CORC

浏览/检索结果: 共9条,第1-9条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Vulnerability Analysis of Highway Traffic Networks Using Origin-destination Tollgate Data 其他
2016-01-01
Fang, Shi; Bian, Kaigui; Xie, Kunqing
收藏  |  浏览/下载:2/0  |  提交时间:2017/12/03
信息推送-澳大利亚宣布对848项研究注资5.8亿澳元(附心理学、认知科学及神经科学分类项目清单) 其他
2014-10-29
作者:  王玮
收藏  |  浏览/下载:96/0  |  提交时间:2014/10/29
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS 其他
2013-01-01
Dong, Xinshu; Chen, Zhaofeng; Siadati, Hossein; Tople, Shruti; Saxena, Prateek; Liang, Zhenkai
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/16
AVT vector: A quantitative security requirements evaluation approach based on assets, vulnerabilities and trustworthiness of environment 其他
2009-01-01
Teng, Long; Lin, Liu; Yijun, Yu; Zhi, Jin
收藏  |  浏览/下载:1/0  |  提交时间:2015/11/12
Analysis of ecological vulnerability based on landscape pattern and ecological sensitivity: a case of Duerbete County 其他
2008-01-01
Jiang, Miao; Gao, Wei; Chen, Xiuwan; Zhang, Xianfeng; Wei, Wenxia
收藏  |  浏览/下载:5/0  |  提交时间:2015/11/13
Fuzzy risk evaluation of geological hazard 其他
2008-01-01
Huang, Z. Q.; Zheng, M. H.; Li, H. X.
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/13
An economical model for the risk evaluation of DoS vulnerabilities in cryptography protocols 其他
2007-01-01
Cao, Zhen; Guan, Zhi; Chen, Zhong; Hu, Jianbin; Tang, Liyong
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
An economical model for the risk evaluation of DoS vulnerabilities in cryptography protocols 其他
2007-01-01
Cao, Zhen; Guan, Zhi; Chen, Zhong; Hu, Jianbin; Tang, Liyong
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/13
Protein interaction networks of Saccharomyces cerevisiae, Caenorhabditis elegans and Drosophila melanogaster: Large-scale organization and robustness 其他
2006-01-01
Li, D; Li, JQ; Ouyang, SG; Wang, J; Wu, SF; Wan, P; Zhu, YP; Xu, XJ; He, FC
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/11


©版权所有 ©2017 CSpace - Powered by CSpace