设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
GSW全文库(148)
馆藏期刊(1)
Springer电子图书(776)
CNKI学位论文(42580)
万方学位论文(1)
中国地质文献-英文(11)
馆藏书目(12)
万方学术会议(8)
CNKI期刊论文0611(95)
馆藏电子书[解放前](2)
地学标准(3)
CNKI会议论文(126)
知网期刊论文(55825)
在“
Elsevier电子期刊
”中,
命中:
29,946
条,耗时:0.0129898 秒
在所有数据库中总计命中:
99,588
条
1.
On scheduling of deception
attack
s for discrete-time networked systems equipped with
attack
detectors
作者:
Derui Ding
a
;
deruiding2010@usst.edu.cn
Author Vitae
;
Guoliang Wei
a
Author Vitae
;
Sunjie Zhang
a
Author Vitae
;
Yurong Liu
b
;
c
Author Vitae
;
Fuad E. Alsaadi
c
Author Vitae
关键词:
Deception
attack
design
;
Consecutive
attack
s
;
Randomly launched deception
attack
s
;
The maximum number
;
Attack
probability
刊名:Neurocomputing
出版年:2017
2.
Graph similarity metrics for assessing temporal changes in
attack
surface of dynamic networks
作者:
Ghanshyam S. Bopche
a
;
b
;
ghanshyambopche.mca@gmail.com" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Babu M. Mehtre
a
Author Vitae
关键词:
Network security
;
Network hardening
;
Security metric
;
Attack
surface
;
Change assessment
;
Change awareness
;
Attack
graph
;
Maximum common subgraph
;
Graph similarity/distance measure
;
Graph edit distance
刊名:Computers & Security
出版年:2017
3.
Analyzing, quantifying, and detecting the blackhole
attack
in infrastructure-less networks
作者:
Christoforos Panos
a
;
cpanos@di.uoa.gr
Author Vitae
;
Chirstoforos Ntantogian
b
;
dadoyan@unipi.gr
Author Vitae
;
Stefanos Malliaros
b
;
stefmal@unipi.gr
Author Vitae
;
Christos Xenakis
b
;
xenakis@unipi.gr
Author Vitae
关键词:
Blackhole
attack
;
MANET
;
AODV
;
IDS
;
CUSUM
刊名:Computer Networks
出版年:2017
4.
Identifying cyber-
attack
s on software defined networks: An inference-based intrusion detection approach
作者:
Ahmed AlEroud
a
;
Ahmed.aleroud@yu.edu.jo
Author Vitae
;
Izzat Alsmadi
b
;
ialsmadi@tamusa.edu
Author Vitae
关键词:
Software defined networks
;
Information security
;
Intrusion detection
;
Graph mining
;
Denial of service
attack
s
;
Security architecture
刊名:Journal of Network and Computer Applications
出版年:2017
5.
Durability performances of wollastonite, tremolite and basalt fiber-reinforced metakaolin geopolymer composites under sulfate and chloride
attack
作者:
Daming Ren
a
;
b
;
Chunjie Yan
a
;
b
;
chjyan2005@126.com
;
Ping Duan
a
;
b
;
dp19851128@sina.com
;
Zuhua Zhang
c
;
Lingyao Li
a
;
b
;
Zhongyun Yan
a
关键词:
Geopolymer
;
Metakaolin
;
Durability
;
Sulfate
attack
;
Chloride
attack
;
Mineral particles
;
Fiber
刊名:Construction and Building Materials
出版年:2017
6.
Optimizing power system investments and resilience against
attack
s
作者:
Yiping Fang
;
Giovanni Sansavini
;
sansavig@ethz.ch
关键词:
Electric power network protection
;
System resilience
;
Transmission switching
;
Attack
s
;
Trilevel optimization
刊名:Reliability Engineering & System Safety
出版年:2017
7.
Optimal design and defense of networks under link
attack
s
作者:
Christophe Bravard
a
;
b
;
christophe.bravard@univ-grenoble-alpes.fr
;
Liza Charroin
c
;
charroin@gate.cnrs.fr
;
Corinne Touati
d
;
corinne.touati@inria.fr
关键词:
Attack
s on links
;
Network defense
;
Network design
刊名:Journal of Mathematical Economics
出版年:2017
8.
Speculative
attack
s in a two-peg model
作者:
Carlos Felipe Ló
;
pez-Suá
;
rez
a
;
Raul Razo-Garcia
b
;
raul.razogarcia@carleton.ca
关键词:
Fixed exchange rate
;
Currency crises
;
Speculative
attack
刊名:Journal of International Money and Finance
出版年:2017
9.
Optimizing network
attack
s by artificial bee colony
作者:
Manuel Lozano
a
;
lozano@decsai.ugr.es" class="auth_mail" title="E-mail the corresponding author
;
Carlos Garcí
;
a-Martí
;
nez
b
;
cgarcia@uco.es" class="auth_mail" title="E-mail the corresponding author
;
Francisco J. Rodrí
;
guez
;
c
;
fjrodriguez@unex.es" class="auth_mail" title="E-mail the corresponding author
;
fjrodriguez@decsai.ugr.es" class="auth_mail" title="E-mail the corresponding author
;
Humberto M. Trujillo
d
;
humberto@ugr.es" class="auth_mail" title="E-mail the corresponding author
关键词:
Artificial bee colony
;
Betweenness centrality
;
Network
attack
s
;
Combinatorial optimization
刊名:Information Sciences
出版年:2017
10.
Behavior of self-compacting concrete made with marble and tile wastes exposed to external sulfate
attack
作者:
Mohsen Tennich
a
;
b
;
Mongi Ben Ouezdou
a
;
mongi.benouezdou@enit.rnu.tn
;
Abderrazek Kallel
a
;
c
关键词:
Self-compacting concrete (SCC)
;
Waste of marble fillers
;
Waste of tiles fillers
;
Durability
;
External sulfate
attack
刊名:Construction and Building Materials
出版年:2017
1
2
3
4
5
6
7
8
9
按检索点细分(29946)
题名(4217)
作者(27)
关键词(2759)
文摘(27602)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.