咨询与建议

限定检索结果

文献类型

  • 589 篇 会议
  • 420 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 651 篇 工学
    • 494 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 165 篇 信息与通信工程
    • 127 篇 电气工程
    • 62 篇 网络空间安全
    • 61 篇 电子科学与技术(可...
    • 60 篇 控制科学与工程
    • 52 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 26 篇 机械工程
    • 24 篇 仪器科学与技术
    • 21 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 化学工程与技术
  • 278 篇 理学
    • 170 篇 数学
    • 56 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 18 篇 化学
  • 166 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 22 篇 医学
    • 19 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 27 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 21 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 federated learni...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 heilongjiang key...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 yang xiaoyuan
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 907 篇 英文
  • 75 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1010 条 记 录,以下是991-1000 订阅
排序:
An Efficient Method against Side-Channel Attacks on ECC
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1573-1576页
作者: LIU Shuanggen HU Yupu XU Wensheng Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 Shaanxi China College of Computer Information Engineering Jiangxi Normal University Nanchang 330022 Jiangxi China
Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequen... 详细信息
来源: 评论
S-DBMS: A Relational Framework to Manage network security Databases
S-DBMS: A Relational Framework to Manage Network Security Da...
收藏 引用
International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA
作者: M. Hamdi N. Boudriga Computer Network and Security CN&S Research Laboratory School of Communication Engineering University of 7th of November Carthage Tunisia
This paper presents a relational approach for structuring security decision databases to support advanced automated functionalities. We represent attacks and countermeasures in a unifying environment using relational ... 详细信息
来源: 评论
Robust moving object segmentation in the compressed domain for H.264/AVC video stream
Robust moving object segmentation in the compressed domain f...
收藏 引用
25th PCS: Picture Coding Symposium 2006, PCS2006
作者: Yang, Gaobo Yu, Shengfa Zhang, Zhaoyang Network and Information Security Lab School of Computer and Communication Hunan University Changsha Hunan 410082 China School of Electronic Science and Engineering National University of Defense Technology Changsha Hunan 410073 China Key Laboratory of Advanced Displays and System Application Shanghai University Ministry of Education Shanghai 200072 China
Moving object segmentation in the compressed domain plays an important role in many real-time applications, e.g. video indexing, video surveillance, etc. H.264/AVC is the up-to-date video coding standard, which employ... 详细信息
来源: 评论
Disaster recovery system model with e-government case study
收藏 引用
Natural Hazards Review 2006年 第4期7卷 145-149页
作者: Wang, Kun Li, Long-Hai Yuan, Feng Zhou, Li-Hua Key Laboratory of Computer Network and Information Security Xidian Univ. Ministry of Education Xi'an 710071 Shaanxi China Dept. of Computer Science and Technology Xidian Univ. Xi'an 710071 Shaanxi China National Information Security Engineering and Technology Research Center Beijing 100093 China
We present a robust disaster recovery system model according to the requests of disaster recovery talent of a key e-government project of China. The model strengthens the safe communication ability and guarantees the ... 详细信息
来源: 评论
Living with technology: Who are you? How to protect against identity theft
收藏 引用
IEEE Technology and Society Magazine 2005年 第2期24卷 5-8页
作者: Elbirt, Adam J. Information Security Laboratory Electrical and Computer Engineering Department University of Massachusetts Lowell Lowell MA United States Center for Network and Information Security Lowell MA United States
Identity theft is one of the most lucrative criminal endeavors particularly in the United States. Although numerous laws have been enacted in an attempt to address the issue of identity theft, the best protection avai... 详细信息
来源: 评论
An optimized intrusion detection system using PCA and BNN
An optimized intrusion detection system using PCA and BNN
收藏 引用
6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT 2005
作者: Kim, Dong Seong Nguyen, Ha-Nam Thein, Thandar Park, Jong Sou Network Security Laboratory Computer Engineering Department Hankuk Aviation University Seoul Korea Republic of Visual Information Processing Laboratory Computer Engineering Department Aviation University Seoul Korea Republic of Government Computer College Mandalay Myanmar
This paper proposes an optimized Intrusion Detection System (IDS) using Principle Component Analysis (PCA) and Back-propagation Neural network (BNN). Existing neural network based IDS are mainly suffering from two pro... 详细信息
来源: 评论
Study of secure complicated information system architecture model
Study of secure complicated information system architecture ...
收藏 引用
1st International Conference on Semantics, Knowledge and Grid, SKG 2005
作者: Wang, Kun Su, Ruidan Li, Zengxin Cai, Zhen Zhou, Lihua Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China National Info Security Engineering and Technology Research Center Beijing 100093 China
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ... 详细信息
来源: 评论
A mathematical approach to disaster recovery planning
A mathematical approach to disaster recovery planning
收藏 引用
1st International Conference on Semantics, Knowledge and Grid, SKG 2005
作者: Wang, Kun Yin, Zhonghai Yuan, Feng Zhou, Lihua Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China National Info Security Engineering and Technology Research Center Beijing 100093 China
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u... 详细信息
来源: 评论
A Mathematical Approach to Disaster Recovery Planning
A Mathematical Approach to Disaster Recovery Planning
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Kun Wang Zhonghai Yin Feng Yuan Lihua Zhou Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u... 详细信息
来源: 评论
Study of Secure Complicated Information System Architecture Model
Study of Secure Complicated Information System Architecture ...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Kun Wang Ruidan Su Zengxin Li Zhen Cai Lihua Zhou Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ... 详细信息
来源: 评论