咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 381 篇 期刊文献

馆藏范围

  • 1,053 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 707 篇 工学
    • 517 篇 计算机科学与技术...
    • 410 篇 软件工程
    • 113 篇 信息与通信工程
    • 71 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 生物工程
    • 60 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 633 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,021 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1053 条 记 录,以下是101-110 订阅
排序:
UEFI Trusted computing Vulnerability Analysis Based on state Transition Graph  6
UEFI Trusted Computing Vulnerability Analysis Based on State...
收藏 引用
6th IEEE International Conference on Computer and Communications, ICCC 2020
作者: Gu, Yanyang Zhang, Ping Chen, Zhifeng Cao, Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the face of increasingly serious firmware attacks, it is of great significance to analyze the vulnerability security of UEFI. This paper first introduces the commonly used trusted authentication mechanisms of UEFI.... 详细信息
来源: 评论
Carrying multicast traffic across domain by per-access-network based Wide-Sense Circuit Tree
Carrying multicast traffic across domain by per-access-netwo...
收藏 引用
2013 IEEE International Conference of IEEE Region 10, IEEE TENCON 2013
作者: Yue, Chen Chaoling, Li Kaixiang, Huang Xiaobo, Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
IP multicast suffers from scalability and QoS provisioning problems when supporting large scale group communication cross domain. To solve the problems, we propose WSCT-PAN, a per-access-network based wide-sense circu... 详细信息
来源: 评论
Dynamic Resampling Based Boosting Random Forest for Network Anomaly Traffic Detection  36th
Dynamic Resampling Based Boosting Random Forest for Network...
收藏 引用
36th International Conference on Industrial, engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2023
作者: Ren, Huajuan Wang, Ruimin Dong, Weiyu Li, Junhao Tang, Yonghe State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Network anomaly traffic detection is an important technique for detecting intrusion activities and maintaining cyberspace security. Random forest is widely used in network anomalous traffic detection due to its good d... 详细信息
来源: 评论
Steganalysis of Adaptive Steganography Under the Known Cover Image  1st
Steganalysis of Adaptive Steganography Under the Known Cover...
收藏 引用
1st International Conference on Security and Privacy in Digital Economy, SPDE 2020
作者: Li, Jialin Luo, Xiangyang Zhang, Yi Zhang, Pei Yang, Chunfang Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Digital image steganography is one of the important ways to achieve covert communication to protect users’ data privacy. Steganalysis technology is the key technology to check the security of steganography, and the e... 详细信息
来源: 评论
HDBFuzzer-Target-oriented Hybrid Directed Binary Fuzzer  21
HDBFuzzer-Target-oriented Hybrid Directed Binary Fuzzer
收藏 引用
5th International Conference on Computer Science and Application engineering, CSAE 2021
作者: Yu, Yingchao Qin, Xiaojun Gan, Shuitao State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
In this paper, we propose a target-oriented hybrid directed binary fuzzer (HDBFuzzer) to solve the vulnerability confirmation problem based on binary code similarity comparison. HDBFuzzer combines macro function level... 详细信息
来源: 评论
The optimization algorithm based on vector space model to determine the influence of microblogging text
The optimization algorithm based on vector space model to de...
收藏 引用
作者: Dong, Yu Chen Liu, Yan Luo, Jun Yong Zhang, Jin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
This article uses the vector space model to express microblogging text in quantity, via the cosine of the angle of text clustering method to calculate the similarity between the text. We can generate alternative micro... 详细信息
来源: 评论
Analysis of TLS Encrypted Communication Behavior Based on Bipartite Graph and Traffic Information Embedding  4
Analysis of TLS Encrypted Communication Behavior Based on Bi...
收藏 引用
4th IEEE International Conference on Computer and Communication engineering Technology, CCET 2021
作者: Yan, Lin Jiang, Liehui Wang, Ruimin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Currently, encrypted traffic using the TLS protocol is widely used, and there are a lot of malicious and unknown behaviors. It is an important goal in the research field to detect the traffic behavior of TLS and maint... 详细信息
来源: 评论
Research and Practice of Blending Teaching of Database System Integrating Ideological and Political Theories  3
Research and Practice of Blending Teaching of Database Syste...
收藏 引用
3rd IEEE International Conference on Computer Science and Educational Informatization, CSEI 2021
作者: Yao, Jinyang Liu, Fudong Wang, Junchao Zhao, Bo Shan, Zheng Xu, Peng Engineering and Advanced Computing State Key Laboratory of Mathematical Zhengzhou China
For the problem of the monotonous teaching form of the database system course, we integrate ideology and politics theories into the teaching design of the database system, combined with the 'Ideological and Politi... 详细信息
来源: 评论
Prediction Method of Attack Behavior Based on Stackelberg Security Game  5
Prediction Method of Attack Behavior Based on Stackelberg Se...
收藏 引用
5th IEEE International Conference on Computer and Communications, ICCC 2019
作者: Zhou, Tianyang Ge, Xiaoyue Zang, Yichao Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The essence of Network attack and Defense confrontation is the Game process between attacker and Defender. In the research of the existing network attack strategy, there is a priori hypothesis defect of equal status b... 详细信息
来源: 评论
Optimal scheme for dynamic adjustment of active mirror in FAST system  5
Optimal scheme for dynamic adjustment of active mirror in FA...
收藏 引用
5th International Conference on Computer Science and Artificial Intelligence, CSAI 2021
作者: Zhou, Hongchuan Liu, Jiaqi Song, Junyan Yang, Benchao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
This paper mainly studies the optimal scheme of dynamic adjustment of active mirror in FAST system by establishing mathematical model. According to the constraints such as distance variation range, a mathematical mode... 详细信息
来源: 评论