咨询与建议

限定检索结果

文献类型

  • 718 篇 会议
  • 379 篇 期刊文献

馆藏范围

  • 1,097 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 711 篇 工学
    • 517 篇 计算机科学与技术...
    • 417 篇 软件工程
    • 109 篇 信息与通信工程
    • 71 篇 网络空间安全
    • 70 篇 电子科学与技术(可...
    • 65 篇 控制科学与工程
    • 62 篇 生物工程
    • 55 篇 电气工程
    • 39 篇 仪器科学与技术
    • 36 篇 化学工程与技术
    • 31 篇 机械工程
    • 29 篇 光学工程
    • 22 篇 航空宇航科学与技...
    • 20 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 17 篇 核科学与技术
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
  • 454 篇 理学
    • 212 篇 物理学
    • 182 篇 数学
    • 72 篇 生物学
    • 69 篇 地球物理学
    • 57 篇 统计学(可授理学、...
    • 39 篇 化学
    • 31 篇 系统科学
  • 152 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 65 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 27 篇 法学
    • 20 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 经济学
  • 10 篇 医学
  • 7 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 31 篇 feature extracti...
  • 28 篇 network security
  • 26 篇 cosmic rays
  • 26 篇 security
  • 25 篇 semantics
  • 23 篇 deep learning
  • 21 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 machine learning
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 algorithm design...
  • 13 篇 optimization
  • 13 篇 data mining
  • 13 篇 data models
  • 12 篇 network topology
  • 12 篇 computational mo...
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 635 篇 state key labora...
  • 97 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 yunnan observato...
  • 94 篇 school of physic...
  • 93 篇 university of ch...
  • 90 篇 center for astro...
  • 89 篇 institute of fro...
  • 89 篇 college of physi...
  • 89 篇 school of physic...
  • 89 篇 moscow institute...
  • 89 篇 school of astron...
  • 88 篇 national space s...
  • 87 篇 key laboratory f...
  • 87 篇 school of physic...
  • 85 篇 department of ph...
  • 78 篇 department of en...
  • 75 篇 national astrono...

作者

  • 91 篇 danzengluobu
  • 90 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 liu d.
  • 76 篇 bastieri d.
  • 76 篇 jiang k.
  • 76 篇 kuleshov d.
  • 75 篇 liu s.m.
  • 75 篇 huang d.h.
  • 75 篇 dai h.l.
  • 74 篇 chen m.j.
  • 73 篇 liu b.
  • 72 篇 guo y.q.
  • 72 篇 bao y.w.
  • 72 篇 hu h.b.
  • 70 篇 li xin
  • 70 篇 chen y.
  • 69 篇 li cheng
  • 68 篇 min z.

语言

  • 1,055 篇 英文
  • 22 篇 中文
  • 20 篇 其他
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou"
1097 条 记 录,以下是151-160 订阅
排序:
Automatic binary de-obfuscation based compiler optimization  6th
收藏 引用
6th International Conference on Swarm Intelligence, ICSI 2015 held in conjunction with the 2nd BRICS Congress on Computational Intelligence, CCI 2015
作者: Lin, Wei Fei, Jin-Long Cai, Rui-Jie State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
Junk code increase manual analysis difficulty in reverse engineering, and seriously disturb the automatic analysis process of ant code obfuscating, so find a junk code removing method has a great significance in the f... 详细信息
来源: 评论
A survey of proactive defense in industrial control system
A survey of proactive defense in industrial control system
收藏 引用
2022 International Conference on Electronic Information Technology, EIT 2022
作者: Liu, Ke Wu, Qianqiong Geng, Yangyang Ma, Rongkuan Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
With the development of Industrial 4.0, the popularity of information technology (IT) systems in industrial control systems (ICSs) has brought great cyber-attack risk. The proactive defense technology, an important de... 详细信息
来源: 评论
Network security assessment based on full host-based attack graph
Network security assessment based on full host-based attack ...
收藏 引用
2020 International Conference on Cyberspace Innovation of advanced Technologies, CIAT 2020
作者: Wang, Xiao-Fan Zhou, Tian-Yang Zhu, Jun-Hu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Network security assessment is an important method of evaluating network security. The existing researches of network security assessment have the problem that the method is not comprehensive and accurate. In order to... 详细信息
来源: 评论
Binary vulnerability mining technology based on neural network feature fusion  5
Binary vulnerability mining technology based on neural netwo...
收藏 引用
5th International Conference on advanced Electronic Materials, Computers and Software engineering, AEMCSE 2022
作者: Han, Wenjie Pang, Jianmin Zhou, Xin Zhu, Di State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
The high complexity of software and the diversity of security vulnerabilities have brought severe challenges to the research of software security vulnerabilities Traditional vulnerability mining methods are inefficien... 详细信息
来源: 评论
Research on key Technology of Industrial Network Boundary Protection based on Endogenous Security  4
Research on Key Technology of Industrial Network Boundary Pr...
收藏 引用
4th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2021
作者: Yu, Fei Wei, Qiang Geng, Yangyang Wang, Yunchao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Industrial network boundary protection equipment faces threats from attackers when protecting the industrial control system network. The similarity and static characteristics caused by large-scale and long-term deploy... 详细信息
来源: 评论
Analysis of security capability of MVX based on probabilistic attack and defense models  3
Analysis of security capability of MVX based on probabilisti...
收藏 引用
3rd International Conference on Computer Science and Communication Technology, ICCSCT 2022
作者: Liu, Zijing Zhang, Zheng Xi, Ruicheng Zhu, Pengzhe State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Multi Variant eXecution (MVX) is a security defense technique that uses software diversity to protect system from attacks. MVX improves security capability by enhancing system endogenous security compared to tradition... 详细信息
来源: 评论
Anti-obfuscation Binary Code Clone Detection Based on Software Gene  7th
Anti-obfuscation Binary Code Clone Detection Based on Softwa...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Tang, Ke Liu, Fudong Shan, Zheng Zhang, Chunyan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Information technology facilitates people’s lives greatly, while it also brings many security issues, such as code plagiarism, software in-fringement, and malicious code. In order to solve the problems, reverse engin... 详细信息
来源: 评论
Steady-state Topology Discovery of Target Networks Based on Statistics Method  5th
Steady-State Topology Discovery of Target Networks Based on ...
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Yang, Di Liu, Yan Chen, Jing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The progress of target network topology discovery research is slow due to the uncertainty of the target network range, and large-scale network measurement activities lead to a large accumulation of "false links&q... 详细信息
来源: 评论
The attack surface shifting in the mimic defense system  4
The attack surface shifting in the mimic defense system
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Wang, Liqun Zhang, Zheng Li, Weichao Liu, Hao MEAC State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The notion of attack surface shifting is introduced to describe the situation of shifting the attack surface in the moving target defense system. However, the situation of shifting the attack surface in the mimic defe... 详细信息
来源: 评论
Research on Programmable Logic Controller Security  2
Research on Programmable Logic Controller Security
收藏 引用
2019 2nd International Conference on advanced Materials, Intelligent Manufacturing and Automation, AMIMA 2019
作者: Wu, Haolan Geng, Yangyang Liu, Ke Liu, Wenwen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
With the convergence of computer technology and industrial networks, attackers are not limited to attacking only individual users' computers, turning to attack industrial control systems that can cause major infra... 详细信息
来源: 评论