咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 179 篇 期刊文献

馆藏范围

  • 785 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 272 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 42 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 97 篇 数学
    • 39 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 adaptation model...
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 265 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 676 篇 英文
  • 107 篇 其他
  • 8 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
785 条 记 录,以下是761-770 订阅
排序:
DMAT: A new network and computer attack classification
收藏 引用
Journal of Engineering Science and technology Review 2013年 第5期6卷 101-106页
作者: Jiang, Wei Tian, Zhi-Hong Cui, Xiang College of Computer Science Beijing University of Technology Beijing 100124 China School of Computer National University of Defense Technology Changsha 410073 China Key Laboratory of Information and Network Security Ministry of Public Security Shanghai 201204 China School of Computer Science and Technology Harbin Institute of Technology Haerbin 150001 China The Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
With the rapid development of computer network and information technology, the Internet has been suffering from a variety of security attacks over the past few years. Attacks have become both numerous and complex, and... 详细信息
来源: 评论
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Liu, Shengli Weng, Jian Zhao, Yunlei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Software School Fudan University Shanghai 201203 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ... 详细信息
来源: 评论
Corrigendum to “A variable-length model for masquerade detection” [J. Syst. Softw. 85 (2012) 2470–2478]
收藏 引用
Journal of Systems and Software 2013年 第3期86卷 868-868页
作者: Xi Xiao Xinguang Tian Qibin Zhai Shutao Xia Graduate School at Shenzhen Tsinghua University 518055 Shenzhen China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences 100049 Beijing China Key Laboratory of Network Science and Technology Institute of Computing Technology Chinese Academy of Sciences 100190 Beijing China
来源: 评论
A secure message delivery scheme with path tracking for delay tolerant networks
A secure message delivery scheme with path tracking for dela...
收藏 引用
2012 1st IEEE International Conference on Communications in China, ICCC 2012
作者: Jia, Zhongtian Raffay, Muhammad Ali Li, Lixiang Lin, Xiaodong Yang, Yixian Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan 250022 China Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China Faculty of Business and Information Technology University of Ontario Institute of Technology Oshawa ON L1H 7K4 Canada
In delay tolerant networks (DTNs), message delivery is operated in an opportunistic way through store-carry and forward relaying, and every DTN node is in anticipation of cooperation for data forwarding from others. U... 详细信息
来源: 评论
A secure message delivery scheme with path tracking for delay tolerant networks
A secure message delivery scheme with path tracking for dela...
收藏 引用
IEEE International Conference on Communications in China (ICCC)
作者: Zhongtian Jia Muhammad Ali Raffay Lixiang Li Xiaodong Lin Yixian Yang Information Security Center Beijing University of Posts and Telecommunications China Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan Jinan China Faculty of Business and Information Technology Institute of Technology University of Ontario Oshawa ONT Canada
In delay tolerant networks (DTNs), message delivery is operated in an opportunistic way through store-carry and forward relaying, and every DTN node is in anticipation of cooperation for data forwarding from others. U... 详细信息
来源: 评论
Analysis on Token-Controlled Public Key Encryption
Analysis on Token-Controlled Public Key Encryption
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Changlu Lin Yong Li Sriramkrishnan Srinivasan Li Lu Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China Key Laboratory of Communication & Information Systems Beijing Municipal Commission of Education Beijing Jiaotong University Beijing China Department of Computing University of Surrey Guildford UK School of Computer Science University of Electronic Science and Technology Chengdu China
In this paper, we analyze on the use of token-controlled public key encryption (TCE)schemes. We argue that for many of the applications in some possibilities of application in financial or legal scenarios, for example... 详细信息
来源: 评论
Anomaly detection of user behavior based on DTMC with states of variable-length sequences
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第6期18卷 106-115页
作者: XIAO Xi XIA Shu-tao TIAN Xin-guang ZHAI Qi-bin Graduate School at Shenzhen Tsinghua University Shenzhen 518055 China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China Key Laboratory of Network Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
In anomaly detection, a challenge is how to model a user's dynamic behavior. Many previous works represent the user behavior based on fixed-length models. To overcome their shortcoming, we propose a novel method base... 详细信息
来源: 评论
An architecture description language based on dynamic description logics for self-healing systems
收藏 引用
International Journal of Advancements in computing technology 2012年 第18期4卷 89-96页
作者: Wang, Zhuxiao Peng, Hui Guo, Jing Wu, Kehe Cui, Wenchao Wang, Xiaofeng School of Control and Computer Engineering State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources North China Electric Power University Beijing 102206 China Education Technology Center Beijing International Studies University Beijing 100024 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China School of Control and Computer Engineering Institute of Electric Information Security Engineering Research Center of Power Information North China Electric Power University Beijing 102206 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
As biological systems exhibit adaptation, healing and robustness in the face of changing environmental behavior, this paradigm has actuated research dealing with the concept of self-healing systems, which attempt to h... 详细信息
来源: 评论
Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of Computer Science & technology 2010年 第6期25卷 1293-1304页
作者: 王怀习 朱岩 冯荣权 Stephen S.Yau LMAM School of Mathematical SciencesPeking University Electronic Engineering Institute Institute of Computer Science and Technology Peking University Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education Information Assurance Center and School of Computing Informatics and Decision Systems Engineering Arizona State University
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement ***... 详细信息
来源: 评论
Information system security function validating using model checking
Information system security function validating using model ...
收藏 引用
2010 2nd International Conference on Computer Engineering and technology, ICCET 2010
作者: Ma, Jianli Xu, Guoai Yang, Yixian Ji, Yong Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing China China Electronics System Engineering Computing station Beijing China
Information systems will be encountered more and more security threats due to the development of computer attack method and technology. Generally, different security policies are used to protect the sensitive informat... 详细信息
来源: 评论