CORC

浏览/检索结果: 共51条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
“战略防御计划”的提出与里根政府朝野的反应 其他
2017-04-01
刘磊; LIU Lei
收藏  |  浏览/下载:8/0  |  提交时间:2017/04/11
SEYARN: Enhancing Security of YARN Clusters Based on Health Check Service 其他
2017-01-01
Li, Wenting; Shen, Qingni; Dong, Chuntao; Yang, Yahui; Wu, Zhonghai
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
DDoS  Hadoop  YARN  Security  
How Does Regression Test Prioritization Perform in Real-World Software Evolution? 其他
2016-01-01
Lu, Yafeng; Lou, Yiling; Cheng, Shiyang; Zhang, Lingming; Hao, Dan; Zhou, Yangfan; Zhang, Lu
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
Targeted Online Password Guessing: An Underestimated Threat 其他
2016-01-01
Wang, Ding; Zhang, Zijian; Wang, Ping; Yan, Jeff; Huang, Xinyi
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
A SPA-weighted Arrhythmias-risks ValuatING (SAVING) Algorithm and Tested in WE-CARE 2.0 其他
2016-01-01
Qiu, Yaxing; Huang, Anpeng; Jiao, Bingli
收藏  |  浏览/下载:2/0  |  提交时间:2017/12/03
Sift an efficient method for co-residency detection on amazon EC2 其他
2016-01-01
Chen, Kang; Shen, Qingni; Li, Cong; Luo, Yang; Yang, Yahui; Wu, Zhonghai
收藏  |  浏览/下载:5/0  |  提交时间:2017/12/03
DDHCS: Distributed denial-of-service threat to yarn clusters based on health check service 其他
2016-01-01
Li, Wenting; Shen, Qingni; Dong, Chuntao; Yang, Yahui; Wu, Zhonghai
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
Whispers in the cloud: A covert channel using the result of creating a virtual machine 其他
2016-01-01
Li, Cong; Shen, Qingni; Chen, Kang; Yang, Yahui; Wu, Zhonghai
收藏  |  浏览/下载:6/0  |  提交时间:2017/12/03
Mitigating Primary User Emulation attacks in Cognitive Radio networks using advanced encryption standard 其他
2016-01-01
Jiang, Huichao; Jing, Xiao Jun; Sun, Songlin; Huang, Hai; Li, Yan; Wang, Xiaohan; Cheng, Dongmei
收藏  |  浏览/下载:5/0  |  提交时间:2017/12/03
道光年间台湾问题中英交涉外交折冲——以新发现《来往文书》《台湾奏折上谕》为中心的考察 其他
2015-04-01
王天根; WANG Tian-gen
收藏  |  浏览/下载:2/0  |  提交时间:2016/03/01


©版权所有 ©2017 CSpace - Powered by CSpace