咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 385 篇 期刊文献

馆藏范围

  • 1,057 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 630 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,021 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1057 条 记 录,以下是701-710 订阅
排序:
Active Defense Technology Based on Natural Software Diversity in Java Web Services
收藏 引用
Journal of Physics: Conference Series 2020年 第3期1550卷
作者: Zhenwu Liu Zheng Zhang Hao Liu Gaofei Zhang Yuan Chen State key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou HeNan 450001 China PLA Strategic Support Force Information Engineering University ZhengZhou HeNan 450001 China Jiangnan Institute of Computing Technology WuXi JiangSu 214083 China
With the popular use of network application services and the growing number of users, web services have become the main target of hackers. Traditional single software has insufficient security protection against unkno...
来源: 评论
Constructing PLC Binary Program Model for Detection Purposes
Constructing PLC Binary Program Model for Detection Purposes
收藏 引用
1st International Conference on advanced Algorithms and Control engineering, ICAACE 2018
作者: Chang, Tianyou Wei, Qiang Geng, Yangyang Zhang, Hongwei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China People's Bank of China Center Branch of Zhoukou City Zhoukou Henan466000 China
Programmable Logic Controller (PLC) programs are vulnerable to tampering attacks with addition of malware, which can substantially cause severe physical destructions. In order to solve the problems, We propose a stati... 详细信息
来源: 评论
Topology-Aware Software Assignment in Networked Systems
收藏 引用
Journal of Physics: Conference Series 2019年 第4期1213卷
作者: Junchao Wang Hao Liu Zhenwu Liu Zheng Zhang Jianmin Pang State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Cyberspace mimic defense has been proven to be a revolutionary defense technology that 'changes the rules of the game' to ensure the security of cyberspace. However, the software diversity inherent in mimic de...
来源: 评论
A Framework for Multi-Variant Execution Environment
收藏 引用
Journal of Physics: Conference Series 2019年 第1期1325卷
作者: Wang Junchao Liu Zhenwu Liu Hao Pang Jianmin State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Software diversity has been proven to be an effective approach to enhance system security. To make the best of the advantage brought by software diversity, a multi-variant execution environment is needed. However, alt...
来源: 评论
Attacking Intel UEFI by Using Cache Poisoning
收藏 引用
Journal of Physics: Conference Series 2019年 第4期1187卷
作者: Dong Wang Wei Yu Dong State Key Laboratory of Mathematical Engineering And Advanced Computing Zhengzhou China
The Unified Extensible Firmware Interface (UEFI) is a software interface between an operating system and platform firmware designed to replace a traditional BIOS. In this paper, we evaluated the security mechanisms us...
来源: 评论
Observation of topological edge states in thermal diffusion
arXiv
收藏 引用
arXiv 2021年
作者: Hu, Hao Han, Song Yang, Yihao Liu, Dongjue Xue, Haoran Liu, Gui-Geng Cheng, Zheyu Wang, Qi Jie Zhang, Shuang Zhang, Baile Luo, Yu School of Electrical and Electronic Engineering Nanyang Technological University 50 Nanyang Avenue Singapore639798 Singapore Interdisciplinary Center for Quantum Information State Key Laboratory of Modern Optical Instrumentation College of Information Science and Electronic Engineering Zhejiang University Hangzhou310027 China ZJU-Hangzhou Global Science and Technology Innovation Center Key Lab. of Advanced Micro/Nano Electronic Devices & Smart Systems of Zhejiang Zhejiang University Hangzhou310027 China International Joint Innovation Center ZJU-UIUC Institute Zhejiang University Haining314400 China Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University 21 Nanyang Link Singapore637371 Singapore Department of Physics University of Hong Kong Hong Kong Department of Electrical & Electronic Engineering University of Hong Kong China Centre for Disruptive Photonic Technologies Nanyang Technological University Singapore637371 Singapore
The topological band theory predicts that bulk materials with nontrivial topological phases support topological edge states. This phenomenon is universal for various wave systems and has been widely observed for elect... 详细信息
来源: 评论
A Static Backward Taint Data Analysis Method for Detecting Web Application Vulnerabilities  9
A Static Backward Taint Data Analysis Method for Detecting W...
收藏 引用
2017 9th IEEE International Conference on Communication Software and Networks (ICCSN 2017)
作者: Xuexiong Yan Hengtai Ma Qingxian Wang Institute of Software Chinese Academy of Sciences State Key Laboratory of Mathematical Engineering and Advanced Computing Institute of Software Chinese Academy of Sciences State Key Laboratory of Mathematical Engineering and Advanced Computing
This paper addresses detecting taint-style Thisvulnerabilities in PHP code. It extends classical taint-style model with an element called "cleans", which is used to specify sanitation routines. Based on the ... 详细信息
来源: 评论
Research on Programmable Logic Controller Security
收藏 引用
IOP Conference Series: Materials Science and engineering 2019年 第4期569卷
作者: Haolan Wu Yangyang Geng Ke Liu Wenwen Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
With the convergence of computer technology and industrial networks, attackers are not limited to attacking only individual users' computers, turning to attack industrial control systems that can cause major infra...
来源: 评论
Mobile APP user attribute prediction by heterogeneous information network modeling
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Hekai Gong, Jibing Teng, Zhiyong Wang, Dan Wang, Hongfei Du, Linfeng Bhuiyan, Zakirul Alam School of Information Science and Engineering Yanshan University Qinhuangdao066004 China Key Lab for Computer Virtual Technology and System Integration Yanshan University Qinhuangdao066004 China School of Computer Science and Engineering Beihang University Beijing100191 China Shenyuan Honors College Beihang University Beijing100191 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214000 China Department of Computer and Information Sciences Fordham University
User-based attribute information, such as age and gender, is usually considered as user privacy information. It is difficult for enterprises to obtain user-based privacy attribute information. However, user-based priv... 详细信息
来源: 评论
An anti-side-channel virtual CPU scheduling algorithm based on leakage evaluation for virtual machine security  7
An anti-side-channel virtual CPU scheduling algorithm based ...
收藏 引用
2017 7th International Workshop on Computer Science and engineering, WCSE 2017
作者: Du, Yuanzhi Du, Xuehui Yang, Zhi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Infrastructure as a service (IaaS) which is one of the cloud computing's service modes provides virtual machines to clients via shared physical machines. This Service provides convenience for many enterprises, but... 详细信息
来源: 评论