设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
Wiley电子期刊(18)
SpringerLink电子期刊(523)
NATURE电子期刊(2)
Springer电子图书(15)
ProQuest学位论文(84)
Elsevier电子期刊(725)
在“
Elsevier电子期刊
”中,
命中:
725
条,耗时:0.0409848 秒
在所有数据库中总计命中:
1,367
条
1.
Model-based
security
engineering for
cyber
-physical systems: A systematic mapping study
作者:
Phu H. Nguyen
;
a
;
phu@simula.no
;
nguyenhongphu@gmail.com
;
Shaukat Ali
a
;
Tao Yue
a
;
b
关键词:
Cyber
-physical systems
;
Security
;
Model-based engineering
;
Security
engineering
;
Systematic mapping
;
Snowballing
;
Survey
刊名:Information and Software Technology
出版年:2017
2.
A method for evaluating the consequence propagation of
security
attacks in
cyber
-physical systems
作者:
Hamed Orojloo
orojloo@iust.ac.ir" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Mohammad Abdollahi Azgomi
;
azgomi@iust.ac.ir" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Cyber
&ndash
;
physical systems (CPSs)
;
Security
evaluation
;
Physical dynamics
;
Consequence propagation
刊名:Future Generation Computer Systems
出版年:2017
3.
Cyber
security
in nuclear industry - Analytic study from the terror incident in nuclear power plants (NPPs)
作者:
Hyo Sung Cho
a
;
Tae Ho Woo
a
;
b
;
thwoo@cuk.edu" class="auth_mail" title="E-mail the corresponding author
;
thw_kor@hotmail.com" class="auth_mail" title="E-mail the corresponding author
关键词:
Nuclear power plants
;
Cyber
security
;
Terrorism
;
Safety
刊名:Annals of Nuclear Energy
出版年:2017
4.
Individual differences and Information
Security
Awareness
作者:
Agata McCormac
a
;
agata.mccormac@dsto.defence.gov.au
;
Tara Zwaans
b
;
tara.zwaans@student.adelaide.edu.au
;
Kathryn Parsons
a
;
kathryn.parsons@dsto.defence.gov.au
;
Dragana Calic
a
;
dragana.calic@dsto.defence.gov.au
;
Marcus Butavicius
a
;
marcus.butavicius@dsto.defence.gov.au
;
Malcolm Pattinson
c
;
malcolm.pattinson@adelaide.edu.au
关键词:
Information
Security
Awareness (ISA)
;
Information
security
(InfoSec)
;
Cyber
security
;
Personality
;
Risk
;
Individual differences
刊名:Computers in Human Behavior
出版年:2017
5.
Identifying
cyber
-attacks on software defined networks: An inference-based intrusion detection approach
作者:
Ahmed AlEroud
a
;
Ahmed.aleroud@yu.edu.jo
Author Vitae
;
Izzat Alsmadi
b
;
ialsmadi@tamusa.edu
Author Vitae
关键词:
Software defined networks
;
Information
security
;
Intrusion detection
;
Graph mining
;
Denial of service attacks
;
Security
architecture
刊名:Journal of Network and Computer Applications
出版年:2017
6.
Cyber
-victimization preventive behavior: A health belief model approach
作者:
Matias Dodel
;
1
;
matias.dodel@ucu.edu.uy
Author Vitae
;
Gustavo Mesch
1
;
gustavo@soc.haifa.ac.il
Author Vitae
关键词:
Victimization
;
Safety
;
Preventive behavior
;
Health belief model
;
Security
;
Cyber
crime
刊名:Computers in Human Behavior
出版年:2017
7.
Privacy-friendly secure bidding for smart grid demand-response
作者:
Mohammad Shahriar Rahman
;
a
;
mohammad@kddi-research.jp" class="auth_mail" title="E-mail the corresponding author
;
md.shahriarr@gmail.com" class="auth_mail" title="E-mail the corresponding author
;
Anirban Basu
a
;
basu@kddi-research.jp" class="auth_mail" title="E-mail the corresponding author
;
Shinsaku Kiyomoto
a
;
kiyomoto@kddi-research.jp" class="auth_mail" title="E-mail the corresponding author
;
M. Z. A Bhuiyan
b
;
mbhuiyan3@fordham.edu" class="auth_mail" title="E-mail the corresponding author
关键词:
Security
;
Privacy
;
Smart grid
;
Demand response
;
Bidding
刊名:Information Sciences
出版年:2017
8.
Implementation of
cyber
security
for safety systems of nuclear facilities
作者:
JaeKwan Park
;
jkpark183@kaeri.re.kr" class="auth_mail" title="E-mail the corresponding author
;
YongSuk Suh
yssuh@kaeri.re.kr" class="auth_mail" title="E-mail the corresponding author
;
Cheol Park
cpark@kaeri.re.kr" class="auth_mail" title="E-mail the corresponding author
关键词:
Cyber
security
;
Computer
security
;
Cyber
security
plan
;
Cyber
security
implementation
;
Software verification and validation
刊名:Progress in Nuclear Energy
出版年:2016
9.
A problem shared is a problem halved: A survey on the dimensions of collective
cyber
defense through
security
information sharing
作者:
Florian Skopik
;
florian.skopik@ait.ac.at" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Giuseppe SettanniAuthor Vitae
;
Roman FiedlerAuthor Vitae
关键词:
Survey
;
Cyber
security
;
Information sharing
;
Cyber
incident reporting
;
Organizational aspects
;
Standardization
刊名:Computers &
Security
出版年:2016
10.
Anomaly detection for smartphone data streams
作者:
Yisroel Mirsky
;
yisroel@post.bgu.ac.il
;
Asaf Shabtai
shabtaia@bgu.ac.il
;
Bracha Shapira
bshapira@bgu.ac.il
;
Yuval Elovici
elovici@bgu.ac.il
;
Lior Rokach
liorrk@post.bgu.ac.il
关键词:
Smartphone
security
;
Data streams
;
Anomaly detection
;
Contexts
;
Continuous authentication
刊名:Pervasive and Mobile Computing
出版年:2017
1
2
3
4
5
6
7
8
9
按检索点细分(725)
题名(112)
关键词(113)
文摘(357)
按出版年细分(725)
2027年及以后(65)
2017年(16)
2016年(124)
2015年(36)
2014年(8)
2013年(72)
2012年(66)
2011年(59)
2010年(34)
2009年(28)
2008年(6)
2007年(20)
2006年(22)
2005年(17)
2004年(12)
2003年(10)
2002年(18)
2001年(31)
2000年(24)
2000年及以前(57)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.