咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 388 篇 期刊文献

馆藏范围

  • 1,060 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 713 篇 工学
    • 522 篇 计算机科学与技术...
    • 413 篇 软件工程
    • 117 篇 信息与通信工程
    • 75 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 66 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 化学工程与技术
    • 27 篇 光学工程
    • 25 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 413 篇 理学
    • 200 篇 数学
    • 170 篇 物理学
    • 74 篇 生物学
    • 55 篇 统计学(可授理学、...
    • 41 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 26 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 protocols
  • 11 篇 heuristic algori...

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 43 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 26 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,025 篇 英文
  • 21 篇 中文
  • 15 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1060 条 记 录,以下是421-430 订阅
排序:
Distributed key Revocation Scheme Based on Shared Binary Tree
Distributed Key Revocation Scheme Based on Shared Binary Tre...
收藏 引用
2015 IEEE International Conference on Progress in Informatics and computing(PIC 2015)
作者: Shaoren Wang Xuehui Du Zhi Yang State Key Laboratory of Mathematical Engineering and Advanced Computing
Concerning the identity-based binary tree key revocation scheme, the storage and use of binary tree can not be guaranteed in open cloud environment. This paper proposes a distributed key revocation scheme based on sha... 详细信息
来源: 评论
Cross-Platform Embedded-System Dynamic Information Acquisition Method
Cross-Platform Embedded-System Dynamic Information Acquisiti...
收藏 引用
2017 2nd International Conference on Computer engineering,Information Science and Internet Technology(CII 2017)
作者: YISEN WANG JING JING JIANJING SHEN WEIYU DONG State Key Laboratory of Mathematical Engineering and Advanced Computing
With the widespread application of embedded devices,embedded software vulnerabilities and oriented attacks to embedded system are also *** being wellknown,the hardware architecture of the embedded devices is heterogen... 详细信息
来源: 评论
Research on external storages management of virtual machine
Research on external storages management of virtual machine
收藏 引用
2nd International Conference on Mechanical engineering, Industrial Electronics and Informatization, MEIEI 2013
作者: Wang, Xiao Rui Wang, Qing Xian China National Digital Switching System Engineering and Technological Research Center Zhengzhou 450002 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China
To deal with the problem of external storages management in multiple virtual machines environment, a system design scheme of external storages management is proposed with the idea of virtual memory management and prot... 详细信息
来源: 评论
A Technique for Bytecode Decompilation of PLC Program
A Technique for Bytecode Decompilation of PLC Program
收藏 引用
2017 IEEE 第2届先进信息技术,电子与自动化控制国际会议(IAEAC 2017)
作者: Xuefeng LV Yaobin Xie Xiaodong Zhu Lu Ren State Key Laboratory of Mathematical Engineering and Advanced Computing
Program logical controllers(PLCs) are the kernel equipment of industrial control system(ICS) as they directly monitor and control industrial processes. Recently, ICS is suffering from various cyber th
来源: 评论
Route Intrusion Detection Based on Long Short Term Memory Recurrent Neural Network
Route Intrusion Detection Based on Long Short Term Memory Re...
收藏 引用
2017 2nd International Conference on Computer engineering,Information Science and Internet Technology(CII 2017)
作者: YUCHEN LIU SHENGLI LIU YANG WANG State Key Laboratory of Mathematical Engineering and Advanced Computing
With the rapid development and extensive use of the Internet,network security is the key point of the current research of computer *** router is the key interconnection equipment in the Internet system,and it is neces... 详细信息
来源: 评论
A Framework for Multi-Variant Execution Environment
A Framework for Multi-Variant Execution Environment
收藏 引用
作者: Wang Junchao Liu Zhenwu Liu Hao Pang Jianmin State key Laboratory of Mathematical Engineering and Advanced Computing
Software diversity has been proven to be an effective approach to enhance system *** make the best of the advantage brought by software diversity,a multi-variant execution environment is ***,although some MVEEs have b... 详细信息
来源: 评论
Static Detection of Execution After Redirect Vulnerabilities in PHP Applications
Static Detection of Execution After Redirect Vulnerabilities...
收藏 引用
2016 IEEE 7th International Conference on Software engineering and Service Science
作者: Chuansen Chai Xuexiong Yan Qingxian Wang Shukai Liu State Key Laboratory of Mathematical Engineering and Advanced Computing
In recent years,modern web applications are becoming more and more complex and it makes difficult for developers to audit the *** number of attacks against these applications has increased *** detection techniques for... 详细信息
来源: 评论
Recurrent Neural Network Based Binary Code Vulnerability Detection
Recurrent Neural Network Based Binary Code Vulnerability Det...
收藏 引用
2019第二届算法、计算和人工智能国际会议
作者: Jianyun Zheng Jianmin Pang Xiaochuan Zhang Xin Zhou MingLiang Li Jun Wang State Key Laboratory of Mathematical Engineering and Advanced Computing
Vulnerability detection, especially vulnerability automatic detection, have long been an area of active research. Considering that RNN can model dependencies automatically, we propose a recurrent neural network(RNN) b... 详细信息
来源: 评论
Software Supply Chain Analysis Based on Function Similarity
Software Supply Chain Analysis Based on Function Similarity
收藏 引用
作者: Wenjie Sun Zheng Shan Fudong liu Xingwei Li Meng Qiao Chunyan Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing
The supply of open source and open source components is growing at an alarming rate,while vulnerabilities in open source components are *** supply chain analysis aims to discover third-party components and open source... 详细信息
来源: 评论
Research on Cascading Failures of Power Grid
Research on Cascading Failures of Power Grid
收藏 引用
作者: Hongmin WANG Qiang WEI Yaobin XIE State Key Laboratory of Mathematical Engineering and Advanced Computing
The safe and stable operation of power system is related to the national economy and people's livelihood of the whole *** are almost always caused by cascading *** paper first analyzes the global blackouts in the ... 详细信息
来源: 评论