×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [5]
湖南大学 [3]
兰州理工大学 [2]
西安交通大学 [2]
山东大学 [1]
内容类型
期刊论文 [8]
会议论文 [5]
发表日期
2022 [1]
2019 [2]
2018 [2]
2017 [1]
2016 [3]
2015 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共13条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol
期刊论文
SENSORS, 2022, 卷号: 22, 期号: 17
作者:
Wu, Yi
;
Feng, Tao
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/09/22
smart lighting control
EnOcean protocol
colored Petri net
Dolev-Yao attacker model
Modeling a Multi-target Attacker-defender Game with Multiple Attack Types
期刊论文
Reliability Engineering & System Safety, 2019
作者:
Jing Zhang
;
Jun Zhuang
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/13
Homeland
security
Attacker-defender
Game
Attacker
types
Game
Theory
Modeling a multi-target attacker-defender game with multiple attack types
期刊论文
Reliability Engineering & System Safety, 2019, 卷号: Vol.185, 页码: 465-475
作者:
Jing Zhang
;
Jun Zhuang
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/13
Homeland
security
Attacker-defender
game
Attacker
types
Game
theory
A multi-uncertainty-set based two-stage robust optimization to defender-attacker-defender model for power system protection
期刊论文
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2018, 卷号: 169, 页码: 179-186
作者:
Ding, Tao
;
Yao, Li
;
Li, Fangxing
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/11/26
Analytic hierarchy process
Column-and-constrains generation algorithm
Defender attacker defender
Multi-uncertainty-set
Power grid protection
Robust optimization
Tri-level optimal hardening plan for a resilient distribution system considering reconfiguration and DG islanding
期刊论文
APPLIED ENERGY, 2018, 卷号: 210, 页码: 1266-1279
作者:
Lin, Yanling
;
Bie, Zhaohong
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/11/26
DG
Defender-attacker-defender (DAD)
Distribution system
Resilience
Optimal joint control and triggering strategies against denial of service attacks: a zero-sum game
期刊论文
IET CONTROL THEORY AND APPLICATIONS, 2017, 卷号: 11, 期号: 14, 页码: 2352-2360
作者:
Zhao, Yinghong
;
He, Xiao
;
Zhou, Donghua
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/11
networked control systems
linear systems
scheduling
computer network
security
sensors
telecommunication channels
linear quadratic control
game theory
control system synthesis
optimal joint control
triggering
strategies
denial of service attacks
scheduling problem
linear
networked control systems
communication constraints
communication
channel
remote sensors
transmission capability
optimal controller
strategies
external attacker
linear quadratic criteria
system
performance improvement
zero-sum static game
Nash equilibrium
nonpure-strategy NE
security
An energy-efficient source-anonymity protocol in surveillance systems
会议论文
作者:
Niu, Xiaoguang
;
Zhang, Yihao
;
Yao, Yalan
;
Chen, Xu
;
Jornet, Josep Miquel
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
Source-location anonymity
Dynamic mix-ring
Global attacker
Degree of anonymity
Surveillance system
Privacy-preserving data aggregation scheme against internal attackers in smart grids
期刊论文
WIRELESS NETWORKS, 2016, 卷号: 22, 期号: 2
作者:
He, Debiao
;
Kumar, Neeraj
;
Lee, Jong-Hyouk
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/05
Smart grid
Data aggregation
Privacy
Internal attacker
An energy-efficient source-anonymity protocol in surveillance systems
期刊论文
PERSONAL AND UBIQUITOUS COMPUTING, 2016, 卷号: 20, 期号: 5
作者:
Niu, Xiaoguang
;
Zhang, Yihao
;
Yao, Yalan
;
Chen, Xu
;
Jornet, Josep Miquel
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
Source-location anonymity
Dynamic mix-ring
Global attacker
Degree of anonymity
Surveillance system
A Novel Source-Location Anonymity Protocol in Surveillance Systems
会议论文
作者:
Niu, Xiaoguang
;
Yao, Yalan
;
Wei, Chuanbo
;
Liu, Yulu
;
Liu, Jin
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/05
source-location anonymity
dynamic mix-ring
global attacker
degree of anonymity
surveillance system
©版权所有 ©2017 CSpace - Powered by
CSpace