CORC

浏览/检索结果: 共66条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
A Novel Intrusion Detector Based on Deep Learning Hybrid Methods 会议论文
5th IEEE International Conference on Big Data Security on Cloud, 5th IEEE International Conference on High Performance and Smart Computing and 4th IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2019, Washington, DC, United states, 2019-05-27
作者:  Wang, Shizhao;  Xia, Chunhe;  Wang, Tianbo
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
A probabilistic and rebalancing cache placement strategy for ICN in MANETs 会议论文
13th CCF Conference on Computer Supported Cooperative Work and Social Computing, ChineseCSCW 2018, Guilin, China, 2018-08-18
作者:  Zhang, Cheng;  Xia, Chunhe;  Wang, Haiquan
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/30
An Information Source Identification Algorithm Based on Shortest Arborescence of Network 会议论文
2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2019), 2019-01-01
作者:  Li, Zhong;  Xia, Chunhe;  Wang, Tianbo;  Liu, Xiaochen
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
Online Social Spammer Detection Based on Semi-supervised Learning 会议论文
2018 INTERNATIONAL CONFERENCE ON ALGORITHMS, COMPUTING AND ARTIFICIAL INTELLIGENCE (ACAI 2018), 2018-01-01
作者:  Ren, Honglin;  Zhang, Zhigang;  Xia, Chunhe
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
A Dynamic Placement Policy of Virtual Machine Based on MOGA in Cloud Environment 会议论文
2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017-01-01
作者:  Zhang, Mohan;  Ren, Honglin;  Xia, Chunhe
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
An Attack-oriented Task Execution Collaborative Defense Protocol 会议论文
12TH CHINESE CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (CHINESECSCW 2017), 2017-01-01
作者:  Lei, Shengwei;  Yu, Yang;  Li, Xiaojian;  Li, Zhong;  Xia, Chunhe
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/30
CloudSec: A Novel Approach to Verifying Security Conformance at the Bottom of the Cloud 会议论文
2017 IEEE 6TH INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS 2017), 2017-01-01
作者:  Liu, Xiaochen;  Xia, Chunhe;  Wang, Tianbo;  Zhong, Li
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/30
An approach to evaluate network security risk based on attack graph 会议论文
4th International Conference on Electrical and Electronics Engineering and Computer Science (ICEEECS), Jinan, PEOPLES R CHINA
作者:  Hu, Xiaoyun;  Yu, Yang;  Xia, Chunhe
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
A Multi-Agent Based Approach to Monitoring IaaS Security SLA 会议论文
4th International Conference on Electrical and Electronics Engineering and Computer Science (ICEEECS), Jinan, PEOPLES R CHINA
作者:  Cao, Jiajin;  Xia, Chunhe;  Liu, Xiaochen
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Vulnerability Quantitative Evaluation Based on Multi-Factor for Penetration Testing 会议论文
2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016-01-01
作者:  Yuan, Zhichao;  Yao, Shan;  Xia, Chunhe
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30


©版权所有 ©2017 CSpace - Powered by CSpace