咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 381 篇 期刊文献

馆藏范围

  • 1,053 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 707 篇 工学
    • 517 篇 计算机科学与技术...
    • 410 篇 软件工程
    • 113 篇 信息与通信工程
    • 71 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 生物工程
    • 60 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 633 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,021 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1053 条 记 录,以下是171-180 订阅
排序:
A survey of proactive defense in industrial control system
A survey of proactive defense in industrial control system
收藏 引用
2022 International Conference on Electronic Information Technology, EIT 2022
作者: Liu, Ke Wu, Qianqiong Geng, Yangyang Ma, Rongkuan Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
With the development of Industrial 4.0, the popularity of information technology (IT) systems in industrial control systems (ICSs) has brought great cyber-attack risk. The proactive defense technology, an important de... 详细信息
来源: 评论
Research on the Protection Mechanism of Cisco IOS Exploit  4
Research on the Protection Mechanism of Cisco IOS Exploit
收藏 引用
4th International Conference on Data Mining, Communications and Information Technology, DMCIT 2020
作者: Wang, Jinzhu Cai, Ruijie Liu, Shengli State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Cisco IOS is an operating system that runs on Cisco routing and switching equipment. Its security is important to the entire network. Since vulnerability attacks have become one of the main sources of threat to Cisco ... 详细信息
来源: 评论
A binary translation backend registers allocation algorithm based on priority  5th
A binary translation backend registers allocation algorithm ...
收藏 引用
5th International Conference on Geo-Spatial Knowledge and Intelligence, GSKI 2017
作者: Wang, Jun Pang, Jianmin Fu, Liguo Shan, Zheng Yue, Feng Zhang, Jiahao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
As most binary translation systems don’t consider the difference of register requirements of basic blocks, which brings redundant memory access instructions caused by unnecessary registers overflow. To solve this pro... 详细信息
来源: 评论
An evaluation algorithm of the importance of network node based on community influence  1
收藏 引用
5th International Conference on Data Mining and Big Data, DMBD 2020
作者: He, Gongzhen Luo, Junyong Yin, Meijuan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Identifying nodes in social networks that have great influence on information dissemination is of great significance for monitoring and guiding information dissemination. There are few methods to study the influence o... 详细信息
来源: 评论
Defense method of ruby code injection attack based on instruction set randomization  20
Defense method of ruby code injection attack based on instru...
收藏 引用
8th International Conference on Computer and Communications Management, ICCCM 2020
作者: Wang, Jiang Yao, Yuan Zhang, Gaofei Li, Fangyun State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Code injection attack is a major security threat to applications, especially web applications. This type of attack stems from the attacker's ability to use the vulnerability/backdoor of the application to inject a... 详细信息
来源: 评论
Cluster-Based Routing Algorithm for WSN Based on Subtractive Clustering  16
Cluster-Based Routing Algorithm for WSN Based on Subtractive...
收藏 引用
16th IEEE International Wireless Communications and Mobile computing Conference, IWCMC 2020
作者: Chen, Ling Liu, Wenwen Gong, Daofu Chen, Yan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
The Cluster-based Routing Algorithm for Wireless Sensor Network based on Subtractive Clustering (SCC algorithm) generates nodes of cluster head in dense area of the node by relying on subtractive clustering. The appli... 详细信息
来源: 评论
Research on general permutation encryption module based on chaos theory  5
Research on general permutation encryption module based on c...
收藏 引用
2014 5th International Conference on Information Technology for Manufacturing Systems, ITMS 2014
作者: Sun, Wen Jie State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengzhouHenan China
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For exam... 详细信息
来源: 评论
Research on Programmable Logic Controller Security  2
Research on Programmable Logic Controller Security
收藏 引用
2019 2nd International Conference on advanced Materials, Intelligent Manufacturing and Automation, AMIMA 2019
作者: Wu, Haolan Geng, Yangyang Liu, Ke Liu, Wenwen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
With the convergence of computer technology and industrial networks, attackers are not limited to attacking only individual users' computers, turning to attack industrial control systems that can cause major infra... 详细信息
来源: 评论
A Survey of Security Analysis on Industrial Control Devices via Rehosting  3
A Survey of Security Analysis on Industrial Control Devices ...
收藏 引用
3rd IEEE International Conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2023
作者: Liu, Houzhi Ma, Rongkuan Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
At present, the network security of embedded devices has received more and more attention. However, the existing dynamic analysis tools can't performance in embedded devices as common softwares. The main reason is... 详细信息
来源: 评论
Network representation learning based extended matrix factorization for recommendation  6th
Network representation learning based extended matrix factor...
收藏 引用
6th International Conference on Artificial Intelligence and Security,ICAIS 2020
作者: Xu, Jinmao Gong, Daofu Liu, Fenlin Tan, Lei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The growing heterogeneous data in the Internet effectively improves the performance of recommender systems (RS). The main problem faced by the traditional matrix factorization (MF) is how to fuse more heterogeneous in... 详细信息
来源: 评论