咨询与建议

限定检索结果

文献类型

  • 356 篇 会议
  • 128 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 486 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 323 篇 工学
    • 182 篇 计算机科学与技术...
    • 114 篇 软件工程
    • 104 篇 信息与通信工程
    • 45 篇 电子科学与技术(可...
    • 34 篇 仪器科学与技术
    • 32 篇 控制科学与工程
    • 28 篇 网络空间安全
    • 25 篇 电气工程
    • 17 篇 机械工程
    • 11 篇 生物工程
    • 8 篇 光学工程
    • 6 篇 材料科学与工程(可...
    • 6 篇 航空宇航科学与技...
    • 5 篇 土木工程
    • 5 篇 化学工程与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 建筑学
  • 92 篇 管理学
    • 77 篇 管理科学与工程(可...
    • 19 篇 工商管理
    • 17 篇 图书情报与档案管...
  • 79 篇 理学
    • 44 篇 数学
    • 15 篇 统计学(可授理学、...
    • 14 篇 物理学
    • 13 篇 生物学
    • 11 篇 系统科学
    • 8 篇 化学
  • 17 篇 文学
    • 16 篇 新闻传播学
  • 13 篇 法学
    • 8 篇 社会学
    • 4 篇 法学
  • 10 篇 军事学
    • 8 篇 军队指挥学
  • 2 篇 经济学
  • 2 篇 农学
  • 1 篇 医学
  • 1 篇 艺术学

主题

  • 23 篇 security
  • 15 篇 feature extracti...
  • 14 篇 algorithm design...
  • 11 篇 signal to noise ...
  • 11 篇 training
  • 10 篇 scheduling
  • 9 篇 routing
  • 9 篇 throughput
  • 9 篇 clustering algor...
  • 8 篇 network topology
  • 8 篇 vectors
  • 8 篇 switches
  • 8 篇 internet
  • 7 篇 bandwidth
  • 7 篇 semantics
  • 7 篇 heterogeneous ne...
  • 6 篇 support vector m...
  • 6 篇 load balancing
  • 6 篇 architecture
  • 6 篇 traffic control

机构

  • 102 篇 national digital...
  • 46 篇 national digital...
  • 39 篇 national digital...
  • 18 篇 china national d...
  • 11 篇 national digital...
  • 11 篇 china national d...
  • 10 篇 purple mountain ...
  • 10 篇 school of cyber ...
  • 9 篇 china national d...
  • 9 篇 national digital...
  • 8 篇 national digital...
  • 8 篇 national digital...
  • 8 篇 national digital...
  • 8 篇 national digital...
  • 7 篇 national digital...
  • 7 篇 information engi...
  • 6 篇 national digital...
  • 6 篇 state key labora...
  • 5 篇 school of cyber ...
  • 5 篇 national digital...

作者

  • 23 篇 kaizhi huang
  • 17 篇 guozhen cheng
  • 15 篇 julong lan
  • 15 篇 hongchang chen
  • 15 篇 jiangxing wu
  • 14 篇 bin yan
  • 13 篇 xinsheng ji
  • 11 篇 wang binqiang
  • 11 篇 hongchao hu
  • 10 篇 yunfei guo
  • 10 篇 lan julong
  • 10 篇 jian chen
  • 10 篇 binqiang wang
  • 10 篇 ruiyang huang
  • 10 篇 liang jin
  • 10 篇 fucai chen
  • 9 篇 jianpeng zhang
  • 9 篇 huang kaizhi
  • 9 篇 peng yi
  • 9 篇 hu yuxiang

语言

  • 465 篇 英文
  • 16 篇 中文
  • 5 篇 其他
检索条件"机构=National Digital Switching System Engineering and Techological R and D center"
486 条 记 录,以下是41-50 订阅
排序:
Prioritized recovery Strategy For robust UAV Swarm Communication via Graph reinforcement Learning
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Peng, Yabin Wu, Jiangxing duan, Tong Liu, Yuchen Zhang, Zhen Zhang, Jinfeng Southeast University School of Cyber Science and Engineering Nanjing211189 China Purple Mountain Laboratories Nanjing211111 China National Digital Switching System Engineering and Technological R and D Center Zhengzhou450002 China PLA Information Engineering University Zhengzhou450002 China
Network failures, whether due to random disruptions or malicious attacks, pose significant challenges for unmanned aerial vehicle (UAV) swarm networks. One critical concern is determining which failed UAVs to recover ... 详细信息
来源: 评论
5g Network resilience Evaluation Mechanism Based on Petri Nets
SSRN
收藏 引用
SSrN 2024年
作者: Wu, Wenhao Ji, Xinsheng Yang, Jie You, Wei Zhou, deqiang Li, ran Xue, Buqing National Digital Switching System Engineering & Technological R&D Center PLA Information Engineering University Henan Zhengzhou450001 China School of Cyber Science and Technology Xidian University Shanxi Xi’an710126 China
As a next-generation mobile communication technology, 5G's network functions—cloudification, virtualization, and other characteristics enable the network to overcome single-point resource constraints and be deplo... 详细信息
来源: 评论
Problems and solutions regarding generalized functional safety in cyberspace
收藏 引用
Security and Safety 2022年 第1期1卷 90-102页
作者: JiangXing Wu National Digital Switching System Engineering&Technological R&D Center Zhengzhou 450002China Purple Mountain Laboratories Nanjing 211111China
The common endogenous security problems in cyberspace and related attack threats have posed subversive challenges to conventional theories and methods of functional *** the current design of the cyber physical system(... 详细信息
来源: 评论
research on a Synchronization Algorithm of Look-Up Table in Open reconfigurable router
收藏 引用
Chinese Journal of Electronics 2023年 第3期19卷 419-422页
作者: Xiaochun Wu Chunming Wu Fenggen Jia College of Computer Science and Technology Zhejiang University Hangzhou China Institute of Network and Communication Engineering Zhejiang Gongshang University Hangzhou China R & D Center National Digital Switching System Engineering and Technology Zhengzhou China
reconfigurable router with fast look-up table synchronization mechanism is necessary for Next generation network (NGN), which facilitates open and fast deployment of new services. Based on an open architecture, standa... 详细信息
来源: 评论
discussion on a new paradigm of endogenous security towards 6G networks
收藏 引用
Frontiers of Information Technology & Electronic engineering 2022年 第10期23卷 1421-1450页
作者: Xinsheng JI Jiangxing WU Liang JIN Kaizhi HUANG Yajun CHEN Xiaoli SUN Wei YOU Shumin HUO Jing YANG Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China National Digital Switching System Engineering&Technological R&D Center Zhengzhou 450002China Purple Mountain Laboratories:Networking Communications and SecurityNanjing 211111China
The sixth-generation mobile communication(6G)networks will face more complex endogenous security problems,and it is urgent to propose new universal security theories and establish new practice norms to deal with the&#... 详细信息
来源: 评论
design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional network properties
收藏 引用
Frontiers of Information Technology & Electronic engineering 2019年 第2期20卷 238-252页
作者: Yang CHEN Hong-chao HU Guo-zhen CHENG National Digital Switching System Engineering & Technological R&D Center
Although the perimeter security model works well enough when all internal hosts are credible, it is becoming increasingly difficult to enforce as companies adopt mobile and cloud technologies, i.e., the rise of bring ... 详细信息
来源: 评论
A Scheme for Authentication and Traceability of 5G Mobile Terminal Based on IPv6 and Blockchain
A Scheme for Authentication and Traceability of 5G Mobile Te...
收藏 引用
International Conference on Wireless Communications and Signal Processing (WCSP)
作者: Xinsheng Ji Ying Zhao Xingxing Liao Jie Yang Chunxiao Wang Department of Computer Science and Technology Tsinghua University Beijing China National Digital Switching System Engineering & Technological R&D Center Zhengzhou China Purple Mountain Laboratories Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China
To satisfy the service-side requirements for network layer authentication and traceability of users, this paper proposes a method for mobile terminal authentication and identity tracing based on IPv6 and blockchain. O... 详细信息
来源: 评论
A Security Survey of NFV: From Causes to Practices
A Security Survey of NFV: From Causes to Practices
收藏 引用
Consumer Electronics and Computer engineering (ICCECE), 2021 IEEE International Conference on
作者: Gang He Xingxing Liao Caixia Liu School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories Nanjing China R&D Center National Digital Switching System Engineering &Technological Zhengzhou China Academy of Military Sciences Institute of System Engineering Beijing China
Network Function Virtualization (NFV) is proposed as new technology to address massive proprietary devices, high operation costs, poor flexibility and other problems in current traditional network. By separating netwo...
来源: 评论
Named Entity recognition Incorporating Chinese Segmentation Information
Named Entity Recognition Incorporating Chinese Segmentation ...
收藏 引用
Advanced Computing and Endogenous Security, International Conference on
作者: Shiyuan Yu Shuming Guo ruiyang Huang Jianpeng Zhang Ke Su Nan Hu School of Cyberspace Securitym Zhengzhou University Zhengzhou China National Digital Switching System Engineering and Technological R&D Center Zhengzhou China
Word-level information is crucial for Chinese named entity recognition. Presently, most works have achieved better performance by extracting word-level information into character-level representations through existing... 详细信息
来源: 评论
6G Polymorphic Smart Network Architecture and Key Technologies
6G Polymorphic Smart Network Architecture and Key Technologi...
收藏 引用
Frontiers Technology of Information and Computer (ICFTIC), IEEE International Conference on
作者: Xingxing Liao Wei You Jingwen Lv Min Wang Ying Zhao Gang He Purple Mountain Laboratories Nanjing China National Digital Switching Engineering & Technological R&D Center Zhengzhou China Southeast University Nanjing China
In response to the problems of high architecture complexity, only support the IP, difficult against unknown threats, deficient intelligent in 5G network, a new polymorphic smart network architecture is proposed, inclu...
来源: 评论