CORC

浏览/检索结果: 共67条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
内部人员异常行为检测分析及在金融领域的应用 学位论文
博士, 北京: 中国科学院大学, 2020
作者:  刘堃
收藏  |  浏览/下载:21/0  |  提交时间:2021/01/05
基于能力机会意图模型的网络安全态势感知方法 期刊论文
计算机应用研究, 2016, 卷号: 33, 期号: 6, 页码: 1775-1779
贾雪飞; 刘玉岭; 严妍; 吴迪
收藏  |  浏览/下载:34/0  |  提交时间:2016/12/09
用于内存安全监测的轻量虚拟机监控代理设计与实现 学位论文
硕士, 北京: 中国科学院研究生院, 2015
马乐乐
收藏  |  浏览/下载:21/0  |  提交时间:2015/06/26
A meet-in-the-middle attack on the LBlock cipher 会议论文
2013 IEEE Conference Anthology, ANTHOLOGY 2013, China, January 1, 2013 - January 8, 2013
Wei, Yongzhuang (1); Su, Chongmao (1); Ma, Chunbo (1)
收藏  |  浏览/下载:25/0  |  提交时间:2014/12/16
The theory and practice in the evolution of trusted computing 期刊论文
CHINESE SCIENCE BULLETIN, 2014, 卷号: 59, 期号: 32, 页码: 4173-4189
Feng, Dengguo; Qin, Yu; Feng, Wei; Shao, Jianxiong
收藏  |  浏览/下载:22/0  |  提交时间:2014/12/16
COMPARS: Toward an empirical approach for comparing the resilience of reputation systems 会议论文
4th ACM Conference on Data and Application Security and Privacy, CODASPY 2014, San Antonio, TX, United states, March 3, 2014 - March 5, 2014
Choo, Euijin (1); Jiang, Jianchun (2); Yu, Ting (3)
收藏  |  浏览/下载:25/0  |  提交时间:2014/12/16
A Novel privacy-preserving group matching scheme in social networks 会议论文
15th International Conference on Web-Age Information Management, WAIM 2014, Macau, China, June 16, 2014 - June 18, 2014
Chi, Jialin (1); Lv, Zhiquan (1); Zhang, Min (1); Li, Hao (1); Hong, Cheng (1); Feng, Dengguo (1)
收藏  |  浏览/下载:22/0  |  提交时间:2014/12/16
A general method to evaluate the correlation of randomness tests 会议论文
14th International Workshop on Information Security Applications, WISA 2013, Jeju Island, Korea, Republic of, August 19, 2013 - August 21, 2013
Fan, Limin (1); Chen, Hua (1); Gao, Si (1)
收藏  |  浏览/下载:23/0  |  提交时间:2014/12/16
Defending return-oriented programming based on virtualization techniques 期刊论文
Security and Communication Networks, 2013, 卷号: Volume 6, 期号: Issue 10, 页码: 1236-1249
Xiaoqi Jia; Rui Wang; Jun Jiang; Shengzhi Zhang; Peng Liu
收藏  |  浏览/下载:21/0  |  提交时间:2013/04/11
基于硬件虚拟化的软件安全沙盒技术研究 学位论文
硕士, 北京: 中国科学院大学, 2013
姜军
收藏  |  浏览/下载:19/0  |  提交时间:2013/05/22


©版权所有 ©2017 CSpace - Powered by CSpace