设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
Springer电子图书(37)
CNKI会议论文(1)
CNKI学位论文(2252)
知网期刊论文(1065)
在“
SpringerLink电子期刊
”中,
命中:
724
条,耗时:0.0209803 秒
在所有数据库中总计命中:
3,355
条
1.
A Delay-Based Countermeasure Against the Discovery
of
Default Rules in Firewalls
作者:
K. Sattar
;
K. Salah
;
M. Sqalli
;
R. Rafiq…
关键词:
Denial
of
service
attacks
;
Firewall
;
Moving target defense
;
Network security
刊名:Arabian Journal for Science and Engineering
出版年:2017
2.
A DDoS Detection and Mitigation System Framework Based on Spark and SDN
关键词:
S
of
tware
;
defined networking(SDN)
;
Distributed
denial
of
service
(DDoS)
;
Apache spark
刊名:Lecture Notes in Computer Science
出版年:2017
3.
Performance Modeling and Analysis
of
the EDoS-Shield Mitigation
作者:
F. Al-Haidari
;
K. Salah
;
M. Sqalli…
关键词:
Cloud computing
;
Cloud security
;
DDoS attacks
;
EDoS attacks
;
Performance modeling and evaluation
刊名:Arabian Journal for Science and Engineering
出版年:2017
4.
An improved and provably secure privacy preserving authentication protocol for SIP
作者:
Shehzad Ashraf Chaudhry
;
Husnain Naqvi…
关键词:
Authentication
;
Authenticated key agreement
;
Elliptic curve cryptography
;
Impersonation attack
;
Provable security
;
ProVerif
刊名:Peer-to-Peer Networking and Applications
出版年:2017
5.
Bots, cops, and corporations: on the limits
of
enforcement and the promise
of
polycentric regulation as a way to control large-scale cybercrime
作者:
Benoit Dupont
关键词:
Cybercrime
;
Botnets
;
Enforcement
;
Regulation
;
Harm reduction
;
Polycentric governance
刊名:Crime, Law and Social Change
出版年:2017
6.
An anonymous and secure authentication and key agreement scheme for session initiation protocol
作者:
Hao Lin
;
Fengtong Wen
;
Chunxia Du
关键词:
Authentication
;
Session Initiation Protocol (SIP)
;
Security attacks
;
User anonymity
;
The elliptic curve discrete logarithm problem
刊名:Multimedia Tools and Applications
出版年:2017
7.
DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions
作者:
Narmeen Zakaria Bawany
;
Jawwad A. Shamsi…
关键词:
S
of
tware
;
defined networking
;
SDN
;
DDoS attacks
;
OpenFlow
;
DDoS mitigation
刊名:Arabian Journal for Science and Engineering
出版年:2017
8.
Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing
作者:
Di Lu
;
Jianfeng Ma
;
Cong Sun
;
Xindi Ma
;
Ning Xi
关键词:
credit
;
resource allocation
;
security
;
fairness
;
cloud computing
刊名:SCIENCE CHINA Information Sciences
出版年:2017
9.
A static technique for detecting input validation vulnerabilities in Android apps
作者:
Zhejun Fang
;
Qixu Liu
;
Yuqing Zhang
;
Kai Wang…
关键词:
input validation
;
static analysis
;
program slicing
;
vulnerability detection
;
Android security
刊名:SCIENCE CHINA Information Sciences
出版年:2017
10.
Performance evaluation
of
Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed
denial
-
of
-
service
attack detection in health care systems
作者:
Haider Abbas
;
Rabia Latif
;
Seemab Latif
;
Ashraf Masood
关键词:
Cloud
;
assisted wireless body area network
;
Distributed
Denial
of
Service
attack
;
Very Fast Decision Tree
;
Data mining
;
Machine learning
刊名:Annals
of
Telecommunications
出版年:2016
1
2
3
4
5
6
7
8
9
按检索点细分(724)
题名(84)
关键词(127)
文摘(677)
按出版年细分(724)
2017年(9)
2016年(45)
2015年(57)
2014年(69)
2013年(55)
2012年(53)
2011年(13)
2010年(29)
2009年(28)
2008年(36)
2007年(52)
2006年(104)
2005年(99)
2004年(32)
2003年(7)
2002年(19)
2001年(6)
2000年(1)
2000年及以前(10)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.