×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [6]
湖南大学 [2]
北京航空航天大学 [1]
计算技术研究所 [1]
自动化研究所 [1]
沈阳自动化研究所 [1]
更多...
内容类型
期刊论文 [9]
会议论文 [2]
专利 [1]
发表日期
2019 [12]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共12条,第1-10条
帮助
限定条件
发表日期:2019
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Privacy Protection in Transformer-based Neural Network
会议论文
中国深圳, 2019年7月5日
作者:
Lang, Jiaqi
;
Li, Linjing
;
Chen, Weiyun
;
Zeng, Daniel
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/06/09
Research on secure routing technology based on NDN for VANET
会议论文
Hong Kong, Hong kong, June 1, 2019 - June 3, 2019
作者:
Gai, Xiaowei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/11/15
Cryptography
Distributed computer systems
Dynamics
Floods
Memory architecture
Mobile security
Mobile telecommunication systems
Network architecture
Network routing
Signal processing
Transmission control protocol
Vehicular ad hoc networks
Data network
Forward-secure
Identity based cryptography
Named data networkings
Network environments
Security requirements
Trust values
Wireless mobile networks
TPM-BASED INDUSTRIAL CONTROL TRUSTED EMBEDDED PLATFORM ACTIVATION METHOD [EN]
专利
申请日期: 2019-03-28,
作者:
Zeng P(曾鹏)
;
Shang WL(尚文利)
;
Liu XD(刘贤达)
;
Zhao JM(赵剑明)
;
Chen CY(陈春雨)
收藏
  |  
浏览/下载:43/0
  |  
提交时间:2019/07/09
RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks
期刊论文
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2019, 卷号: 15, 期号: 4, 页码: 21
作者:
Song, Wei
;
Hou, Rui
;
Zhang, Jun
;
Zhang, Lixin
;
Meng, Dan
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2019/04/03
Code-reuse attacks
return-oriented programming attacks
message authentication code
AES-128
key management
PUF
Modeling a Multi-target Attacker-defender Game with Multiple Attack Types
期刊论文
Reliability Engineering & System Safety, 2019
作者:
Jing Zhang
;
Jun Zhuang
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/13
Homeland
security
Attacker-defender
Game
Attacker
types
Game
Theory
Modeling a multi-target attacker-defender game with multiple attack types
期刊论文
Reliability Engineering & System Safety, 2019, 卷号: Vol.185, 页码: 465-475
作者:
Jing Zhang
;
Jun Zhuang
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/13
Homeland
security
Attacker-defender
game
Attacker
types
Game
theory
Modeling and clustering attacker activities in IoT through machine learning techniques
期刊论文
INFORMATION SCIENCES, 2019, 卷号: 479, 页码: 456-471
作者:
Sun, Peiyuan
;
Li, Jianxin
;
Bhuiyan, Md Zakirul Alam
;
Wang, Lihong
;
Li, Bo
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
IoT
Botnet
Multivariate Hawkes Process
MPR Based Secure Content Routing Scheme for NDN-MANET
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2019, 卷号: 20, 期号: 5, 页码: 1625-1636
作者:
Guo, Xian
;
Zhang, Ma-Jiang
;
Ngaboyindekwe, Aristide
;
Fang, Jun-Li
;
Wang, Jing
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/02/24
Named data networking
MANET
Merkle tree
Secure content routing
MPR based secure content routing scheme for NDN-MANET
期刊论文
Journal of Internet Technology, 2019, 卷号: 20, 期号: 5, 页码: 1625-1636
作者:
Guo, Xian
;
Zhang, Ma-Jiang
;
Ngaboyindekwe, Aristide
;
Fang, Jun-Li
;
Wang, Jing
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/11/14
Authentication
Floods
Forestry
Mobile ad hoc networks
Network security
Trees (mathematics)
Content routing
MANET
Merkle trees
Named data networkings
Security attributes
Security mechanism
Source authentication
Statistical detection
Dynamic Output Feedback Control of Cyber-Physical Systems Under DoS Attacks
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 181032-181040
作者:
Wang, Zhiwen
;
Li, Long
;
Sun, Hongtao
;
Zhu, Chaoqun
;
Xu, Xiangnan
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/06/02
Cyber-physical system
DoS attacks
dynamic output feedback control
stability analysis
©版权所有 ©2017 CSpace - Powered by
CSpace