咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 381 篇 期刊文献

馆藏范围

  • 1,053 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 707 篇 工学
    • 517 篇 计算机科学与技术...
    • 410 篇 软件工程
    • 113 篇 信息与通信工程
    • 71 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 生物工程
    • 60 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 633 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,021 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1053 条 记 录,以下是151-160 订阅
排序:
Path Sensitive Static Analysis of Taint-Style Vulnerabilities in PHP Code  17
Path Sensitive Static Analysis of Taint-Style Vulnerabilitie...
收藏 引用
2017 17th IEEE International Conference on Communication Technology (ICCT 2017)
作者: Xue-Xiong Yan Qing-Xian Wang Heng-Tai Ma Institute of Software Chinese Academy of Sciences State Key Laboratory of Mathematical Engineering and Advanced Computing
this paper presents a novel path-sensitive static analysis method for detecting taint-style vulnerabilities in PHP code. The new method includes three key, the first of which is path searching during a basic block, th... 详细信息
来源: 评论
The design of rotor position observer for dfig during transient grid voltage imbalance
UPB Scientific Bulletin, Series C: Electrical Engineering an...
收藏 引用
UPB Scientific Bulletin, Series C: Electrical engineering and Computer Science 2020年 第4期82卷 275-286页
作者: Wu, Qianqiong Chang, Xiaoying Zhao, Meihua Li, Mingwei College of electrical engineering and automation Luoyang Institute of Science and Technology Luoyang China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
A rotor position observer based on hysteresis comparator (HC) was presented to acquire the rotor position angle of the Doubly-fed induction generator (DFIG) under unbalanced grid Voltage conditions. The position and v... 详细信息
来源: 评论
NAS Honeypot Technology Based on Attack Chain  10th
NAS Honeypot Technology Based on Attack Chain
收藏 引用
10th International Conference on Computer engineering and Networks, CENet 2020
作者: Liu, Bing Shu, Hui Kang, Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
With the wide application of network attached storage (NAS), the security problem is becoming more and more serious, together with the increasingly fierce attacks against NAS devices of different manufacturers. In ord... 详细信息
来源: 评论
A software upgrade security analysis method on network traffic classification using deep learning
A software upgrade security analysis method on network traff...
收藏 引用
2020 International Conference on Urban engineering and Management Science, ICUEMS 2020
作者: Zhang, Bing State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
Nowadays, the vulnerability in the software upgrade process are extremely harmful to network security. However, the detection of upgrade vulnerability is facing serious difficulties and problems. Aiming at the current... 详细信息
来源: 评论
DDoS defense mechanism analysis based on signaling game model
DDoS defense mechanism analysis based on signaling game mode...
收藏 引用
2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC 2013
作者: Gao, Xiang Zhu, Yue-Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou City China
DDoS attack and defense is regarded as a multistage signaling game with observable actions. Its extensive form is given out, and its perfect bayesian nash equilibrium is solved. The current problems encountered by DDo... 详细信息
来源: 评论
A dynamic network change detection method using network embedding  4th
A dynamic network change detection method using network embe...
收藏 引用
4th International Conference on Cloud computing and Security, ICCCS 2018
作者: Sun, Tong Liu, Yan China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic networks are ubiquitous. Detecting dynamic network changes is helpful to understand the network development trend and discover network anomalies in time. It is a research hotspot at present. The structure of t... 详细信息
来源: 评论
Recurrent neural network based binary code vulnerability detection  2
Recurrent neural network based binary code vulnerability det...
收藏 引用
2nd International Conference on Algorithms, computing and Artificial Intelligence, ACAI 2019
作者: Zheng, Jianyun Pang, Jianmin Zhang, Xiaochuan Zhou, Xin Li, MingLiang Wang, Jun State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
Vulnerability detection, especially vulnerability automatic detection, have long been an area of active research. Considering that RNN can model dependencies automatically, we propose a recurrent neural network (RNN) ... 详细信息
来源: 评论
The Executors Scheduling Algorithm for the Web Server Based on the Attack Surface
The Executors Scheduling Algorithm for the Web Server Based ...
收藏 引用
2020 IEEE International Conference on Advances in Electrical engineering and Computer Applications, AEECA 2020
作者: Nie, Guanglai Zhang, Zheng Zhao, Yufeng Meac State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the existing scheduling algorithms of mimicry structure, the random algorithm cannot solve the problem of large vulnerability window in the process of random scheduling. Based on known vulnerabilities, the algorith... 详细信息
来源: 评论
Research on Cascading Failures of Power Grid
Research on Cascading Failures of Power Grid
收藏 引用
2021 International Conference on Applied Mathematics, Modeling and Computer Simulation, AMMCS 2021
作者: Wang, Hongmin Wei, Qiang Xie, Yaobin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The safe and stable operation of power system is related to the national economy and people's livelihood of the whole country. Blackouts are almost always caused by cascading failures. This paper first analyzes th... 详细信息
来源: 评论
RLGBG: A Reachable Landmark Grouping Based IP Geolocation Method for Unreachable Target  29th
RLGBG: A Reachable Landmark Grouping Based IP Geolocation Me...
收藏 引用
29th International Conference on Computational and Experimental engineering and Sciences, ICCES 2023
作者: Zu, Shuodi Liu, Chong Zhang, Fan Ding, Shichang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
IP geolocation technology can estimate or determine the geographical location of terminal device through IP address, which is an important basis for location-based network services. The existing IP geolocation methods... 详细信息
来源: 评论