×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [19]
内容类型
会议论文 [14]
期刊论文 [5]
发表日期
2018 [5]
2017 [1]
2016 [5]
2015 [4]
2014 [1]
2013 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共19条,第1-10条
帮助
限定条件
专题:北京航空航天大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Towards comprehensive threat modeling for intelligent vehicle cyber security
会议论文
CICTP 2017: Transportation Reform and Change - Equity, Inclusiveness, Sharing, and Innovation - Proceedings of the 17th COTA International Conference of Transportation Professionals
作者:
Ji, H.
;
Yu, G.
;
Wang, Y.
;
Zhang, Z.
;
Qin, H.
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/30
Advanced driver assistance systems
Automobile drivers
Automotive industry
Intelligent vehicle highway systems
Network security
Vehicles
Wireless telecommunication systems
Advanced driver assistant systems
Autonomous Vehicles
Connected vehicles
Network communications
Security challenges
Telematics system
Vehicular communications
Vulnerability analysis
Vehicle to vehicle communications
Identification of Vital Nodes in Complex Network via Belief Propagation and Node Reinsertion (vol 6, pg 29200, 2018)
期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 41429-41431
作者:
Zhong, Jilong
;
Zhang, Fengming
;
Li, Zhengxin
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
Complex network
attack vulnerability
node reinsertion
belief propagation
ContractFuzzer: Fuzzing smart contracts for vulnerability detection
会议论文
ASE 2018 - Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering
作者:
Jiang, B.
;
Liu, Y.
;
Chan, W.K.
收藏
  |  
浏览/下载:40/0
  |  
提交时间:2019/12/30
Blockchain
Losses
Software engineering
Ethereum
Fuzzer
Fuzzing
Smart contracts
Test oracles
Vulnerability
Security of data
Correction to “Identification of Vital Nodes in Complex Network via Belief Propagation and Node Reinsertion”
期刊论文
IEEE Access, 2018
作者:
Zhong, J.
;
Zhang, F.
;
Li, Z.
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/30
Backpropagation
Glass
Mathematical models
Models
Network security
Spin glass
attack vulnerability
Belief propagation
Belief propagation algorithm
BP algorithm
node reinsertion
Reference list
Reliability engineering
Spin-glass models
Complex networks
Identification of Vital Nodes in Complex Network via Belief Propagation and Node Reinsertion
期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 29200-29210
作者:
Zhong, Jilong
;
Zhang, Fengming
;
Li, Zhengxin
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Complex network
attack vulnerability
node reinsertion
belief propagation
An Optimized Method for Fault Propagation Analysis of Mechatronic Systems
会议论文
Annual Reliability and Maintainability Symposium (RAMS), Orlando, FL, 2017-01-23
作者:
Yao, Jingxiu
;
Wu, Yumei
;
Liu, Bin
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/30
mechatronic system
fault propagation analysis
vulnerability analysis
software module
software signal
Vulnerability Analysis of iPhone 6
会议论文
2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016-01-01
作者:
Yang, Wencheng
;
Hu, Jiankun
;
Fernandes, Clinton
;
Sivaraman, Vijay
;
Wu, Qianhong
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
vulnerability
iPhone 6
iOS 8
law enforcement
forging attack
Defending a single object against an attacker trying to detect a subset of false targets
期刊论文
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2016, 卷号: 149, 页码: 137-147
作者:
Peng, R.
;
Zhai, Q. Q.
;
Levitin, G.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Reliability
Vulnerability
Defense
Attack
False targets
Contest success function
An approach to evaluate network security risk based on attack graph
会议论文
PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016-01-01
作者:
Hu, Xiaoyun
;
Yu, Yang
;
Xia, Chunhe
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
risk evaluation
attack graph
vulnerability analysis
Robustness and Vulnerability of Networks with Dynamical Dependency Groups
期刊论文
SCIENTIFIC REPORTS, 2016, 卷号: 6, 页码: 37749
作者:
Bai, Ya-Nan
;
Huang, Ning
;
Wang, Lei
;
Wu, Zhi-Xi
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/30
©版权所有 ©2017 CSpace - Powered by
CSpace