设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
Wiley电子期刊(7)
SpringerLink电子期刊(89)
NATURE电子期刊(9)
ACS电子期刊(7)
Springer电子图书(2)
ProQuest学位论文(62)
Elsevier电子期刊(86)
在“
SpringerLink电子期刊
”中,
命中:
89
条,耗时:小于0.01 秒
在所有数据库中总计命中:
262
条
1.
A supply chain network game theory model of
cybersecurity
investments with nonlinear budget constraints
作者:
Anna Nagurney
;
Patrizia Daniele
;
Shivani Shukla
关键词:
Cybersecurity
;
Investments
;
Game theory
;
Nash equilibrium
;
Information asymmetry
;
Variational inequalities
;
Supply chain network vulnerability
刊名:Annals of Operations Research
出版年:2017
2.
Complex cyber-physical networks: From
cybersecurity
to security control
作者:
Guanghui Wen
;
Wenwu Yu
;
Xinghuo Yu
;
Jinhu Lü
关键词:
Communication topology
;
complex cyber
;
physical network
;
cybersecurity
;
Internet of Things
;
secure control
刊名:Journal of Systems Science and Complexity
出版年:2017
3.
Cybersecurity
for Smart Cities: A Brief Review
关键词:
Cybersecurity
;
Cyber threats
;
Smart city
;
Smart grid
;
Internet of Things
刊名:Lecture Notes in Computer Science
出版年:2017
4.
Measuring Stakeholders’ Perceptions of
Cybersecurity
for Renewable Energy Systems
刊名:Lecture Notes in Computer Science
出版年:2017
5.
Changes of
Cybersecurity
Legal System in East Asia: Focusing on Comparison Between Korea and Japan
关键词:
Basic act on
cybersecurity
;
National Anti
;
Cyberterrorism act
;
Korean
cybersecurity
law
;
Japanese
cybersecurity
law
;
Legal system for
cybersecurity
刊名:Lecture Notes in Computer Science
出版年:2016
6.
Leveraging information security and computational trust for
cybersecurity
作者:
Robson de Oliveira Albuquerque…
关键词:
Advanced persistent treats (APT)
;
Computational trust
;
Cybersecurity
;
Exploits
;
Information security
刊名:The Journal of Supercomputing
出版年:2016
7.
The Role of the Supply Chain in
Cybersecurity
Incident Handling for Drilling Rigs
关键词:
Oil and Gas
;
Drilling
;
Cybersecurity
;
Incident response
;
Supply chain
;
Value chain
刊名:Lecture Notes in Computer Science
出版年:2016
8.
Detecting Anomalous Behavior in DBMS Logs
关键词:
Anomaly detection
;
Database intrusion detection
;
Insider threats
;
Cybersecurity
刊名:Lecture Notes in Computer Science
出版年:2017
9.
Cyberfraud and the implications for effective risk-based responses: themes from UK research
作者:
Michael Levi
;
Alan Doig
;
Rajeev Gundur
;
David Wall…
刊名:Crime, Law and Social Change
出版年:2017
10.
A Characterization of
Cybersecurity
Posture from Network Telescope Data
关键词:
Cybersecurity
data analytics
;
Cybersecurity
posture
;
Network telescope
;
Network blackhole
;
Darknet
;
Cyber attack sweep
;
time
;
Time series data
刊名:Lecture Notes in Computer Science
出版年:2015
1
2
3
4
5
6
7
8
9
按检索点细分(89)
题名(31)
作者(1)
关键词(45)
文摘(55)
按出版年细分(89)
2017年(6)
2016年(20)
2015年(17)
2014年(14)
2013年(17)
2012年(12)
2010年(1)
2004年(2)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.