设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
中国地质文献-英文(4)
Springer电子图书(7)
ProQuest学位论文(120)
Elsevier电子期刊(640)
Wiley电子期刊(18)
SpringerLink电子期刊(1164)
NATURE电子期刊(14)
ACS电子期刊(1)
在“
Elsevier电子期刊
”中,
命中:
640
条,耗时:0.0139946 秒
在所有数据库中总计命中:
1,968
条
1.
Exploring software
security
approaches in software development lifecycle: A systematic mapping study
作者:
Nabil M. Mohammed
a
;
alqadhi82@gmail.com
Author Vitae
;
Mahmood Niazi
a
;
b
;
mkniazi@kfupm.edu.sa
Author Vitae
;
Mohammad Alshayeb
a
;
alshayeb@kfupm.edu.sa
Author Vitae
;
Sajjad Mahmood
a
;
smahmood@kfupm.edu.sa
Author Vitae
关键词:
Systematic mapping study
;
Empirical study
;
Software development life cycle
;
Software
security
刊名:Computer Standards & Interfaces
出版年:2017
2.
Key sustainability challenges for the global phosphorus resource, their implications for global food
security
, and options for mitigation
作者:
Rubel Biswas Chowdhury
a
;
b
;
rubel_cric@yahoo.com" class="auth_mail" title="E-mail the corresponding author
;
Graham A. Moore
a
;
Anthony J. Weatherley
b
;
Meenakshi Arora
a
关键词:
Phosphorus
;
Sustainability
;
Global food
security
;
Waste
;
Environment
;
System analysis
刊名:Journal of Cleaner Production
出版年:2017
3.
Online integrity and authentication
check
ing for Quran electronic versions
作者:
Izzat Alsmadi
a
;
ialsmadi@yu.edu.jo
;
Mohammad Zarour
b
;
mzarour@psu.edu.sa
关键词:
Information retrieval
;
Security
;
Search engines
;
Documents&rsquo
;
automatic evaluation
;
Hashing algorithms
;
Information authentication
刊名:Applied Computing and Informatics
出版年:2017
4.
A national standards-based assessment on functionality of electronic medical records systems used in Kenyan public-Sector health facilities
作者:
Samuel Kang&rsquo
a ;
MSc
a
;
Nancy Puttkammer
;
MPH
;
PhD
a
;
Steven Wanyee
;
MSc
a
;
Davies Kimanga
;
MD
c
;
Jason Madrano
;
DNP
b
;
Veronica Muthee
;
MPH
a
;
vmuthee@itech-kenya.org
;
Patrick Odawo
;
MD
e
;
Anjali Sharma
;
ScD
a
;
Tom Oluoch
;
MSc
d
;
Katherine Robinson
;
MPH
d
;
James Kwach
;
MSc
d
;
William B. Lober
;
MS
;
MD
a
关键词:
EMRs
;
Standards
;
Review
;
Check
list
刊名:International Journal of Medical Informatics
出版年:2017
5.
Markov chain-based evaluation of the certificate status validations in hybrid MANETs
作者:
Mohammad Masdari
m.masdari@Iaurmia.ac.ir
Author Vitae
关键词:
Markov chain
;
Certificate validation
;
OCSP
;
ADOPT
;
PKI
;
Security
刊名:Journal of Network and Computer Applications
出版年:2017
6.
A methodology for secure recovery of spacecrafts based on a trusted hardware platform
作者:
Marcio Juliato
mrjuliat@uwaterloo.ca
;
Catherine Gebotys
cgebotys@uwaterloo.ca
关键词:
Fault tolerance
;
FPGA implementation
;
Space systems
security
;
Platform recovery
;
Trusted platform
刊名:Advances in Space Research
出版年:2017
7.
Analysis of Passenger and Vehicle Flows with Microscopic Simulations as a Result of
Security
Check
s at Ferry Terminals
作者:
Andrei Popa
;
Andrei.Popa@dlr.de" class="auth_mail" title="E-mail the corresponding author
;
Julia Strer
关键词:
security
;
security
check
;
passenger flow
;
vehicle flow
;
microscopic simulation
;
ferry terminal
刊名:Transportation Research Procedia
出版年:2016
8.
How U.S. National
Security
Decisions Are Made
作者:
Nikolas K. GvosdevAuthor Vitae
刊名:Orbis
出版年:2017
9.
Formal
security
analysis of near field communication using model
check
ing
作者:
Nikolaos Alexiou
a
Author Vitae
;
Stylianos Basagiannis
b
;
basagis@utrc.utc.com" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Sophia Petridou
c
Author Vitae
关键词:
Near field communication
;
Probabilistic model
check
ing
;
Relay attack
;
Security
analysis
;
Wireless communication
刊名:Computers &
Security
出版年:2016
10.
A hardened network-on-chip design using runtime hardware Trojan mitigation methods
作者:
Jonathan Frey
jpg73@wildcats.unh.edu
Author Vitae
;
Qiaoyan Yu
;
qiaoyan.yu@unh.edu
Author Vitae
关键词:
Hardware Trojan
;
Hardware
security
;
Network-on-chip (NoC)
;
Bandwidth depletion
;
Deadlock
;
Livelock
;
Denial-of-service attack
;
Latency
;
Throughput
刊名:Integration, the VLSI Journal
出版年:2017
1
2
3
4
5
6
7
8
9
按检索点细分(640)
题名(24)
关键词(39)
文摘(479)
按出版年细分(640)
2027年及以后(25)
2017年(12)
2016年(39)
2015年(14)
2014年(3)
2013年(31)
2012年(46)
2011年(46)
2010年(39)
2009年(38)
2008年(29)
2007年(56)
2006年(36)
2005年(43)
2004年(22)
2003年(20)
2002年(19)
2001年(8)
2000年(10)
2000年及以前(104)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.