×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [6]
自然资源部第一海洋研... [2]
大连理工大学 [1]
内容类型
会议论文 [9]
发表日期
2016 [9]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共9条,第1-9条
帮助
限定条件
发表日期:2016
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
On the Risk Assessment of Storm Surge Disasters in the Coastal Areas of Qingdao
会议论文
作者:
Gao, Song
;
Zhong, Shan
;
Lian, Xihu
;
Wu, Lingjuan
;
Bai, Tao
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/08/19
storm surges
risk assessment of hazards
Qingdao
On the Risk Assessment of Storm Surge Disasters in the Coastal Areas of Qingdao
会议论文
作者:
Gao, Song
;
Zhong, Shan
;
Lian, Xihu
;
Wu, Lingjuan
;
Bai, Tao
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/03/13
storm surges
risk assessment of hazards
Qingdao
A Framework for Analyzing Vulnerability of Critical Infrastructures Under Localized Attacks
会议论文
17th Annual International Symposium on Knowledge and Systems Sciences (KSS), Konan Univ Japan, Kobe, JAPAN, 2016-11-04
作者:
Yan, KeSheng
;
Rong, Lili
;
Lu, Tao
;
Ni, ZiJian
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/09
Critical infrastructures
Interdependencies
Localized attack
Localized failure model
Cascading failures
An approach to evaluate network security risk based on attack graph
会议论文
4th International Conference on Electrical and Electronics Engineering and Computer Science (ICEEECS), Jinan, PEOPLES R CHINA
作者:
Hu, Xiaoyun
;
Yu, Yang
;
Xia, Chunhe
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
risk evaluation
attack graph
vulnerability analysis
Vulnerability Analysis of iPhone 6
会议论文
2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016-01-01
作者:
Yang, Wencheng
;
Hu, Jiankun
;
Fernandes, Clinton
;
Sivaraman, Vijay
;
Wu, Qianhong
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
vulnerability
iPhone 6
iOS 8
law enforcement
forging attack
Vulnerability Quantitative Evaluation Based on Multi-Factor for Penetration Testing
会议论文
2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016-01-01
作者:
Yuan, Zhichao
;
Yao, Shan
;
Xia, Chunhe
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
An approach to evaluate network security risk based on attack graph
会议论文
PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016-01-01
作者:
Hu, Xiaoyun
;
Yu, Yang
;
Xia, Chunhe
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
risk evaluation
attack graph
vulnerability analysis
Vulnerability Quantitative Evaluation Based on Multi-Factor for Penetration Testing
会议论文
International Conference on Computer Engineering, Information Science and Internet Technology (CII), Changsha, PEOPLES R CHINA
作者:
Yuan, Zhichao
;
Yao, Shan
;
Xia, Chunhe
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Vulnerability Analysis of iPhone 6
会议论文
14th Annual International Conference on Privacy, Security and Trust (PST), Auckland, NEW ZEALAND, 2016-12-12
作者:
Yang, Wencheng
;
Hu, Jiankun
;
Fernandes, Clinton
;
Sivaraman, Vijay
;
Wu, Qianhong
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/30
vulnerability
iPhone 6
iOS 8
law enforcement
forging attack
©版权所有 ©2017 CSpace - Powered by
CSpace