×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [6]
内容类型
会议论文 [5]
期刊论文 [1]
发表日期
2019 [1]
2018 [3]
2016 [1]
2015 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共6条,第1-6条
帮助
限定条件
专题:北京航空航天大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Incremental Theory Closure Reasoning for Large Scale Knowledge Graphs
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 24593-24601
作者:
Luo, Jie
;
Wang, Yifei
;
Xu, Yi
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/30
Cybersecurity
incremental reasoning
knowledge graph
knowledge reasoning
OWL2 RL
Analysis of Cybersecurity Threats on Connected Vehicles with CACC Based on an Improved Car-Following Model
会议论文
CICTP 2018: Intelligence, Connectivity, and Mobility - Proceedings of the 18th COTA International Conference of Transportation Professionals
作者:
Huang, L.
;
Wu, X.
;
Qin, H.
;
Wang, P.
;
Yu, G.
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/30
Accident prevention
Adaptive cruise control
Intelligent systems
Traffic control
Vehicles
Wireless telecommunication systems
Car following models
Connected vehicles
Cooperative adaptive cruise control
Intelligent transportation systems
MATLAB/ SIMULINK
Vehicle mobility
Wireless communications
Wireless connectivities
Vehicle to vehicle communications
When Machine Learning meets Security Issues: A survey
会议论文
2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SAFETY FOR ROBOTICS (ISR), 2018-01-01
作者:
Guan, Zhenyu
;
Bian, Liangxu
;
Shang, Tao
;
Liu, Jianwei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
machine learning
cybersecurity
threats
defense
Analysis of Cybersecurity Threats on Connected Vehicles with CACC Based on an Improved Car-Following Model
会议论文
18th COTA International Conference of Transportation Professionals: Intelligence, Connectivity, and Mobility, CICTP 2018, Beijing, China, 2018-07-05
作者:
Huang, Lei
;
Wu, Xinkai
;
Qin, Hongmao
;
Wang, Pengcheng
;
Yu, Guizhen
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Risk assessment method for cybersecurity of cyber-physical systems based on inter-dependency of vulnerabilities
会议论文
IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2015, Singapore, Singapore, 2015-12-06
作者:
Wu, Wenbo
;
Kang, Rui
;
Li, Zi
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
Risk Assessment Method for Cybersecurity of Cyber-Physical Systems Based on Inter-Dependency of Vulnerabilities
会议论文
2015 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2015-01-01
作者:
Wu, Wenbo
;
Kang, Rui
;
Li, Zi
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2020/01/06
cyber-physical system
cybersecurity
vulnerability inter-dependency graph
risk assessment
©版权所有 ©2017 CSpace - Powered by
CSpace