×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [5]
清华大学 [1]
武汉理工大学 [1]
软件研究所 [1]
内容类型
期刊论文 [5]
会议论文 [3]
发表日期
2018 [3]
2016 [1]
2009 [1]
2008 [2]
2002 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共8条,第1-8条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Traffic characteristic map-based intrusion detection model for industrial internet
期刊论文
International Journal of Network Security, 2018, 卷号: 20, 期号: 2, 页码: 359-370
作者:
Dong, Rui-Hong
;
Wu, Dong-Fang
;
Zhang, Qiu-Yu
;
Zhang, Tao
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/14
Discrete cosine transforms
Hash functions
Singular value decomposition
Discrete Cosine Transform(DCT)
Hash digest
Industrial controls
Information entropy method
Intrusion detection models
Network traffic
Rule set
Singular value decomposition method
Mutual information-based intrusion detection model for industrial Internet
期刊论文
International Journal of Network Security, 2018, 卷号: 20, 期号: 1, 页码: 131-140
作者:
Dong, Rui-Hong
;
Wu, Dong-Fang
;
Zhang, Qiu-Yu
;
Duan, Hong-Xiang
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/14
Classification (of information)
Discrete cosine transforms
Factorization
Feature extraction
Matrix algebra
Classification accuracy
Internet intrusion detection
Intrusion detection models
Mutual informations
Nonnegative matrix factorization
NSL-KDD data
Perceptual hash
Traffic characteristics
An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string
期刊论文
International Journal of Information and Communication Technology, 2018, 卷号: 12, 期号: 1-2, 页码: 31-50
作者:
Qiuyu, Zhang
;
Pengfei, Xing
;
Yibo, Huang
;
Ruihong, Dong
;
Zhongping, Yang
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
Authentication
Discrete wavelet transforms
Frequency domain analysis
Signal reconstruction
Speech
Speech communication
Time domain analysis
Wavelet decomposition
Authentication algorithm
Coefficients of low frequencies
Frequency domains
Localisation
Mobile computing environment
Perceptual hashing
Short-time energy
Symmetric ternary string
基于彩虹表的时间-存储折中攻击改进算法
期刊论文
2016, 2016
郑中翔
;
吉庆兵
;
于红波
;
ZHENG Zhong-Xiang
;
JI Qing-Bing
;
YU Hong-Bo
收藏
  |  
浏览/下载:7/0
cryptanalysis of the lane hash function
会议论文
16th Annual International Workshop on Selected Areas Cryptography, Calgary, CANADA, AUG 13-14,
Wu Shuang
;
Feng Dengguo
;
Wu Wenling
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2011/03/20
hash function
collision attack
rebound attack
LANE
SHA-3 candidates
Research of spam filtering system based on LSA and SHA
会议论文
Beijing, China, September 24, 2008 - September 28, 2008
作者:
Sun, Jingtao
;
Zhang, Qiuyu
;
Yuan, Zhanting
;
Huang, Wenhan
;
Yan, Xiaowen
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/15
Hash functions
Semantics
Latent Semantic Analysis
Mail characteristic ID
Secure hash algorithm
Slipping windows
Spam filtering
Research of Spam Filtering System Based on LSA and SHA
会议论文
作者:
Sun, Jingtao
;
Zhang, Qiuyu
;
Yuan, Zhanting
;
Huang, Wenhan
;
Yan, Xiaowen
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/15
Latent Semantic Analysis
Secure Hash Algorithm
Mail Characteristic ID
Slipping Windows
Spain Filtering
Hash function and turbo code for invisible communication
期刊论文
Digest of Technical Papers - IEEE International Conference on Consumer Electronics, 2002, 页码: 16-17
作者:
Yang, J*
;
Lee, MH
;
Xu, YL
;
Park, JY
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/04
©版权所有 ©2017 CSpace - Powered by
CSpace