CORC

浏览/检索结果: 共14条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
证券分析师预测“变脸”行为研究——基于分析师声誉的博弈模型与实证检验 期刊论文
2013
游家兴; 邱世远; 刘淳
收藏  |  浏览/下载:5/0  |  提交时间:2016/05/17
Turning Interference Weakness into PHY Security Enhancement for Cognitive Radio Networks 其他
2013-01-01
Zhang, Hang; Wang, Tianyu; Song, Lingyang; Han, Zhu
收藏  |  浏览/下载:5/0  |  提交时间:2015/11/13
Secure relay selection based on learning with negative externality in wireless networks 期刊论文
http://dx.doi.org/10.1186/1687-6180-2013-89, 2013
Zhao, Caidan; Xiao, Liang; Kang, Shan; Chen, Guiquan; Li, Yunzhou; Huang, Lianfen; 赵彩丹; 肖亮; 黄联芬
收藏  |  浏览/下载:3/0  |  提交时间:2015/07/22
基于间接互惠博弈的网络安全研究 学位论文
2013, 2013
陈晓晓
收藏  |  浏览/下载:4/0  |  提交时间:2016/01/13
基于口令的密钥导出算法安全性分析 学位论文
2013, 2013
周君
收藏  |  浏览/下载:5/0  |  提交时间:2016/01/13
海峡两岸在南海非传统安全合作问题研究 学位论文
2013, 2013
杨卓娟
收藏  |  浏览/下载:2/0  |  提交时间:2016/01/13
The security of key derivation functions in WINRAR 期刊论文
http://dx.doi.org/10.4304/jcp.8.9.2262-2268, 2013
Chen, Jie; Zhou, Jun; Pan, Kun; Lin, Shuqiang; Zhao, Cuicui; Li, Xiaochao; 李晓潮
收藏  |  浏览/下载:3/0  |  提交时间:2015/07/22
Optimal defense strategies for DDoS defender using Bayesian game model 会议论文
9th International Conference on Information Security Practice and Experience, ISPEC 2013, Lanzhou, China, May 12, 2013 - May 14, 2013
Liu, Yuling (1); Feng, Dengguo (1); Lian, Yifeng (1); Chen, Kai (2); Zhang, Yingjun (1)
收藏  |  浏览/下载:6/0  |  提交时间:2014/12/16
Computer virus propagation model based on bounded rationality evolutionary game theory 期刊论文
Security and Communication Networks, 2013, 卷号: 6, 期号: 2, 页码: 210-218
作者:  Jin, Cong*;  Jin, Shu‐Wei;  Tan, Hua‐Yong
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/23
Multi-recastable e-bidding game with dual-blindness 期刊论文
Mathematical and computer modelling, 2013, 卷号: Vol.58 No.1-2, 页码: 68-78
作者:  Wei-KueiChen;  Chun-IFan;  Chien-NanWu;  Wei-ZheSun
收藏  |  浏览/下载:1/0  |  提交时间:2020/01/04


©版权所有 ©2017 CSpace - Powered by CSpace