×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [104]
华南理工大学 [81]
上海电子信息职业技... [58]
清华大学 [38]
北京航空航天大学 [12]
兰州理工大学 [11]
更多...
内容类型
会议论文 [192]
期刊论文 [126]
会议 [13]
其他 [6]
学位论文 [3]
EI期刊论文 [2]
更多...
发表日期
2020 [5]
2019 [9]
2018 [10]
2017 [4]
2016 [7]
2015 [6]
更多...
学科主题
Computer S... [2]
Computer S... [1]
Computer S... [1]
Telecommun... [1]
computer s... [1]
electric f... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共342条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:
Yu, Keping
;
Tan, Liang
;
Aloqaily, Moayad
;
Yang, Hekun
;
Jararweh, Yaser
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2021/12/01
Industrial Internet of Things
Smart manufacturing
Blockchain
Security
Access control
Encryption
Cloud computing
Big data
blockchain
data sharing
industrial Internet-of-Thing (IIoT)
smart factory
traceable and revocation
Intelligent city intelligent medical sharing technology based on internet of things technology
期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 卷号: 111, 页码: 226-233
作者:
Zhao, Xin
;
Xiao, Wei
;
Wu, Lu
;
Zhao, Zhigang
;
Huo, Jidong
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/10
Internet of things
Intelligent city
Intelligent medical sharing
Data encryption
Information security
An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 9-10, 页码: 6337-6361
作者:
Zhang, Qiu-yu
;
Ge, Zi-xian
;
Hu, Ying-jie
;
Bai, Jian
;
Huang, Yi-bo
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/14
Cryptography
Efficiency
Extraction
Feature extraction
K-means clustering
Matrix algebra
Security of data
Z transforms
Chirp Z transform
Encrypted speech
Perceptual hashing
Random Matrix
Speech denoising
Network intrusion detection model based on multivariate correlation analysis - long short-time memory network
期刊论文
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 2, 页码: 166-174
作者:
Dong, Rui-Hong
;
Li, Xue-Yong
;
Zhang, Qiu-Yu
;
Yuan, Hui
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2020/03/30
support vector machines
neural nets
image classification
pattern classification
security of data
recurrent neural nets
learning (artificial intelligence)
network intrusion detection model
multivariate correlation analysis
short-time memory network
low detection performance
time correlation characteristics
intrusion detection datasets
multivariate correlations analysis
short-term memory network
information gain feature selection method
convolutional neural networks
recurrent neural network
classification detection performance
Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk
期刊论文
International Journal of Network Security, 2020, 卷号: 22, 期号: 2, 页码: 347-357
作者:
Xie,Peng-Shou
;
Fan,Hong-Jin
;
Feng,Tao
;
Yan,Yan
;
Ma,Guo-Qiang
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/11/13
Access Control
Big Data Security
Internet of Vehicles
Risk Adaptive
XACML
Federated Tensor Mining for Secure Industrial Internet of Things
期刊论文
IEEE Transactions on Industrial Informatics, 2020, 卷号: 16, 期号: 3, 页码: 2144-2153
作者:
Kong LH(孔令和)
;
Liu, Xiao-Yang
;
Sheng H(盛浩)
;
Zeng P(曾鹏)
;
Chen, Guihai
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/02/17
Industrial internet of things
security
tensor-based data mining
Context aware intrusion detection for building automation systems
期刊论文
COMPUTERS & SECURITY, 2019, 卷号: 85, 页码: 181-201
作者:
Pan, Zhiwen
;
Hariri, Salim
;
Pacheco, Jesus
收藏
  |  
浏览/下载:64/0
  |  
提交时间:2019/12/10
Internet of Things
Network security
Context awareness
Supervised learning
Data mining
Intrusion detection
The Security Assessment on Programmable Logic Controller based on Attack Tree Model and FAHP
会议论文
Shenyang, China, July 12, 2019 - July 14, 2019
作者:
Feng, Tao
;
Shi, Yanxia
;
Gong, Renbin
;
Zhao, Qianchuan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/15
Analytic hierarchy process
Computation theory
Computer circuits
Controllers
Data acquisition
Decision making
Forestry
Intelligent computing
Probability
Programmable logic controllers
Programmed control systems
Security of data
Attack tree
Fuzzy analytic hierarchy process
Industrial control systems
Programmable logic controllers (PLC)
Protective measures
Security attributes
Shapiro-Wilk tests
Supervisory control and data acquisition
Edge Computing Security: State of the Art and Challenges
期刊论文
Proceedings of the IEEE, 2019
作者:
Xiao Y.
;
Jia Y.
;
Liu C.
;
Cheng X.
;
Yu J.
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2019/12/11
Cloud computing
Computer science
Data security
Edge computing
edge computing
Internet of Things
Mobile handsets
network security.
Security
Servers
Task analysis
Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems
期刊论文
2019, 卷号: 6, 页码: 2299-2308
作者:
Li, Shancang
;
Zhao, Shanshan
;
Yang, Po
;
Andriotis, Panagiotis
;
Xu, Lida
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/20
Consensus algorithm
cyber-physical systems (CPSs)
data gathering
Internet of Things (IoT)
security events detection
©版权所有 ©2017 CSpace - Powered by
CSpace