咨询与建议

限定检索结果

文献类型

  • 588 篇 会议
  • 412 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 486 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 160 篇 信息与通信工程
    • 125 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 55 篇 控制科学与工程
    • 52 篇 生物工程
    • 29 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
    • 16 篇 化学工程与技术
  • 275 篇 理学
    • 168 篇 数学
    • 55 篇 生物学
    • 49 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 28 篇 系统科学
    • 16 篇 化学
  • 162 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 21 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 39 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 26 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 20 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers
  • 15 篇 federated learni...

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 31 篇 school of cyber ...
  • 30 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...
  • 11 篇 shandong enginee...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 12 篇 yang xiaoyuan
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 10 篇 lei zhu
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 902 篇 英文
  • 71 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1001 条 记 录,以下是761-770 订阅
排序:
Research on the Identification of Software Behavior in Anomaly Detection
Research on the Identification of Software Behavior in Anoma...
收藏 引用
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Jun Yang Xiangping Du Liang Zhou Songling Shan Baojiang Cui School of Computer Science Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Mobile Network Security China China Electric Power Research Institute Beijing China
Anomaly detection is an important component of computer security defense. As the security situation becomes increasingly severe, abnormality is detected by the sequential pattern mining has become a hot research topic... 详细信息
来源: 评论
A pattern-matching method for extracting personal information in Farsi content
UPB Scientific Bulletin, Series C: Electrical Engineering an...
收藏 引用
UPB Scientific Bulletin, Series C: Electrical engineering and computer Science 2016年 第1 1期78 78卷 125-138页
作者: Emami, Hojjat Shirazi, Hossein Abdollahzadeh Barforoush, Ahmad Hourali, Maryam Social Network and Intelligent Systems Laboratory Faculty of Artificial Intelligence Malek-Ashtar University of Technology Tehran Iran Intelligent Systems Laboratory Computer Engineering Department Amir Kabir University of Technology Tehran Iran Department of Information Communication and Security Malek-Ashtar University of Technology Tehran Iran
Personal information extraction as a subtask of entity profiling is the process of identifying and extracting useful and structured information of the focus person named-entity from the content related to it. This is ... 详细信息
来源: 评论
The design and implementation of network attack and defense platform based on cloud desktop
收藏 引用
Journal of Physics: Conference Series 2017年 第1期887卷
作者: Zining Yan Yunhan Wang Shijiao Shao Boquan Li Embedded System Lab. College of Computer Science and Technology Harbin China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Key Laboratory of Network Assessment of Technology Chinese Academy of Sciences Beijing China
This paper discusses the cloud desktop technology, virtualization technology and penetration testing technology used in the network attack and defense training platform, and introduces the design and implementation pr...
来源: 评论
The Performance Optimization of Hadoop during Mining Online Education Packets for Malware Detection
The Performance Optimization of Hadoop during Mining Online ...
收藏 引用
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Xuan Tian Baojiang Cui Jiangdong Deng Jun Yang China Communications Construction Group Design Institute Co. Ltd College of Computer Science Beijing University of posts and telecommunications Beijing China National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing Beijing CN
network security is becoming more and more important because there is a lot of anomaly traffic information in some websites such as online education. In order to detect the anomaly traffic effectively, we can use some... 详细信息
来源: 评论
Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption
Trusted Boolean Search on Cloud Using Searchable Symmetric E...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Cong Zuo James Macindoe Siyin Yang Ron Steinfeld Joseph K. Liu School of Computer and Information Engineering Zhejiang Gongshang University Zhejiang P.R. China Faculty of Information Technology Clayton Campus Monash University Australia Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou Fujian China
A Searchable Symmetric Encryption (SSE) scheme allows a server to search a user's data without having to decrypt the data. This provides the user with a high degree of privacy and is particularly useful when data ... 详细信息
来源: 评论
FE-brick: Re-definition and re-design of fe model in next-generation router architecture
FE-brick: Re-definition and re-design of fe model in next-ge...
收藏 引用
作者: Gao, Xianming Wang, Baosheng Wang, Xu An Zhang, Xiaozhe School of Computer National University of Defense Technology Changsha410073 China Key Laboratory of Network and Information Security Engineering University of CAPF Xi'an710086 China
In traditional router, it usually consists of forwarding element (FE) and control element (CE). However, there is a tight coupling between FE model and logical functions, thus restricting service innovation and user c... 详细信息
来源: 评论
Design and Implementation of Library Books Search and Management System Using RFID Technology
Design and Implementation of Library Books Search and Manage...
收藏 引用
International Conference on Intelligent networking and Collaborative Systems (INCOS)
作者: Haiming Cheng Ling Huang He Xu Yifan Hu Xu An Wang School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks College of Internet of Things Nanjing University of Posts and Telecommunications Nanjing China Key Laboratory of Information and Network Security Engineering University of Chinese Armed Police Force Xi'an China
Radio Frequency Identification technology (RFID) is the key technology to realize the Internet of things. Currently, using RFID to locate objects indoor is a hot topic in the research on the application of RFID. In th... 详细信息
来源: 评论
Bidirectional analysis method of static XSS defect detection technique based on database query language  19th
收藏 引用
19th International Conference on Transactions on Computational Collective Intelligence, TCCI 2015
作者: Cui, Baojiang Hou, Tingting Long, Baolian Xu, Lingling National Engineering Laboratory for Mobile Network Security Beijing China School of Computer Science Beijing University of Posts and Telecommunications Beijing China Department of Computer Science South China University of Technology Guangzhou China
Along with the wide use of web application, XSS vulnerability has become one of the most common security problems and caused many serious losses. In this paper, on the basis of database query language technique, we pu... 详细信息
来源: 评论
QoS-aware user satisfaction oriented joint resource block and power allocation in OFDMA systems with cloud based information sharing  16
QoS-aware user satisfaction oriented joint resource block an...
收藏 引用
16th IEEE International Conference on Communication Technology, ICCT 2015
作者: Li, Aini Sun, Yan Xu, Xiaodong Yang, Xu Queen Mary University of London Electronic Engineering and Computer Science London United Kingdom Beijing University of Posts and Telecommunications National Engineering Laboratory for Mobile Network Security Beijing100876 China China
OFDMA is a suitable technique for delivering high data rate services and one of the most important technologies applied in LTE and 5G wireless networks. In OFDMA systems, dynamic resource block (RB) allocation conside... 详细信息
来源: 评论
A survey of network traffic generation  3
A survey of network traffic generation
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Zhang, Junhui Tang, Jiqiang Zhang, Xu Ouyang, Wen Wang, Dongbin Beijing University of Posts and Telecommunications Beijing100876 China National Computer Network Emergency Response Coordination Centre Beijing100029 China National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications China
network traffic generation is very important for testing network equipment, network services, and security products. The paper firstly introduces the significance and the classification of network traffic generation. ... 详细信息
来源: 评论