专题首页
中图分类法(14)
马克思主义、列宁主义、毛泽东思想、邓小平理论(1)
社会科学总论(13)
在“
自然资源管理
”中,
命中:
14
条,耗时:小于0.01 秒
1.
Security
of electrostatic field persistent routing: Attacks and defense mechanisms
作者:
Oliviu C. GhicabAuthor Vitae
;
Cristina Nita-RotaruaAuthor Vitae
;
Goce Trajcevski
;
b
;
goce@eecs.northwestern.edu" class="auth_mail" title="E-mail the corresponding authorAuthor Vitae
;
Peter ScheuermannbAuthor Vitae
关键词:
Security
;
Sensor networks
;
Field based routing
刊名:Ad Hoc Networks
年:2016
2.
Security
-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks
关键词:
Reprogramming
;
Security
;
Confidentiality
;
Dos attacks
;
Wireless sensor networks
刊名:Lecture Notes in Computer Science
出版者:Springer Berlin / Heidelberg
年:2016
3.
An integrated approach to monitoring ecosystem services and agriculture: implications for sustainable agricultural intensification in Rwanda
作者:
Melissa F. Rosa
;
Curan A. Bonham
;
Jan Dempewolf…
关键词:
Landscape monitoring
;
Ecosystem services
;
Sustainable development
;
Agriculture
;
Forests
;
Climate change
刊名:Environmental Monitoring and Assessment
出版者:Springer International Publishing
年:2017
4.
Cyber
security
in the Smart Grid: Survey and challenges
作者:
Wenye Wang
;
wwang@eos.ncsu.eduAuthor Vitae
;
Zhuo Lu zlu3@ncsu.eduAuthor Vitae
关键词:
Smart Grid
;
Cyber
security
;
Attacks and countermeasures
;
Cryptography
;
Security
protocols
刊名:Computer Networks
年:2013
5.
The Agricultural Model Intercomparison and Improvement Project (AgMIP):
Protocols
and pilot studies
作者:
C. Rosenzweiga
;
b
;
cynthia.rosenzweig@nasa.gov
;
J.W. Jonesc
;
J.L. Hatfieldd
;
A.C. Ruanea
;
b
;
K.J. Bootec
;
P. Thorburne
;
J.M. Antlef
;
G.C. Nelsong
;
C. Porterc
;
S. Janssenh
;
S. Assengc
;
B. Bassoi
;
F. Ewertj
;
D. Wallachk
;
G. Baigorrial
;
J.M. Winterb
关键词:
Agriculture
;
Food
security
;
Climate change
;
Crop models
;
Economic models
;
Intercomparison
;
Uncertainty
;
Risk
;
Adaptation
刊名:Agricultural and Forest Meteorology
年:2013
6.
Complexity-style resources in cryptography
作者:
Ed Blakey ed.blakey@queens.oxon.org
关键词:
Computational complexity
;
Cryptography
;
Factorization
;
Resource
;
Security
;
Unconventional computation
刊名:Information and Computation
年:2013
7.
Policy Misuse Detection in Communication Networks with Hidden Markov Models
作者:
Umut Tosun
;
utosun@baskent.edu.tr" class="auth_mail
关键词:
Policy Misuse
;
Hidden Markov Models
刊名:Procedia Computer Science
年:2014
8.
Electricity agents in smart grid markets
作者:
Salem Al-Agtash alagtash@gju.edu.joAuthor Vitae
关键词:
Electricity markets
;
Smart grid middleware
;
Agent based modeling
刊名:Computers in Industry
年:2013
9.
A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients
作者:
Yi-Pin Liao
;
newsun87@mail.sju.edu.twAuthor Vitae
;
Chih-Ming HsiaoAuthor Vitae
关键词:
E-commerce
;
Mobile devices
;
Pairing-based
;
Self-certified public keys
刊名:Future Generation Computer Systems
年:2013
10.
A lightweight group-key management protocol for secure ad-hoc-network routing
作者:
Natalia Castro Fernandes
;
a
;
nataliacf@gmail.com
;
Otto Carlos Muniz Bandeira Duartea [Author vitae]
关键词:
Ad hoc networks
;
Security
;
Group key
;
Routing
刊名:Computer Networks
年:2011
1
2
按检索点细分(14)
关键词(1)
摘要(13)
按年细分(14)
2017年(1)
2016年(2)
2014年(1)
2013年(5)
2011年(2)
2009年(1)
2007年(1)
2006年(1)
按来源细分(14)
Elsevier(10)
Springer(4)
按类型细分(14)
期刊(14)