咨询与建议

限定检索结果

文献类型

  • 74 篇 期刊文献
  • 69 篇 会议

馆藏范围

  • 143 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 97 篇 工学
    • 73 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 21 篇 信息与通信工程
    • 14 篇 生物工程
    • 12 篇 电气工程
    • 12 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 7 篇 化学工程与技术
    • 7 篇 网络空间安全
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 土木工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
  • 45 篇 理学
    • 15 篇 数学
    • 14 篇 生物学
    • 13 篇 物理学
    • 8 篇 化学
    • 4 篇 系统科学
    • 4 篇 统计学(可授理学、...
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 8 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 8 篇 privacy
  • 6 篇 authentication
  • 5 篇 deep learning
  • 5 篇 information secu...
  • 4 篇 access control
  • 4 篇 security
  • 4 篇 federated learni...
  • 4 篇 protection
  • 3 篇 android (operati...
  • 3 篇 semantics
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 cloud computing
  • 2 篇 internet of thin...
  • 2 篇 information syst...
  • 2 篇 object detection
  • 2 篇 scalability
  • 2 篇 reinforcement le...
  • 2 篇 data privacy
  • 2 篇 libraries

机构

  • 19 篇 beijing key labo...
  • 17 篇 faculty of infor...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 8 篇 college of compu...
  • 7 篇 institute of inf...
  • 7 篇 school of cyber ...
  • 5 篇 key laboratory o...
  • 5 篇 beijing key labo...
  • 4 篇 guangdong provin...
  • 4 篇 national compute...
  • 4 篇 national enginee...
  • 4 篇 key laboratory o...
  • 4 篇 beijing key labo...
  • 4 篇 state key labora...
  • 3 篇 key laboratory o...
  • 3 篇 state key labora...
  • 3 篇 natl. engineerin...
  • 3 篇 school of inform...
  • 3 篇 beijing national...

作者

  • 18 篇 duan lijuan
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 qiao yuanhua
  • 6 篇 zhang yuqing
  • 5 篇 yanyan zou
  • 4 篇 gong zhi
  • 3 篇 wang wenjian
  • 3 篇 baoxu liu
  • 3 篇 zhang jianbiao
  • 3 篇 zhan jing
  • 3 篇 zhao jijun
  • 3 篇 ma jin
  • 3 篇 yixian yang
  • 3 篇 yu zhang
  • 3 篇 wen yan
  • 3 篇 huo wei
  • 3 篇 nanyu zhong
  • 3 篇 jianbiao zhang
  • 3 篇 feng nan

语言

  • 138 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=National Engineering Laboratory for Key Technology of Classified Information Security Protection"
143 条 记 录,以下是81-90 订阅
排序:
From proof-of-concept to exploitable
收藏 引用
Cybersecurity 2019年 第1期2卷 189-213页
作者: Yan Wang WeiWu Chao Zhang Xinyu Xing Xiaorui Gong Wei Zou School of Cyber Security University of Chinese Academy of SciencesBeijingChina Institute for Network Sciences and Cyberspace Tsinghua UniversityBeijingChina College of Information Sciences and Technology Pennsylvania State UniversityUniversity ParkUnited States Institute of Information Engineering Chinese Academy of SciencesBeijingChina Key Laboratory of Network Assessment Technology CASBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina
Exploitability assessment of vulnerabilities is important for both defenders and *** ultimate way to assess the exploitability is crafting a working ***,it usually takes tremendous hours and significant manual *** add... 详细信息
来源: 评论
Intelligent Upgrade of Waste-Activated Sludge Dewatering Process Based on Artificial Neural Network Model: Core Influential Factor Identification and Non-Experimental Prediction of Sludge Dewatering Performance
SSRN
收藏 引用
SSRN 2023年
作者: Li, Hewei Li, Chunjiang Zhou, Kun Ye, Wei Lu, Yufei Chaia, Xiaoli Daia, Xiaohu Wu, Boran State Key Laboratory of Pollution Control and Resource Reuse College of Environmental Science and Engineering Tongji University 1239 Siping Road Shanghai200092 China Shanghai Technology Innovation Center of Sludge Treatment and Resourcification Shanghai CEO Environmental Protection Technology Co. Ltd. 1668 Guoquan Road Shanghai200438 China Co. Ltd. 901 Zhongshan North 2nd Road Shanghai200092 China College of Electronic and Information Engineering Tongji University 4800 Cao'an Highway Shanghai201804 China Shanghai Institute of Pollution Control and Ecological Security Shanghai200092 China
Owing to the extremely complex compositions and origins of waste-activated sludge (WAS), the multiple physiochemical properties of WAS have impacts on its dewaterability, and there is a complex interaction relationshi... 详细信息
来源: 评论
Constructing benchmarks for supporting explainable evaluations of static application security testing tools  13
Constructing benchmarks for supporting explainable evaluatio...
收藏 引用
13th International Symposium on Theoretical Aspects of Software engineering, TASE 2019
作者: Hao, Gaojian Li, Feng Huo, Wei Sun, Qing Wang, Wei Li, Xinhua Zou, Wei Institute of Information Engineering Chinese Academy of Sciences China Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing Key Laboratory of Network Security and Protection Technology China School of Cyber Security University of Chinese Academy of Sciences China
When evaluating Static Application security Testing (SAST) tools, benchmarks based on real-world softwares are considered more representative than synthetic micro benchmarks. Generated from real-world software, the te... 详细信息
来源: 评论
Spatiotemporal estimation and local driver analysis of fractional vegetation coverage in the Three-North region, China
收藏 引用
Advances in Space Research 2025年
作者: Yi Long Hua Sun Fugen Jiang Song Chen Jie Tang Research Center of Forestry Remote Sensing and Information Engineering Central South University of Forestry and Technology Changsha China Key Laboratory of Forestry Remote Sensing Based Big Data and Ecological Security for Hunan Province Changsha China Key Laboratory of National Forestry and Grassland Administration on Forest Resources Management and Monitoring in Southern Area Changsha China
Understanding the spatio-temporal dynamics of fractional vegetation coverage (FVC) and its driving factors is imperative for advancing ecological management and fostering sustainable development. Towards the Three-Nor...
来源: 评论
A novel image encryption method based on hyperchaotic system and pixel information association
收藏 引用
International Journal of Wireless and Mobile Computing 2018年 第3期15卷 207-214页
作者: Duan, Lijuan Zhang, Dongkui Ning, Zhenhu Xu, Fan Cui, Guoqin Liang, Peng Faculty of Information Technology Beijing University of Technology Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China State Key Laboratory of Digital Multi-Media Chip Technology Vimicro Corporation Beijing100191 China State Information Center National Engineering Laboratory for e-Government Integration and Application Beijing100045 China
In recent years, a variety of image encryption methods based on chaotic systems has been proposed, and has achieved good results. In order to improve the security of image encryption, this paper proposes a new image e... 详细信息
来源: 评论
Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing  1
收藏 引用
2nd International Conference on Machine Learning for Cyber security, ML4CS 2019
作者: Zhang, Lili Wang, Wenjie Zhang, Yuqing National Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China Henan International Joint Laboratory of Cyberspace Security Applications Information Engineering College Henan University of Science and Technology Luoyang471023 China National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing100049 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
In cloud computing model, the data are usually encrypted before outsourced to the cloud server, which protects the data privacy, but also leaves keyword searches over ciphertext data a challenging problem. A keyword s... 详细信息
来源: 评论
A security scheme for intelligent substation communications considering real-time performance
收藏 引用
Journal of Modern Power Systems and Clean Energy 2019年 第4期7卷 948-961页
作者: Jie ZHANG Jun’e LI Xiong CHEN Ming NI Ting WANG Jianbo LUO Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China NARI Group Corporation(State Grid Electric Power Research Institute) Nanjing 211106China NARI Technology Co.Ltd. Nanjing 211106China State Key Laboratory of Smart Grid Protection and Control Nanjing 211106China
Tampering,forgery and theft of the measurement and control messages in a smart grid could cause one breakdown in the power ***,no security measures are employed for communications in intelligent *** services in an int... 详细信息
来源: 评论
An Intelligent Learning Method and System for Cybersecurity Threat Detection
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1575卷
作者: Yuan Tao Wei Hu Moyan Li The Third Research Institute of Ministry of Public Security Shanghai China National Engineering Laboratory for Key Technology of Classified Information Security Protection Beijing China
To protect information system and data effectively is the core of cybersecurity. At present, most technologies are based on known static protection strategies. Through the cybersecurity threat is dynamic, so it is nec...
来源: 评论
Research on Knowledge Graph Model for Cybersecurity Logs Based on Ontology and classified protection
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1575卷
作者: Yuan Tao Moyan Li Wei Hu The Third Research Institute of Ministry of Public Security Shanghai China National Engineering Laboratory for Key Technology of Classified Information Security Protection Beijing China
In order to audit and analyse cybersecurity events from massive logs, the knowledge graph model for cybersecurity logs is proposed. The data layer and the pattern layer of the knowledge graph model for cybersecurity l...
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China University of Texas at Dallas Dallas United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论