CORC

浏览/检索结果: 共19条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Towards comprehensive threat modeling for intelligent vehicle cyber security 会议论文
CICTP 2017: Transportation Reform and Change - Equity, Inclusiveness, Sharing, and Innovation - Proceedings of the 17th COTA International Conference of Transportation Professionals
作者:  Ji, H.;  Yu, G.;  Wang, Y.;  Zhang, Z.;  Qin, H.
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/30
Identification of Vital Nodes in Complex Network via Belief Propagation and Node Reinsertion (vol 6, pg 29200, 2018) 期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 41429-41431
作者:  Zhong, Jilong;  Zhang, Fengming;  Li, Zhengxin
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/30
ContractFuzzer: Fuzzing smart contracts for vulnerability detection 会议论文
ASE 2018 - Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering
作者:  Jiang, B.;  Liu, Y.;  Chan, W.K.
收藏  |  浏览/下载:40/0  |  提交时间:2019/12/30
Correction to “Identification of Vital Nodes in Complex Network via Belief Propagation and Node Reinsertion” 期刊论文
IEEE Access, 2018
作者:  Zhong, J.;  Zhang, F.;  Li, Z.
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/30
Identification of Vital Nodes in Complex Network via Belief Propagation and Node Reinsertion 期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 29200-29210
作者:  Zhong, Jilong;  Zhang, Fengming;  Li, Zhengxin
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
An Optimized Method for Fault Propagation Analysis of Mechatronic Systems 会议论文
Annual Reliability and Maintainability Symposium (RAMS), Orlando, FL, 2017-01-23
作者:  Yao, Jingxiu;  Wu, Yumei;  Liu, Bin
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/30
Vulnerability Analysis of iPhone 6 会议论文
2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016-01-01
作者:  Yang, Wencheng;  Hu, Jiankun;  Fernandes, Clinton;  Sivaraman, Vijay;  Wu, Qianhong
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
Defending a single object against an attacker trying to detect a subset of false targets 期刊论文
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2016, 卷号: 149, 页码: 137-147
作者:  Peng, R.;  Zhai, Q. Q.;  Levitin, G.
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
An approach to evaluate network security risk based on attack graph 会议论文
PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016-01-01
作者:  Hu, Xiaoyun;  Yu, Yang;  Xia, Chunhe
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/30
Robustness and Vulnerability of Networks with Dynamical Dependency Groups 期刊论文
SCIENTIFIC REPORTS, 2016, 卷号: 6, 页码: 37749
作者:  Bai, Ya-Nan;  Huang, Ning;  Wang, Lei;  Wu, Zhi-Xi
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/30


©版权所有 ©2017 CSpace - Powered by CSpace