CORC

浏览/检索结果: 共33条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Analysis of visualization systems for cyber security 期刊论文
Advances in Intelligent Systems and Computing, 2019, 卷号: 752, 页码: 1051-1061
作者:  Zhao, H.;  Tang, W.;  Zou, X.;  Wang, Y.;  Zu, Y.
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/30
A Flexible Cyber Security Experimentation Platform Architecture Based on Docker 会议论文
19th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2019, Sofia, Bulgaria, 2019-07-22
作者:  Yin, Yongfeng;  Shao, Yuyan;  Wang, Xuefeng;  Su, Qingran
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Optimistic Fair Exchange in Cloud-Assisted Cyber-Physical Systems 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2019, 卷号: 2019
作者:  Wang, Jun;  Luo, Feixiang;  Zhou, Zequan;  Luo, Xiling;  Wang, Zhen
收藏  |  浏览/下载:13/0  |  提交时间:2019/12/30
Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey 期刊论文
APPLIED SCIENCES-BASEL, 2019, 卷号: 9
作者:  Liu, Hongyu;  Lang, Bo
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Analysis of visualization systems for cyber security 会议论文
International Conference on Intelligent Computing, Communication and Devices, ICCD 2017, Shenzhen, China, 2017-12-09
作者:  Zhao, Haisheng;  Tang, Wenzhong;  Zou, Xiaoxiang;  Wang, Yanyang;  Zu, Yueran
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
A Research on Security of Information Propagation of CACC Vehicles Under Internet of Vehicles Environment [车联网环境下CACC车辆信息传播安全性研究] 期刊论文
Qiche Gongcheng/Automotive Engineering, 2019, 卷号: 41, 页码: 252-258
作者:  Wei, L.;  Wang, Y.;  Qin, H.;  Yu, G.
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/30
Towards comprehensive threat modeling for intelligent vehicle cyber security 会议论文
17th COTA International Conference of Transportation Professionals: Transportation Reform and Change - Equity, Inclusiveness, Sharing, and Innovation, CICTP 2017, Shanghai, China, 2017-07-07
作者:  Ji, Haojie;  Yu, Guizhen;  Wang, Yunpeng;  Zhang, Zhao;  Qin, Hongmao
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/30
DiPot: A distributed industrial honeypot system 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 10699 LNCS, 页码: 300-309
作者:  Cao, J.;  Li, W.;  Li, J.;  Li, B.
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/30
Towards comprehensive threat modeling for intelligent vehicle cyber security 会议论文
CICTP 2017: Transportation Reform and Change - Equity, Inclusiveness, Sharing, and Innovation - Proceedings of the 17th COTA International Conference of Transportation Professionals
作者:  Ji, H.;  Yu, G.;  Wang, Y.;  Zhang, Z.;  Qin, H.
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/30
Review on Testing of Cyber Physical Systems: Methods and Testbeds 期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 52179-52194
作者:  Zhou, Xin;  Gou, Xiaodong;  Huang, Tingting;  Yang, Shunkun
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30


©版权所有 ©2017 CSpace - Powered by CSpace