×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
华南理工大学 [35]
软件研究所 [21]
上海电子信息职业技... [20]
厦门大学 [8]
兰州理工大学 [6]
北京航空航天大学 [5]
更多...
内容类型
会议论文 [66]
期刊论文 [32]
其他 [7]
会议 [1]
发表日期
2022 [1]
2019 [2]
2018 [5]
2016 [4]
2015 [5]
2014 [5]
更多...
学科主题
Computer S... [3]
Computer S... [1]
computer s... [1]
computer s... [1]
mine and q... [1]
radio syst... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共106条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Coordinated Cyber Security Enhancement for Grid-Transportation Systems With Social Engagement
期刊论文
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 页码: 15
作者:
Zhao, Pengfei
;
Li, Shuangqi
;
Hu, Paul Jen-Hwa
;
Cao, Zhidong
;
Gu, Chenghong
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2022/11/14
Transportation
Computer crime
Renewable energy sources
Smart cities
Vehicle-to-grid
Uncertainty
Turbines
Cyber-attack
cyber security
electric vehicle
false data injection attacks
multi-energy system
smart city manage-ment
social effort
Research on co-design of security control and communication for cyber physical system under cyber-attacks
会议论文
Xiamen, China, July 5, 2019 - July 7, 2019
作者:
Shi, Yahong
;
Li, Wei
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/11/15
Actuators
Computer crime
Crime
Cyber Physical System
Delay control systems
Design
Discrete event simulation
Embedded systems
Fault detection
Fault tolerance
Network security
Plant management
Communication quality
Communication schemes
Conservative designs
Cyber-physical systems (CPS)
Lyapunov Krasovskii function
Security controls
Time-delay systems
Trigger conditions
A Novel Simulation System Oriented Description Language of Worm Propagation
会议论文
Journal of Physics: Conference Series, 2018-11-16
作者:
Zhang, Z.
;
Wang, T.
;
Xia, C.
;
Ren, H.
收藏
  |  
浏览/下载:50/0
  |  
提交时间:2019/12/30
Computer crime
Computer software
Image processing
Description languages
Explosion intensities
Interactive instructions
Network topology structure
Simulation systems
Software interfaces
Software simulation
Unified description
Computer simulation languages
Meltdown and Spectre CPU flaws: Protect your Mac and iOS devices.
期刊论文
Macworld - Digital Edition, 2018, 卷号: Vol.35 No.2, 页码: 7-10
作者:
SIMON,MICHAEL
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/24
COMPUTER
security
management
COMPUTER
crime
prevention
IOS
ACCESS
control
for
electronic
information
resources
SECURITY
measures
An intrusion detection system based on machine learning for CAN-Bus
期刊论文
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 2018, 卷号: 221, 页码: 285-294
作者:
Tian, D.
;
Li, Y.
;
Wang, Y.
;
Duan, X.
;
Wang, C.
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/30
Adaptive boosting
Artificial intelligence
Computer crime
Control system synthesis
Data handling
Data mining
Decision trees
Entropy
Intelligent systems
Intrusion detection
Learning algorithms
Learning systems
Mercury (metal)
Metadata
Security of data
Trees (mathematics)
CAN bus
Detection performance
Feature construction
GBDT
Gradient boosting
Intrusion Detection Systems
True positive rates
Vehicle control system
Network security
A Novel Intrusion Detection System Based on Advanced Naive Bayesian Classification
期刊论文
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 2018, 卷号: 211, 页码: 581-588
作者:
Wang, Y.
;
Li, Y.
;
Tian, D.
;
Wang, C.
;
Wang, W.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
5G mobile communication systems
Classification (of information)
Computer crime
Learning systems
Mercury (metal)
Network security
Pattern recognition
Pattern recognition systems
Security of data
Wireless networks
Classification results
Detection performance
Intrusion Detection Systems
Machine learning models
Naive Bayesian classification
ReliefF
Relieff algorithms
True positive rates
Intrusion detection
RFID/NFC device with embedded fingerprint authentication system
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS
作者:
Deelaka Ranasinghe, R.M.N.
;
Yu, G.Z.
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2019/12/30
Application programs
Authentication
Computer crime
Crime
Cryptography
Digital storage
Malware
Personal computing
Radio frequency identification (RFID)
Security of data
Data corruption
Data encryption
Fingerprint authentication
Fingerprint authentication system
Identification cards
Isolated systems
Personal information
Security threats
Near field communication
A convolutional neural network based classifier for uncompressed malware samples
会议论文
Proceedings of the ACM Conference on Computer and Communications Security
作者:
Yang, C.
;
Wen, Y.
;
Guo, J.
;
Song, H.
;
Li, L.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Computer architecture
Computer crime
Convolution
Deep learning
Image classification
Network architecture
Neural networks
Complete information
Convolutional neural network
Design classifiers
Gray-scale images
Learning-based methods
Malware classifications
Malware detection
Malware families
Malware
A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks
期刊论文
SENSORS, 2016, 卷号: 16, 期号: 10
作者:
Ma, Tao
;
Wang, Fen
;
Cheng, Jianjun
;
Yu, Yang
;
Chen, Xiaoyun
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/01/16
Intrusion detection
Clustering algorithms
Computer crime
Decision trees
Mercury (metal)
Network protocols
Neural networks
Routers
Statistical tests
Support vector machines
Wireless sensor networks
Back-propagation neural networks
Critical challenges
Deep neural networks
Ensemble modeling
Intrusion Detection Systems
Network defense systems
Sample similarities
Spectral clustering
An image copy move forgery detection method using QDCT
会议论文
Xi'an, China, August 19, 2016 - August 21, 2016
作者:
Li, Ce
;
Ma, Qiang
;
Xiao, Limei
;
Ying, Shihui
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Computer crime
Discrete cosine transforms
Copy-move forgeries
Copy-move forgery detections
Digital image forensics
Duplication detection
Feature vectors
QDCT
Tampered images
Threshold-value
©版权所有 ©2017 CSpace - Powered by
CSpace