×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [4]
北京航空航天大学 [4]
武汉大学 [4]
地理科学与资源研究所 [3]
湖南大学 [3]
清华大学 [2]
更多...
内容类型
期刊论文 [19]
会议论文 [13]
SCI/SSCI论文 [2]
学位论文 [1]
发表日期
2020 [1]
2019 [1]
2018 [6]
2017 [2]
2016 [4]
2015 [6]
更多...
学科主题
Geology; M... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共35条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Gentiana macrophylla response to climate change and vulnerability evaluation in China
期刊论文
GLOBAL ECOLOGY AND CONSERVATION, 2020, 卷号: 22, 页码: 14
作者:
Yan, Huyong
;
He, Jiao
;
Zhao, Yufei
;
Zhang, Lin
;
Zhu, Chaoping
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/08/24
Climate change
Gentiana macrophylla
Vulnerability evaluation
MaxEnt
Suitable habitat
Integrated suitability, vulnerability and sustainability indicators for assessing the global potential of aquifer thermal energy storage
期刊论文
APPLIED ENERGY, 2019, 卷号: 239, 页码: 747-756
作者:
Lu, Hongwei
;
Tian, Peipei
;
Guan, Yanlong
;
Yu, Sen
收藏
  |  
浏览/下载:47/0
  |  
提交时间:2019/05/22
Aquifer thermal energy storage
GIS-based multi-criteria decision analysis
Global potential evaluation
Decision-making
Suitability, vulnerability and sustainability assessments
Assessing the gains and vulnerability of free trade: A counterfactual analysis of Macau
期刊论文
ECONOMIC MODELLING, 2018, 卷号: 70, 页码: 147-158
作者:
Yin, Hua
;
Du, Zaichao
;
Zhang, Lin
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/08/22
Free trade agreement
Vulnerability
Program evaluation
Counterfactual
Macau
Social Vulnerability Evaluation for Ankang City, China, using Fuzzy Analytic Hierarchy Process Method
期刊论文
Journal of Homeland Security and Emergency Management, 2018, 卷号: 15
作者:
Guo, Xuesong
;
Kapucu, Naim
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/11/19
analytic hierarchy process (AHP)
emergency management
Fuzzy theory
social vulnerability
vulnerability evaluation
A feasible method for the division of ecological vulnerability and its driving forces in Southern Shaanxi
期刊论文
Journal of Cleaner Production, 2018, 卷号: 205, 页码: 619-628
作者:
Kang, Hou
;
Tao, Wendong
;
Chang, Yue
;
Zhang, Yue
;
Xuxiang, Li
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/26
Driving forces
Ecological environments
Ecological vulnerability
Evaluation index system
Principal component analysis method
Remote sensing images
South-to-North water diversion project
Southern Shaanxi
Mitigating stealthy false data injection attacks against state estimation in smart grid
会议论文
作者:
Fan, Jingyao
;
Khazbak, Youssef
;
Tian, Jue
;
Liu, Ting
;
Cao, Guohong
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/11/26
Estimation process
Evaluation results
False data injection
False data injection attacks
NP Complete
Operating state
Power System
Vulnerability index
An Integration Testing Framework and Evaluation Metric for Vulnerability Mining Methods
期刊论文
CHINA COMMUNICATIONS, 2018, 卷号: 15, 期号: 2,SI, 页码: 190-208
作者:
Li, Jin[1]
;
Chen, Jinfu[2]
;
Huang, Minhuan[3]
;
Zhou, Minmin[4]
;
Xie, Wanggen[5]
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/24
software vulnerability detection
loopholes
information security
evaluation method
testing framework
Vulnerability evaluation method applied to manufacturing systems
期刊论文
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2018, 卷号: Vol.180, 页码: 255-265
作者:
Guibing, Gao
;
Wenhui, Yue
;
Wenchu, Ou
;
Hao, Tang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/26
Complex network
Manufacturing system
Vulnerability
Scale model
Evaluation
Ecological Vulnerability Evaluation in West China: Evaluate Vulnerability and Its Synergy Degree with Government Performance
期刊论文
ICES Conference, 2017, 卷号: 13, 页码: 7743-7754
作者:
Shang, Huping
;
Han, Qingying
;
Li, Yan
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/03
western China
ecological vulnerability
evaluation
local government performance
pre-control
An Integration Testing Platform for Software Vulnerability Detection Method
会议论文
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017-01-01
作者:
Li, Jin[1]
;
Chen, Jinfu[2]
;
Huang, Minhuan[3]
;
Zhou, Minmin[4]
;
Zhang, Lin[5]
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2019/12/24
Software vulnerability detection
Loopholes
Information security
Evaluation method
Test platform
©版权所有 ©2017 CSpace - Powered by
CSpace