咨询与建议

限定检索结果

文献类型

  • 24 篇 会议
  • 19 篇 期刊文献

馆藏范围

  • 43 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 27 篇 工学
    • 23 篇 计算机科学与技术...
    • 21 篇 软件工程
    • 5 篇 信息与通信工程
    • 4 篇 电气工程
    • 4 篇 控制科学与工程
    • 4 篇 生物医学工程(可授...
    • 4 篇 生物工程
    • 3 篇 光学工程
    • 2 篇 动力工程及工程热...
    • 2 篇 网络空间安全
    • 1 篇 电子科学与技术(可...
    • 1 篇 化学工程与技术
  • 11 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 6 篇 理学
    • 5 篇 生物学
    • 2 篇 数学
    • 2 篇 化学
    • 1 篇 统计学(可授理学、...
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 3 篇 药学(可授医学、理...
    • 2 篇 公共卫生与预防医...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学

主题

  • 5 篇 deep learning
  • 4 篇 cloud computing
  • 4 篇 training
  • 3 篇 reinforcement le...
  • 3 篇 unceratinty
  • 3 篇 data mining
  • 3 篇 cloud model
  • 3 篇 trust model
  • 3 篇 feature extracti...
  • 3 篇 context aware
  • 3 篇 biological syste...
  • 3 篇 bayesian network
  • 2 篇 runtime
  • 2 篇 big data
  • 2 篇 authentication
  • 2 篇 wireless sensor ...
  • 2 篇 annotations
  • 2 篇 machine learning
  • 2 篇 encryption
  • 2 篇 privacy

机构

  • 6 篇 guangxi key labo...
  • 4 篇 national languag...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 3 篇 key lab of infor...
  • 3 篇 tianjin key labo...
  • 2 篇 central china no...
  • 2 篇 college of compu...
  • 2 篇 guangxi key lab ...
  • 2 篇 school of comput...
  • 2 篇 software center ...
  • 2 篇 guangxi key labo...
  • 2 篇 national languag...
  • 2 篇 haihe lab of ita...
  • 2 篇 guangxi key lab ...
  • 2 篇 state key labora...
  • 2 篇 college of compu...
  • 2 篇 school of softwa...
  • 2 篇 school of mathem...
  • 2 篇 key lab of netwo...

作者

  • 4 篇 weizhong zhao
  • 4 篇 tingting he
  • 4 篇 xingpeng jiang
  • 4 篇 meng deyu
  • 3 篇 jingfeng xue
  • 3 篇 zhenyan liu
  • 3 篇 bo jin
  • 3 篇 muhammad adnan k...
  • 3 篇 yong wang
  • 2 篇 xiong hu
  • 2 篇 yang yi
  • 2 篇 hussam al hamadi
  • 2 篇 huimin zhang
  • 2 篇 cao xiangyong
  • 2 篇 atifa athar
  • 2 篇 li kaiyu
  • 2 篇 qian xueming
  • 2 篇 he tingting
  • 2 篇 sagheer abbas
  • 2 篇 zhao weizhong

语言

  • 43 篇 英文
检索条件"机构=Software Technology and Network Security Lab"
43 条 记 录,以下是31-40 订阅
排序:
API Sequences Based Malware Detection for Android
API Sequences Based Malware Detection for Android
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Jiawei Zhu Zhengang Wu Zhi Guan Zhong Chen Institute of Software Peking University Beijing China MoE Key Lab of Network and Software Security Assurance (PKU) Beijing China China Academy of Information and Communications Technology Beijing China
To mitigate security problem brought by Android malware, various work has been proposed such as behavior based malware detection and data mining based malware detection. In this paper, we put forward a novel Android m... 详细信息
来源: 评论
Energy-balanced clustering routing protocol based on task separation in wireless sensor networks
Energy-balanced clustering routing protocol based on task se...
收藏 引用
International Conference on BioMedical Engineering and Informatics (BMEI)
作者: Wei Sun Xiaoying Song Fasheng Wang Software Center Northeastern University Shenyang China Liaoning Key Lab of Network Security and Computing Technology Dalian Neusoft University Information Dalian China
Clustering protocol for data gathering is one of the effective ways to solve the energy hole problem in wireless sensor networks. However, most of the existing clustering protocols focus on the network model with unif... 详细信息
来源: 评论
Enhancing problem frames with trust and reputation for analyzing smart grid security requirements  1
收藏 引用
2nd International Workshop on Smart Grid security, SmartGridSec 2014
作者: Moyano, Francisco Fernández-Gago, Carmen Beckers, Kristian Heisel, Maritta Network Information and Computer Security Lab University of Malaga Malaga29071 Spain Paluno - The Ruhr Institute for Software Technology University of Duisburg-Essen Essen Germany
Smart grids are expected to scale over millions of users and provide numerous services over geographically distributed entities. Moreover, smart grids are expected to contain controllable local systems (CLS) such as f... 详细信息
来源: 评论
Addressing the energy hole problem based on heterogeneous clustering size for wireless sensor networks
收藏 引用
Journal of Computational Information Systems 2014年 第9期10卷 3973-3980页
作者: Song, Xiaoying Wen, Tao Guo, Quan Ma, Fengming Zhang, Dongqing Software Center Northeastern University Shenyang 110819 China Liaoning Key Lab. of Network Security and Computing Technology Dalian Neusoft Information Institute Dalian 116023 China School of Management Science Qufu Normal University Rizhao Shandong 276800 China
Clustering is one of the effective ways to solve energy hole problem for Wireless Sensor network. So far, the approaches of heterogeneous cluster size mainly have concentrated on the design of unequal cluster protocol... 详细信息
来源: 评论
A Provably secure Certificate based ring signature without pairing
收藏 引用
International Journal of network security 2014年 第4期16卷 278-285页
作者: Qin, Zhiguang Xiong, Hu Li, Fagen School of Computer Science and Engineering University of Electronic Science and Technology of China No. 4 North Jianshe Road Chenghua District chengdu Sichuan 610054 China Key Lab of Network Security and Cryptology Fujian Normal University No. 8 Shangsan Road Cangshan District Fuzhou Fujian 350007 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences No. 19 Yuquan Road Shijingshan District Beijing 100190 China
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certificate-based encryption lies in implicit certificate and no private key escrow. This feature is desirable especially f... 详细信息
来源: 评论
security flaw of an ECC-based signcryption scheme with anonymity
收藏 引用
International Journal of network security 2013年 第4期15卷 317-320页
作者: Xiong, Hu Hu, Jianbin Chen, Zhong School of Computer Science and Engineering University of Electronic Science and Technology of China No. 4 North Jianshe Road Chenghua District Chengdu Sichuan 610054 China Key Lab of Network Security and Cryptology Fujian Normal University No. 8 Shangsan Road Cangshan District Fuzhou Fujian 350007 China Institute of Software School of Electronics Engineering and Computer Science Peking University No. 5 Yiheyuan Road Haidian District Beijing 100085 China
Signcryption is a cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication overhead than signing and encrypting separately. Recen... 详细信息
来源: 评论
On the resistance of Boolean functions against fast algebraic attacks
On the resistance of Boolean functions against fast algebrai...
收藏 引用
14th International Conference on Information security and Cryptology, ICISC 2011
作者: Du, Yusong Zhang, Fangguo Liu, Meicheng School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China Key Lab. of Network Security and Cryptology Fujian Normal University Fuzhou 350007 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
Boolean functions with large algebraic immunity resist algebraic attacks to a certain degree, but they may not resist fast algebraic attacks (FAA's). It is necessary to study the resistance of Boolean functions ag... 详细信息
来源: 评论
Fuzzy identity-based threshold signature scheme based on bilinear maps
Fuzzy identity-based threshold signature scheme based on bil...
收藏 引用
2012 5th International Conference on Biomedical Engineering and Informatics, BMEI 2012
作者: Wang, Chang-Ji Kim, Jung-Tae School of Information Science and Technology Sun Yat-sen University Guangzhou 510275 China Research Center of Software Technology for Information Service South China Normal University Guangzhou 501631 China Department of Electronic Engineering Network and Information Security Lab Mokwon University Taejon 302729 Korea Republic of
Threshold signature is a useful tool for sharing the power to sign, which has been extensively studied in the certificate-based public key setting and identity-based setting. Inspired by the work of Sahai and Waters&#... 详细信息
来源: 评论
A Trust Model Based on Cloud Model and Bayesian networks
收藏 引用
Procedia Environmental Sciences 2011年 11卷 452-459页
作者: Bo Jin Yong Wang Zhenyan Liu Jingfeng Xue Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) Shanghai China School of Software Beijing Institute of Technology Beijing China
the Internet has been becoming the most important infrastructure for distributed applications which are composed of online services. In such open and dynamic environment, service selection becomes a challenge. The app... 详细信息
来源: 评论
A Trust Model Based on Cloud Model and Bayesian networks
A Trust Model Based on Cloud Model and Bayesian Networks
收藏 引用
2011 2ND International Conference on Innovative Computing and Communication and 2011 Asia-Pacific Conference on Information technology and Ocean Engineering(CICC-ITOE 2011)
作者: Bo Jin Yong Wang Zhenyan Liu Jingfeng Xue Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) School of Software Beijing Institute of Technology
the Internet has been becoming the most important infrastructure for distributed applications which are composed of online services. In such open and dynamic environment, service selection becomes a challenge. The app... 详细信息
来源: 评论