咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 417 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,024 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 488 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 158 篇 信息与通信工程
    • 123 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 56 篇 控制科学与工程
    • 52 篇 生物工程
    • 30 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 277 篇 理学
    • 170 篇 数学
    • 54 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 17 篇 化学
  • 163 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 20 篇 医学
    • 18 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 28 篇 security
  • 28 篇 protocols
  • 27 篇 cloud computing
  • 26 篇 federated learni...
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 21 篇 network security
  • 20 篇 deep learning
  • 20 篇 encryption
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 college of compu...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...
  • 13 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei

语言

  • 878 篇 英文
  • 117 篇 其他
  • 33 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1024 条 记 录,以下是791-800 订阅
排序:
Bidirectional analysis method of static XSS defect detection technique based on database query language  19th
收藏 引用
19th International Conference on Transactions on Computational Collective Intelligence, TCCI 2015
作者: Cui, Baojiang Hou, Tingting Long, Baolian Xu, Lingling National Engineering Laboratory for Mobile Network Security Beijing China School of Computer Science Beijing University of Posts and Telecommunications Beijing China Department of Computer Science South China University of Technology Guangzhou China
Along with the wide use of web application, XSS vulnerability has become one of the most common security problems and caused many serious losses. In this paper, on the basis of database query language technique, we pu... 详细信息
来源: 评论
QoS-aware user satisfaction oriented joint resource block and power allocation in OFDMA systems with cloud based information sharing  16
QoS-aware user satisfaction oriented joint resource block an...
收藏 引用
16th IEEE International Conference on Communication Technology, ICCT 2015
作者: Li, Aini Sun, Yan Xu, Xiaodong Yang, Xu Queen Mary University of London Electronic Engineering and Computer Science London United Kingdom Beijing University of Posts and Telecommunications National Engineering Laboratory for Mobile Network Security Beijing100876 China China
OFDMA is a suitable technique for delivering high data rate services and one of the most important technologies applied in LTE and 5G wireless networks. In OFDMA systems, dynamic resource block (RB) allocation conside... 详细信息
来源: 评论
A survey of network traffic generation  3
A survey of network traffic generation
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Zhang, Junhui Tang, Jiqiang Zhang, Xu Ouyang, Wen Wang, Dongbin Beijing University of Posts and Telecommunications Beijing100876 China National Computer Network Emergency Response Coordination Centre Beijing100029 China National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications China
network traffic generation is very important for testing network equipment, network services, and security products. The paper firstly introduces the significance and the classification of network traffic generation. ... 详细信息
来源: 评论
Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment
收藏 引用
Multimedia Tools and Applications 2017年 第21期76卷 22785-22785页
作者: Shen, Jian Tan, Haowen Zhang, Yan Sun, Xingming Xiang, Yang Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology School of Computer & Software Nanjing University of Information Science and Technology Nanjing China School of Computer & Software Nanjing University of Information Science & Technology Nanjing China Simula Research Laboratory of Norway and the Department of Informatics University of Oslo Oslo Norway Center for Cyber Security Research Deakin University Deakin Australia
来源: 评论
A Dynamic Self-Adaptive Algorithm for Uploading Deferrable Big Data to the Cloud Cost-Effectively
A Dynamic Self-Adaptive Algorithm for Uploading Deferrable B...
收藏 引用
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Baojiang Cui Peilin Shi Haifeng Jin School Computer of Science Nation Engineering Laboratory for Mobile Network Security Beijing China
Cloud computing is based between the service provider and service consumer agreements and cloud data center is under a cloud computing environment that consists of hardware and software components. This paper studies ... 详细信息
来源: 评论
Paralleled Extraction Method for Content of Invoice Image Based on TPL
Paralleled Extraction Method for Content of Invoice Image Ba...
收藏 引用
2015 International Conference on Advanced Management Science and Information engineering(AMSIE 2015)
作者: H.Y.Jin B.Xing X.H.Hei School of Computer Science & Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
The paper mainly uses a mixed strategy of data and task parallelism to realize parallel extraction date information of *** at the deficiency of ordinary pipeline mode for parallel extraction date information from invo... 详细信息
来源: 评论
network Identity Management Platform Based on eID
Network Identity Management Platform Based on eID
收藏 引用
2015 International Industrial Informatics and computer engineering Conference(IIICEC 2015)
作者: ZOU Xiang CHEN Bing The 3rd research institute of ministry of public security (key laboratory of information network security Ministry of Public Security) Dept.of computer engineering of Tongji University
With the prompt evolution of Internet,network identity management is getting more and more *** electronic identities in cyberspace associated in reality have been one significant and urgent task as online life becomes... 详细信息
来源: 评论
Research on network Identity Management Systems Model
Research on Network Identity Management Systems Model
收藏 引用
2015 International Industrial Informatics and computer engineering Conference(IIICEC 2015)
作者: CHEN Bing ZOU Xiang TAN Chengxiang The 3rd research institute of ministry of public security (key laboratory of information network security Ministry of Public Security) Dept.of computer engineering of Tongji University
With the rapid development of network,network identity management is becoming more and more *** identity in cyberspace associated in reality has been one significant and urgent task as online life becomes *** this pap... 详细信息
来源: 评论
VM migration across subnets in future internet architecture-XIA
收藏 引用
Tongxin Xuebao/Journal on Communications 2016年 第3期37卷 107-116页
作者: Meng, Hong-Wei Chen, Zhong Meng, Zi-Qian Song, Chuck School of Electronics Engineering and Computer Science Peking University Beijing100871 China Ministry of Education Beijing100871 China MoE Key Laboratory of Network and Software Security Assurance Peking University Beijing100871 China School of Computer Science Carnegie Mellon University Pittsburgh15213 United States
When a VM migrates among hosts residing in two IP subnets, the network attachment point of VM changed, which causes the IP mobility problem. It was meaningful to design and evaluate VM migration performance under the ... 详细信息
来源: 评论
Collecting all data continuously in wireless sensor networks with a mobile base station
Collecting all data continuously in wireless sensor networks...
收藏 引用
作者: Li, Jie Ye, Xiucai Xu, Li Liu, Huaibei Faculty of Engineering Information and Systems University of Tsukuba Tsukuba Science City Ibaraki3058573 Japan Department of Computer Science University of Tsukuba Tsukuba Science City Ibaraki3058573 Japan Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou Fujian350007 China Provincial Key Laboratory of Information Network Engineering Fuzhou Fujian350003 China Institute of Scientific and Technological Information Fuzhou Fujian350003 China
In this paper, we present a novel coding scheme called separate coding (SC) for collecting all data continuously in wireless sensor networks with a mobile base station (mBS). By separately encoding a certain number of... 详细信息
来源: 评论