设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
CNKI学位论文(1111)
CNKI期刊论文0611(3)
知网期刊论文(321)
在“
Elsevier电子期刊
”中,
命中:
180
条,耗时:0.0509416 秒
在所有数据库中总计命中:
1,435
条
1.
Modification
of supervised OPF-based intrusion detection systems using unsupervised learning and social network concept
作者:
Hamid Bostani
a
;
st_h_bostani@azad.ac.ir" class="auth_mail" title="E-mail the corresponding author
;
Mansour Sheikhan
b
;
1
;
msheikhn@azad.ac.ir" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Optimum-path forest
;
Classification
;
Clustering
;
Pruning
;
Centrality
;
Prestige
;
Social network analysis
刊名:Pattern Recognition
出版年:2017
2.
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism
作者:
Hui Lin
a
;
Jia Hu
b
;
jiahu9@gmail.com
;
Youliang Tian
c
;
Li Yang
d
;
Li Xu
a
关键词:
Data veracity
;
Mobile cloud computing
;
Reputation mechanism
;
Mechanism design
刊名:Information Sciences
出版年:2017
3.
HSecGR: Highly Secure Geographic Routing
作者:
Mehdi Boulaiche
;
boulaiche.mehdi@yahoo.fr
;
Louiza Bouallouche-Medjkoune
louiza_medjkoune@yahoo.fr
关键词:
Ad hoc network
;
Secure routing
;
Attack
;
Cryptography
;
Reputation
;
Malicious
刊名:Journal of Network and Computer Applications
出版年:2017
4.
Cancellable iris template generation based on Indexing-First-One hashing
作者:
Yen-Lung Lai
a
Author Vitae
;
Zhe Jin
a
Author Vitae
;
Andrew Beng Jin Teoh
b
;
bjteoh@yonsei.ac.kr
Author Vitae
;
Bok-Min Goi
a
Author Vitae
;
Wun-She Yap
a
Author Vitae
;
Tong-Yuen Chai
a
Author Vitae
;
Christian Rathgeb
c
Author Vitae
关键词:
Iris
;
Cancellable template
;
Min-hashing
;
Jacaard similarity
;
Security & privacy
刊名:Pattern Recognition
出版年:2017
5.
Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteria
作者:
WeiGuo Zhang
;
a
;
b
;
zwg@xidian.edu.cn" class="auth_mail" title="E-mail the corresponding author
;
weiguozhang@vip.qq.com" class="auth_mail" title="E-mail the corresponding author
;
Enes Pasalic
c
;
enes.pasalic6@gmail.com" class="auth_mail" title="E-mail the corresponding author
关键词:
Boolean functions
;
Nonlinearity
;
Resiliency
;
Algebraic immunity
;
Stream ciphers
刊名:Information Sciences
出版年:2017
6.
A high-speed AES design resistant to fault injection
attacks
作者:
Hassen Mestiri
;
hassen.mestiri@yahoo.fr" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Fatma Kahri
kahrifatma@gmail.com" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Belgacem BouallegueAuthor Vitae
;
Mohsen MachhoutAuthor Vitae
关键词:
Cryptographic
;
Secure AES algorithm
;
Fault detection
;
FPGA implementation
;
Embedded systems
刊名:Microprocessors and Microsystems
出版年:2016
7.
Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing
作者:
Shabir A. Parah
;
shabireltr@gmail.com" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Javaid A. SheikhAuthor Vitae
;
Nazir A. LoanAuthor Vitae
;
Ghulam M. BhatAuthor Vitae
关键词:
Blind watermarking
;
Hybrid
attacks
;
Coefficient differencing
;
Robustness
刊名:Digital Signal Processing
出版年:2016
8.
Using timing-based side channels for anomaly detection in industrial control systems
作者:
Stephen Dunlap
a
;
Jonathan Butts
b
;
Juan Lopez
c
;
Mason Rice
a
;
mason.rice@afit.edu" class="auth_mail" title="E-mail the corresponding author
;
Barry Mullins
a
关键词:
industrial control systems
;
Programmable logic controllers
;
Modification
attacks
;
Side channels
;
Anomaly detection
刊名:International Journal of Critical Infrastructure Protection
出版年:2016
9.
NIC displays to thwart malware
attacks
mounted from within the OS
作者:
Julian L. Rrushi
julian.rrushi@wwu.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Malware
;
Insider threats
;
I/O interception
;
Defensive cyber deception
;
Computer decoys
刊名:Computers & Security
出版年:2016
10.
Jammer localization in wireless networks: An experimentation-driven approach
作者:
Konstantinos Pelechrinis
;
a
;
kpele@pitt.edu" class="auth_mail" title="E-mail the corresponding author
;
Iordanis Koutsopoulos
b
;
jordan@aueb.gr" class="auth_mail" title="E-mail the corresponding author
;
Ioannis Broustis
c
;
broustis@cs.ucr.edu" class="auth_mail" title="E-mail the corresponding author
;
Srikanth V. Krishnamurthy
c
;
krish@cs.ucr.edu" class="auth_mail" title="E-mail the corresponding author
关键词:
Wireless networks
;
Jamming
attacks
;
Gradient descent
;
Location discovery
;
Testbed experimentation
刊名:Computer Communications
出版年:2016
1
2
3
4
5
6
7
8
9
按检索点细分(180)
题名(2)
关键词(4)
文摘(160)
按出版年细分(180)
2027年及以后(13)
2017年(5)
2016年(13)
2015年(2)
2014年(2)
2013年(14)
2012年(5)
2011年(23)
2010年(9)
2009年(16)
2008年(9)
2007年(10)
2006年(9)
2005年(5)
2004年(7)
2003年(6)
2002年(3)
2001年(4)
2000年(2)
2000年及以前(23)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.