×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [21]
大连理工大学 [13]
江苏大学 [4]
西安交通大学 [3]
西安理工大学 [3]
成都山地灾害与环境研... [2]
更多...
内容类型
会议论文 [59]
发表日期
2019 [1]
2018 [7]
2017 [6]
2016 [9]
2015 [8]
2014 [7]
更多...
学科主题
industrial... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共59条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
Stealthiness of Attacks and Vulnerability of Stochastic Linear Systems
会议论文
2019 12TH ASIAN CONTROL CONFERENCE (ASCC), 2019-01-01
作者:
Sui, Tianju
;
Marelli, Damian
;
Sun, Ximing
;
Fu, Minyue
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/02
Stochastic Linear Systems
Stealthy Attacks
Vulnerability
Cyber-security
Vulnerability Area Identification Method Based on Reactive Power Loss Severity Index under Disturbance of Magnetic Storm
会议论文
作者:
Kang, Xiaoning
;
Xu, Yini
;
Zhao, Chong
;
Guo, Mingda
;
Zhang, Xinyue
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/26
reactive power loss
probability distribution
reactive power loss severity index
geo-magnetic storm
standard normal distribution
Mitigating stealthy false data injection attacks against state estimation in smart grid
会议论文
作者:
Fan, Jingyao
;
Khazbak, Youssef
;
Tian, Jue
;
Liu, Ting
;
Cao, Guohong
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/11/26
Estimation process
Evaluation results
False data injection
False data injection attacks
NP Complete
Operating state
Power System
Vulnerability index
Stability Analysis of Flood Bunds: A Study on Geotechnical Health Evaluation of Embankments
会议论文
Baleli, Quetta, April 2, 2018 - April 3, 2018
作者:
Noshin, Sumayya
;
Alam, Mehtab
;
Sadiq, Shamsher
;
Mandokhail, Saeedullah Jan
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2018/10/19
Stability
Stability analysis
flood bunds
embankments
Vulnerability based on Component Binary Code For Third-Party Component
会议论文
2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018-01-01
作者:
Xie, Wanggen[1]
;
Hu, Jinchang[2]
;
Kudjo, Patrick Kwaku[3]
;
Yu, Lei[4]
;
Zeng, Zhifeng[5]
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/24
COM component
security testing
buffer overflow
detection of binary codes
Towards comprehensive threat modeling for intelligent vehicle cyber security
会议论文
CICTP 2017: Transportation Reform and Change - Equity, Inclusiveness, Sharing, and Innovation - Proceedings of the 17th COTA International Conference of Transportation Professionals
作者:
Ji, H.
;
Yu, G.
;
Wang, Y.
;
Zhang, Z.
;
Qin, H.
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/30
Advanced driver assistance systems
Automobile drivers
Automotive industry
Intelligent vehicle highway systems
Network security
Vehicles
Wireless telecommunication systems
Advanced driver assistant systems
Autonomous Vehicles
Connected vehicles
Network communications
Security challenges
Telematics system
Vehicular communications
Vulnerability analysis
Vehicle to vehicle communications
ContractFuzzer: Fuzzing smart contracts for vulnerability detection
会议论文
ASE 2018 - Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering
作者:
Jiang, B.
;
Liu, Y.
;
Chan, W.K.
收藏
  |  
浏览/下载:40/0
  |  
提交时间:2019/12/30
Blockchain
Losses
Software engineering
Ethereum
Fuzzer
Fuzzing
Smart contracts
Test oracles
Vulnerability
Security of data
Fuse: An Architecture for Smart Contract Fuzz Testing Service
会议论文
2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018-01-01
作者:
Chan, W. K.
;
Jiang, Bo
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/30
blockchain
fuzz testing
Dapps
architecture
security vulnerability
smart contract
Ethereum
Design and Implementation of Computer Network Vulnerability Assessment System
会议论文
2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017-01-01
作者:
Li, Tianli
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/03
computer network
vulnerability assessment
system design
network topology
routing restoration
Hub dependency and vulnerability of global-local connectivity in the world liner shipping network: An empirical case study
会议论文
2017 International Conference on Network Science
作者:
Xu MQ(徐梦俏)
;
Xia HX(夏昊翔)
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/03
©版权所有 ©2017 CSpace - Powered by
CSpace