"机构=Lab of Computer Network Defense Technology"
31 条 记 录,以下是1-10 订阅
Image Retrieval Approach Based on Intuitive Fuzzy Set Combined with Genetic Algorithm
收藏 引用
Journal of Beijing Institute of technology 2009年 第1期18卷 60-64页
作者: 王潇茵 徐卫华 胡昌振 Lab of Computer Network Defense Technology Beijing Institute of Technology Automation Station of Army Aviation Department of the General Staff
Aiming at shortcomings of traditional image retrieval systems, a new image retrieval approach based on color features of image combining intuitive fuzzy theory with genetic algorithm is proposed. Each image is segment... 详细信息
来源: 评论
Security decision making based on domain partitional Markov decision process
Security decision making based on domain partitional Markov ...
收藏 引用
2009 International Conference on Information Engineering and computer Science, ICIECS 2009
作者: He, Hu Shuping, Yao Wu, Peng Lab. for Computer Network Defense Technology Beijing Institute of Technology Beijing China
the research proposed an approach that based on Domain Partitional Markov Decision Process to make decisions about the protection and defense against cyber attacks. We partitioned the network into several security dom... 详细信息
来源: 评论
An adult image recognizing algorithm based on naked body detection
An adult image recognizing algorithm based on naked body det...
收藏 引用
2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009
作者: Xiaoyin, Wang Changzhen, Hu Shuping, Yao Lab. of Computer Network Defense Technology Beijing Institute of Technology Beijing China
The nude image is an important part in adult images spreading on the Internet. A new recognizing algorithm of nude image based on the navel and body feature is proposed in this paper. The algorithm considers the naked... 详细信息
来源: 评论
Study of cloud computing security based on private face recognition
Study of cloud computing security based on private face reco...
收藏 引用
International Conference on Computational Intelligence and Software Engineering
作者: Wang, Chenguang Yan, Huaizhi School of Software Beijing Institute of Technology Lab. of Computer Network Defense Technology Beijing 100081 China
Supporting study of a method to solve cloud computing security issue with private face recognition. The method has three parts: user part provides face images;cloud initialization part has a face subspace and template... 详细信息
来源: 评论
An adaptive modeling for security infrastructure fault response
An adaptive modeling for security infrastructure fault respo...
收藏 引用
ISI 2007: 2007 IEEE Intelligence and Security Informatics
作者: Zhongjie, Cui Shuping, Yao Lab. of Computer Network Defense Technology Beijing Institute of Technology Haidian District Beijing 100081 China
Based on analysis of inherent limitations in existing security response decision-making systems, a dynamic adaptive fault response model is presented Several security fault levels were found, which comprise the basic ... 详细信息
来源: 评论
General worm propagation model forwireless ad hoc networks
General worm propagation model forwireless ad hoc networks
收藏 引用
2009 2nd IEEE International Conference on computer Science and Information technology, ICCSIT 2009
作者: Junhua, Chen Shengjun, Wei Wu, Peng School of Computer Science and Technology Beijing Institute of Technology Beijing China Lab for Computer Network Defense Technology Beijing Institute of Technology Beijing China
The popularity of wireless communication networks makes them an attractive target to the creators of worms and other malicious code. Indeed, recently a number of worms designed specifically to spread via these wireles... 详细信息
来源: 评论
Research on attack intention recognition based on graphical model
Research on attack intention recognition based on graphical ...
收藏 引用
5th International Conference on Information Assurance and Security, IAS 2009
作者: Wu, Peng Zhigang, Wang Junhua, Chen Lab. for Computer Network Defense Technology Beijing Institute of Technology Beijing China School of Computer Science Beijing Institute of Technology Beijing China
Intention recognition is the ability to predict an opposing force's high level goals. Knowing an attacker's intention can support the decision-making of the network security administrators. Furthermore Intent ... 详细信息
来源: 评论
IP traceback based probabilistic packet marking and randomized network coding
IP traceback based probabilistic packet marking and randomiz...
收藏 引用
2nd International Workshop on computer Science and Engineering, WCSE 2009
作者: Wang, Xiao-Jing Wei, Sheng-Jun Lab. of Computer Network Defense Technology Beijing Institute of Technology Beijing China Xi'an Politics Institute Xi'an China
A novel approach for IP traceback is proposed, which combines probabilistic packet marking and network coding techniques. Dissimilar to prior PPM schemes, our approach stores random linear combinations of router label... 详细信息
来源: 评论
VisSRA: Visualizing snort rules and alerts
VisSRA: Visualizing snort rules and alerts
收藏 引用
4th International Conference on Computational Intelligence and Communication networks, CICN 2012
作者: Hong, Xiaojin Hu, Changzhen Wang, Zhigang Wang, Guoqiang Wan, Ying Lab. of Computer Network Defense Technology Beijing Institute of Technology Beijing China School of Mechatronical Engineering Beijing Institute of Technology Beijing China
Snort is a rule-based intrusion detection system, applying defined rules to inspect suspicious packets in network. An alert will be generated if an alert rule is triggered. Analysis of the relation between rules and a... 详细信息
来源: 评论
Hierarchical distributed alert correlation model
Hierarchical distributed alert correlation model
收藏 引用
5th International Conference on Information Assurance and Security, IAS 2009
作者: Tian, Donghai Changzhen, Hu Qi, Yang Jianqiao, Wang Lab. for Computer Network Defense Technology Beijing Institute of Technology Beijing China Lab. for Database and Network Computing South China University of Technology Guangzhou China Zhejiang Education Institute Hangzhou China
Alert correlation is a promising technique in intrusion detection. It takes the alerts produced by intrusion detection systems and produces compact reports which provide a more succinct and high-level view of occurrin... 详细信息
来源: 评论