咨询与建议

限定检索结果

文献类型

  • 673 篇 会议
  • 344 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,018 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 681 篇 工学
    • 509 篇 计算机科学与技术...
    • 409 篇 软件工程
    • 106 篇 信息与通信工程
    • 71 篇 网络空间安全
    • 67 篇 控制科学与工程
    • 64 篇 电子科学与技术(可...
    • 57 篇 生物工程
    • 53 篇 电气工程
    • 30 篇 机械工程
    • 28 篇 光学工程
    • 24 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 17 篇 核科学与技术
    • 17 篇 生物医学工程(可授...
    • 15 篇 仪器科学与技术
    • 13 篇 材料科学与工程(可...
    • 11 篇 力学(可授工学、理...
    • 11 篇 建筑学
  • 388 篇 理学
    • 184 篇 数学
    • 159 篇 物理学
    • 68 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 35 篇 系统科学
    • 26 篇 化学
  • 149 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 26 篇 法学
    • 19 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 10 篇 经济学
  • 8 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 26 篇 feature extracti...
  • 24 篇 security
  • 23 篇 deep learning
  • 21 篇 semantics
  • 19 篇 software
  • 19 篇 cryptography
  • 18 篇 machine learning
  • 18 篇 malware
  • 13 篇 training
  • 12 篇 network topology
  • 12 篇 optimization
  • 12 篇 computational mo...
  • 12 篇 data models
  • 11 篇 gravitational wa...
  • 11 篇 data mining
  • 11 篇 algorithm design...
  • 11 篇 heuristic algori...
  • 10 篇 protocols
  • 9 篇 computer archite...

机构

  • 632 篇 state key labora...
  • 39 篇 state key labora...
  • 20 篇 institute for pl...
  • 19 篇 university of so...
  • 18 篇 université libre...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 17 篇 scuola di ingegn...
  • 17 篇 infn sezione di ...
  • 17 篇 dipartimento di ...
  • 17 篇 università degli...
  • 17 篇 infn trento inst...
  • 17 篇 max planck insti...
  • 17 篇 université paris...
  • 17 篇 universiteit gen...
  • 17 篇 gran sasso scien...
  • 17 篇 european gravita...
  • 17 篇 indian institute...
  • 16 篇 advanced technol...
  • 16 篇 king’s college l...

作者

  • 42 篇 luo xiangyang
  • 29 篇 xiangyang luo
  • 25 篇 shan zheng
  • 21 篇 pang jianmin
  • 20 篇 jianmin pang
  • 19 篇 zheng shan
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 t. akutsu
  • 18 篇 fenlin liu
  • 18 篇 liu fudong
  • 17 篇 j. c. bayley
  • 17 篇 f. hellman
  • 17 篇 m. kinley-hanlon
  • 17 篇 t. mcrae
  • 17 篇 a. parisi
  • 17 篇 s. rowan

语言

  • 987 篇 英文
  • 19 篇 中文
  • 12 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Laboratory of Mathematical Engineering and Advanced Computing"
1018 条 记 录,以下是91-100 订阅
排序:
Efficient client-to-client password authenticated key exchange based on RSA
Efficient client-to-client password authenticated key exchan...
收藏 引用
5th IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013
作者: Ma, Chuangui Wei, Fushan Gao, Fengxiu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The design of secure password authenticated key exchange (PAKE) protocols with RSA is a nontrivial hard work. Until now there have been only a few secure PAKE protocols based on RSA and most of them work in the two-pa... 详细信息
来源: 评论
Parent-based Powershell Script Fusion Technology
Parent-based Powershell Script Fusion Technology
收藏 引用
2021 International Symposium on Computer Technology and Information Science, ISCTIS 2021
作者: Cheng, Sipeng Sha, Zihan Yu, Pu Bu, Wenjuan Huo, Guovu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
To address the characteristics of traditional obfuscation methods such as single approach and obvious features, a Parent-based Powershell Script Fusion Technology is proposed based on code fusion. This technology uses... 详细信息
来源: 评论
One wide-sense circuit tree per traffic class based inter-domain multicast
One wide-sense circuit tree per traffic class based inter-do...
收藏 引用
2013 IEEE 8th International Conference on Networking, Architecture and Storage, NAS 2013
作者: Yue, Chen Chaoling, Li Kaixiang, Huang Xiaobo, Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Traditional multicast protocol forms multicast trees rooted at different sources to forward packets. If the multicast sources and receivers are in different domains, these trees will produce a great number of multicas... 详细信息
来源: 评论
Practical Control Flow Integrity using Multi-Variant execution  20
Practical Control Flow Integrity using Multi-Variant executi...
收藏 引用
2020 International Conference on Internet computing for Science and engineering, ICICSE 2020 and the 13th International Conference on advanced Computer Theory and engineering, ICACTE 2020
作者: Yao, Dong Zhang, Zheng Zhang, Gaofei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The popularity of computers and networks brings many conveniences to our daily life but also brings a variety of security threats. The proliferation of attacks and the rapid spread of viruses make security researchers... 详细信息
来源: 评论
Bi-population genetic algorithm-based attack path discovery research in large-scale networks  4
Bi-population genetic algorithm-based attack path discovery ...
收藏 引用
4th World Conference on computing and Communication Technologies, WCCCT 2021
作者: Tairan, Hu Wenlong, Gao Tianyang, Zhou Yichao, Zang National Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
with the growth of network scale, present researches on the attack path discovery often encounter the problem of search space explosion that results in fails. To tackle the problem of attack path discovery for large-s... 详细信息
来源: 评论
Prediction Method of Attack Behavior Based on Stackelberg Security Game  5
Prediction Method of Attack Behavior Based on Stackelberg Se...
收藏 引用
5th IEEE International Conference on Computer and Communications, ICCC 2019
作者: Zhou, Tianyang Ge, Xiaoyue Zang, Yichao Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The essence of Network attack and Defense confrontation is the Game process between attacker and Defender. In the research of the existing network attack strategy, there is a priori hypothesis defect of equal status b... 详细信息
来源: 评论
Analysis of TLS Encrypted Communication Behavior Based on Bipartite Graph and Traffic Information Embedding  4
Analysis of TLS Encrypted Communication Behavior Based on Bi...
收藏 引用
4th IEEE International Conference on Computer and Communication engineering Technology, CCET 2021
作者: Yan, Lin Jiang, Liehui Wang, Ruimin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Currently, encrypted traffic using the TLS protocol is widely used, and there are a lot of malicious and unknown behaviors. It is an important goal in the research field to detect the traffic behavior of TLS and maint... 详细信息
来源: 评论
TCLD-Net: A Transfer Learning Internet Encrypted Traffic Classification Scheme Based on Convolution Neural Network and Long Short-Term Memory Network
TCLD-Net: A Transfer Learning Internet Encrypted Traffic Cla...
收藏 引用
2021 IEEE International Conference on Communications, computing, Cybersecurity and Informatics, CCCI 2021
作者: Hu, Xinyi Gu, Chunxiang Chen, Yihang Wei, Fushan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The Internet is about to enter the era of full encryption. Traditional traffic classification methods only work well in non-encrypted environments. How to identify the specific types of network encrypted traffic in an... 详细信息
来源: 评论
Recommendation of cyber attack method based on knowledge graph
Recommendation of cyber attack method based on knowledge gra...
收藏 引用
2020 International Conference on Computer engineering and Intelligent Control, ICCEIC 2020
作者: Ou, Yunjia Zhou, Tianyang Zhu, Junhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The lack of correlation between the new cyber attack intelligence and the knowledge database makes it difficult for the recommendation system to recommend effective cyber attack knowledge in terms of the new security ... 详细信息
来源: 评论
SRS: A Split-Range Shared Memory Consistency Model for Thousand-Core Processors
SRS: A Split-Range Shared Memory Consistency Model for Thous...
收藏 引用
10th Annual Conference of advanced Computer Architecture, ACA 2014
作者: Lyu, Hui Zheng, Fang Xie, Xianghui State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
A novel memory consistency model for thousand-core processors is presented. The model simplifies cache coherence for the full chip, and reduces cache design complexity. In addition, the model has the ability to descri... 详细信息
来源: 评论