咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 网络空间安全
    • 1 篇 计算机科学与技术...
    • 1 篇 软件工程

主题

  • 1 篇 intrusion detect...
  • 1 篇 deep learning
  • 1 篇 program slicing
  • 1 篇 vulnerability de...
  • 1 篇 distributed deni...
  • 1 篇 static analysis
  • 1 篇 android security
  • 1 篇 multi-strategy i...
  • 1 篇 zebra optimizati...
  • 1 篇 input validation

机构

  • 1 篇 beijing electron...
  • 1 篇 langfang key lab...
  • 1 篇 national compute...
  • 1 篇 national compute...
  • 1 篇 school of inform...
  • 1 篇 state key labora...

作者

  • 1 篇 zhiqiang wang
  • 1 篇 yuqing zhang
  • 1 篇 xiaoying wang
  • 1 篇 aijing zhang
  • 1 篇 jiaye liang
  • 1 篇 qixu liu
  • 1 篇 qianru wu
  • 1 篇 kai wang
  • 1 篇 chunhui li
  • 1 篇 zhejun fang
  • 1 篇 qingjie zhang

语言

  • 2 篇 英文
检索条件"机构=Langfang Key Laboratory of Network Emergency Protection and Network Security"
2 条 记 录,以下是1-10 订阅
排序:
DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 645-674页
作者: Chunhui Li Xiaoying Wang Qingjie Zhang Jiaye Liang Aijing Zhang School of Information Engineering Institute of Disaster PreventionLangfang065201China Langfang Key Laboratory of Network Emergency Protection and Network Security Langfang065201China
Previous studies have shown that deep learning is very effective in detecting known ***,when facing unknown attacks,models such as Deep Neural networks(DNN)combined with Long Short-Term Memory(LSTM),Convolutional Neur... 详细信息
来源: 评论
A static technique for detecting input validation vulnerabilities in Android apps
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 210-225页
作者: Zhejun FANG Qixu LIU Yuqing ZHANG Kai WANG Zhiqiang WANG Qianru WU National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences National Computer Network Emergency Response Technical Team/Coordination Center of China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Beijing Electronic Science and Technology Institute
Input validation vulnerabilities are common in Android apps, especially in inter-component communications. Malicious attacks can exploit this kind of vulnerability to bypass Android security mechanism and compromise t... 详细信息
来源: 评论