咨询与建议

限定检索结果

文献类型

  • 24 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 31 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25 篇 工学
    • 19 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 5 篇 信息与通信工程
    • 2 篇 机械工程
    • 2 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 化学工程与技术
    • 1 篇 农业工程
    • 1 篇 生物工程
  • 13 篇 理学
    • 10 篇 数学
    • 2 篇 地质学
    • 2 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 8 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学

主题

  • 4 篇 intrusion detect...
  • 4 篇 network security
  • 2 篇 image segmentati...
  • 2 篇 visualization
  • 2 篇 image recognitio...
  • 1 篇 outlier detectio...
  • 1 篇 cyber security
  • 1 篇 adaptive systems
  • 1 篇 software visuali...
  • 1 篇 separation
  • 1 篇 antenna arrays
  • 1 篇 clustering
  • 1 篇 class diagram
  • 1 篇 relays
  • 1 篇 tcpdump
  • 1 篇 noise measuremen...
  • 1 篇 human computer i...
  • 1 篇 signal to noise ...
  • 1 篇 hypergraph
  • 1 篇 intuitive fuzzy

机构

  • 8 篇 lab of computer ...
  • 7 篇 lab. of computer...
  • 5 篇 school of mechat...
  • 4 篇 lab. for compute...
  • 3 篇 beijing institut...
  • 2 篇 department of in...
  • 2 篇 beijing aviation...
  • 2 篇 college of infor...
  • 2 篇 beijing laborato...
  • 2 篇 school of comput...
  • 1 篇 national mobile ...
  • 1 篇 department of ne...
  • 1 篇 the chien-shiung...
  • 1 篇 the school of ma...
  • 1 篇 state key lab of...
  • 1 篇 lab of computer ...
  • 1 篇 department of bi...
  • 1 篇 college of infor...
  • 1 篇 courant institut...
  • 1 篇 algorithm lab ch...

作者

  • 8 篇 changzhen hu
  • 5 篇 hu changzhen
  • 4 篇 shuping yao
  • 4 篇 wang zhigang
  • 4 篇 zhigang wang
  • 3 篇 wu peng
  • 2 篇 yan huaizhi
  • 2 篇 jiadong ren
  • 2 篇 xiaoyin wang
  • 2 篇 junhua chen
  • 2 篇 yinzhao li
  • 2 篇 guoqiang wang
  • 2 篇 zhongyang kan
  • 2 篇 wang guoqiang
  • 2 篇 lu fang
  • 1 篇 tian donghai
  • 1 篇 jianqiao wang
  • 1 篇 wang ran
  • 1 篇 min lin
  • 1 篇 wang jianqiao

语言

  • 28 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"机构=Lab of Computer Network Defense Technology"
31 条 记 录,以下是11-20 订阅
排序:
NetVis: A network Security Management Visualization Tool Based On Treemap
NetVis: A Network Security Management Visualization Tool Bas...
收藏 引用
The 2nd IEEE International Conference on Advanced computer Control(第二届先进计算机控制国际会议 ICACC 2010)
作者: Zhongyang Kan Xiaolong Huang Changzhen Hu Zhigang Wang Guoqiang Wang Lab of Computer Network Defense Technology Beijing Institute of Technology Lab of Computer Network Defense Technology Beijing Institute of Technology School of Mechatronical E Lab of Computer Network Defense Technology Beijing Institute of Technology Beijing Laboratory of Int
With the rapid development of Internet and the expanding application fields of network applications, it is not enough to maintain the network security only depend on those professional network technical administrators... 详细信息
来源: 评论
Prediction of specific region cloud cover based on RBF neural networks
Prediction of specific region cloud cover based on RBF neura...
收藏 引用
2010 2nd IITA Conference on Geoscience and Remote Sensing, IITA-GRS 2010
作者: Lu, Fang Wang, Zhigang Beijing Institute of Applied Meteorology Beijing China School of Mechatronical Engineering Beijing Institute of Technology Beijing China Lab. of Computer Network Defense Technology Beijing Institute of Technology Beijing China
This paper presents a method based on RBF neural networks to predict the specific region cloud cover, which has the feature of time serial and nonlinear. Using this method, we can train the RBF neural networks and fin... 详细信息
来源: 评论
JCHVT: A kind of software visualization method for Java code
JCHVT: A kind of software visualization method for Java code
收藏 引用
2010 International Conference on computer Application and System Modeling, ICCASM 2010
作者: Wang, Guoqiang Hu, Changzhen Wang, Zhigang Zhen, Jun Kan, Zhongyang Lab of Computer Network Defense Technology Beijing Institute of Technology Beijing China Beijing Laboratory of Intelligent Information Technology Beijing Institute of Technology Beijing China Beijing Institute of Technology School of Mechatronical Engineering Beijing China
Java Code Hierarchical Visualization Tool (JCHVT) is a software visualization system oriented to Java source code, which has been designed on the concept of service and with reference to Class diagram and Polymetric v... 详细信息
来源: 评论
JCHVT: A Kind of Software Visualization Method for Java Code
JCHVT: A Kind of Software Visualization Method for Java Code
收藏 引用
The 2010 International Conference on computer Application and System Modeling(2010计算机应用与系统建模国际会议 ICCASM 2010)
作者: Changzhen Hu Guoqiang Wang Zhongyang Kan Zhigang Wang Jun Zhen Lab of Computer Network Defense Technology Beijing Institute of Technology Lab of Computer Network Defense Technology Beijing Institute of Technology School of Mechatronical Beijing Laboratory of Intelligent Information Technology Beijing Institute of Technology
Java Code Hierarchical Visualization Tool (JCHVT) is a software visualization system oriented to Java source code, which has been designed on the concept of service and with reference to Class diagram and Polymetric v... 详细信息
来源: 评论
Rule of minimum fractal dimension for GPR ground bounce removal
收藏 引用
Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument 2010年 第8 SUPPL.期31卷 123-127页
作者: Shen, Jiaquan Yan, Huaizhi School of Mechatronical Engineering Beijing Institute of Technology Beijing 100081 China CPLA Air Defense Forces Command Academy Zhengzhou 450052 China Lab. for Computer Network Defense Technology Beijing Institute of Technology Beijing 100081 China
For the problem of the imprecise estimation of the reference of GPR ground bounce wave and relying on a priori knowledge, the criteria on minimum fractal dimension is introduced to select the reference to the ground b... 详细信息
来源: 评论
Image Retrieval Approach Based on Intuitive Fuzzy Set Combined with Genetic Algorithm
收藏 引用
Journal of Beijing Institute of technology 2009年 第1期18卷 60-64页
作者: 王潇茵 徐卫华 胡昌振 Lab of Computer Network Defense Technology Beijing Institute of Technology Automation Station of Army Aviation Department of the General Staff
Aiming at shortcomings of traditional image retrieval systems, a new image retrieval approach based on color features of image combining intuitive fuzzy theory with genetic algorithm is proposed. Each image is segment... 详细信息
来源: 评论
Security decision making based on domain partitional Markov decision process
Security decision making based on domain partitional Markov ...
收藏 引用
2009 International Conference on Information Engineering and computer Science, ICIECS 2009
作者: He, Hu Shuping, Yao Wu, Peng Lab. for Computer Network Defense Technology Beijing Institute of Technology Beijing China
the research proposed an approach that based on Domain Partitional Markov Decision Process to make decisions about the protection and defense against cyber attacks. We partitioned the network into several security dom... 详细信息
来源: 评论
An adult image recognizing algorithm based on naked body detection
An adult image recognizing algorithm based on naked body det...
收藏 引用
2009 Second ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009
作者: Xiaoyin, Wang Changzhen, Hu Shuping, Yao Lab. of Computer Network Defense Technology Beijing Institute of Technology Beijing China
The nude image is an important part in adult images spreading on the Internet. A new recognizing algorithm of nude image based on the navel and body feature is proposed in this paper. The algorithm considers the naked... 详细信息
来源: 评论
General worm propagation model forwireless ad hoc networks
General worm propagation model forwireless ad hoc networks
收藏 引用
2009 2nd IEEE International Conference on computer Science and Information technology, ICCSIT 2009
作者: Junhua, Chen Shengjun, Wei Wu, Peng School of Computer Science and Technology Beijing Institute of Technology Beijing China Lab for Computer Network Defense Technology Beijing Institute of Technology Beijing China
The popularity of wireless communication networks makes them an attractive target to the creators of worms and other malicious code. Indeed, recently a number of worms designed specifically to spread via these wireles... 详细信息
来源: 评论
Research on attack intention recognition based on graphical model
Research on attack intention recognition based on graphical ...
收藏 引用
5th International Conference on Information Assurance and Security, IAS 2009
作者: Wu, Peng Zhigang, Wang Junhua, Chen Lab. for Computer Network Defense Technology Beijing Institute of Technology Beijing China School of Computer Science Beijing Institute of Technology Beijing China
Intention recognition is the ability to predict an opposing force's high level goals. Knowing an attacker's intention can support the decision-making of the network security administrators. Furthermore Intent ... 详细信息
来源: 评论