咨询与建议

限定检索结果

文献类型

  • 1,305 篇 期刊文献
  • 519 篇 会议

馆藏范围

  • 1,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,362 篇 工学
    • 483 篇 计算机科学与技术...
    • 380 篇 网络空间安全
    • 198 篇 软件工程
    • 131 篇 仪器科学与技术
    • 121 篇 机械工程
    • 121 篇 信息与通信工程
    • 90 篇 电子科学与技术(可...
    • 86 篇 控制科学与工程
    • 37 篇 地质资源与地质工...
    • 36 篇 电气工程
    • 32 篇 公安技术
    • 31 篇 交通运输工程
    • 29 篇 石油与天然气工程
    • 29 篇 航空宇航科学与技...
    • 28 篇 环境科学与工程(可...
    • 26 篇 水利工程
    • 26 篇 测绘科学与技术
    • 26 篇 农业工程
  • 393 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 56 篇 工商管理
    • 39 篇 公共管理
    • 34 篇 图书情报与档案管...
  • 248 篇 理学
    • 102 篇 数学
    • 31 篇 物理学
    • 29 篇 系统科学
    • 26 篇 生态学
  • 94 篇 经济学
    • 87 篇 应用经济学
  • 68 篇 军事学
    • 65 篇 军队指挥学
  • 62 篇 教育学
    • 54 篇 教育学
  • 60 篇 农学
    • 26 篇 农业资源与环境
  • 44 篇 医学
  • 42 篇 法学
  • 27 篇 艺术学
  • 10 篇 文学
  • 1 篇 哲学

主题

  • 62 篇 网络安全
  • 46 篇 信息安全
  • 32 篇 evaluation
  • 20 篇 安全
  • 20 篇 计算机网络
  • 18 篇 ahp
  • 18 篇 入侵检测
  • 18 篇 information secu...
  • 18 篇 数据库
  • 17 篇 security
  • 16 篇 gis
  • 16 篇 防火墙
  • 14 篇 安全性
  • 14 篇 电子商务
  • 14 篇 访问控制
  • 13 篇 数字签名
  • 13 篇 网络
  • 13 篇 层次分析法
  • 12 篇 internet
  • 12 篇 信息系统

机构

  • 34 篇 南京信息工程大学
  • 25 篇 武汉理工大学
  • 23 篇 哈尔滨工业大学
  • 22 篇 华中科技大学
  • 22 篇 上海交通大学
  • 21 篇 中国科学技术大学
  • 16 篇 武汉大学
  • 15 篇 清华大学
  • 15 篇 西安电子科技大学
  • 15 篇 电子科技大学
  • 14 篇 四川大学
  • 13 篇 华南理工大学
  • 13 篇 太原理工大学
  • 12 篇 北京邮电大学
  • 11 篇 国防科技大学
  • 11 篇 中国科学院大学
  • 11 篇 中国电子科技集团...
  • 10 篇 北京交通大学
  • 10 篇 天津大学
  • 10 篇 中国矿业大学

作者

  • 162 篇 china
  • 19 篇 beijing
  • 11 篇 p.r.china
  • 8 篇 方滨兴
  • 8 篇 china)
  • 8 篇 吕述望
  • 8 篇 杨义先
  • 7 篇 胡铭曾
  • 6 篇 shanghai
  • 6 篇 wuhan
  • 5 篇 张建伟
  • 5 篇 钟诚
  • 4 篇 王汝传
  • 4 篇 zhengzhou
  • 4 篇 nanjing
  • 4 篇 孙锬锋
  • 4 篇 李明
  • 4 篇 hangzhou
  • 4 篇 p. r. china
  • 4 篇 冯登国

语言

  • 1,052 篇 中文
  • 772 篇 英文
检索条件"作者=2 china information Technology security Evaluation Center,Beijing 100085,china"
1824 条 记 录,以下是61-70 订阅
排序:
自适应拥塞控制系统中LDoS攻击仿真和分析
收藏 引用
系统仿真学报 2011年 第5期23卷 1026-1031页
作者: 刘陶 何炎祥 熊琦 武汉大学计算机学院 武汉430079 中国信息安全测评中心 北京100085
针对自适应拥塞控制系统操作特性所出现的低速率拒绝服务攻击(LDoS,Low-rate Denial of Service attacks)是近年来的一类新型DoS攻击。与传统洪范式DoS攻击相比,LDoS具有攻击效率更高、检测难度更大等特点。在对常用攻击模拟分析平台NS... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Displacement residual based DDM matching algorithm
收藏 引用
Science china(information Sciences) 2012年 第9期55卷 2090-2101页
作者: ZHANG Lin 1,2,ZHOU Zhong 1,2,LIU Lin 1,2 & WU Wei 1,2 1 State Key Laboratory of Virtual Reality technology and Systems,Beihang University,beijing 100191,china 2 School of Computer Science and Engineering,Beihang University,beijing 100191,china 1. State Key Laboratory of Virtual Reality technology and Systems Beihang University Beijing 100191 China2. School of Computer Science and Engineering Beihang University Beijing 100191 China
High level architecture(HLA) is the prevailing standard for modeling and *** data distribution management(DDM) service of HLA is defined for reducing the delivery of irrelevant *** key in DDM implementation is the reg... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
On an attack on RSA with small CRT-exponents
收藏 引用
Science china(information Sciences) 2010年 第8期53卷 1511-1518页
作者: HAN LiDong 1,2 , WANG XiaoYun 3 & XU GuangWu 3,4 1 Key Laboratory of Cryptologic technology and information security, Ministry of Education, Shandong University, Jinan 250100, china 2 School of Mathematics, Shandong University, Jinan 250100, china 3 Institute for Advanced Study, Tsinghua University, beijing 100084, china 4 Department of Electrical Engineering and Computer Science, University of Wisconsin-Milwaukee, Milwaukee, WI 53201, USA 1. Key Laboratory of Cryptologic technology and information security Ministry of Education Shandong University Jinan 250100 China2. School of Mathematics Shandong University Jinan 250100 China3. Institute for Advanced Study Tsinghua University Beijing 100084 China4. Department of Electrical Engineering and Computer Science University of Wisconsin-Milwaukee Milwaukee WI 53201 USA
This paper concerns the RSA system with private CRT-exponents. Since Chinese remainder representation provides efficiency in computation, such system is of some practical significance. In this paper, an existing attac... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Risk analysis model for landslide mass of high slope in dam area
收藏 引用
Science china(Technological Sciences) 2008年 第S2期51卷 25-31页
作者: GU ChongShi1,2,HE XianFeng3,4,WU ZhongRu1,2 & SU HuaiZhi1,2 1 College of Water Conservancy and Hydropower Engineering,Hohai University,Nanjing 210098,china 2 National Engineering Research center of Water Resources Efficient Utilization and Engineering Safety,Nanjing 210098,china 3 Yellow River Institute of Hydraulic Research,Zhengzhou 450003,china 4 Embankment security Defect Prevention and Control Engineering Research center of MWR,Zhengzhou 450003,china 1. College of Water Conservancy and Hydropower Engineering Hohai University Nanjing 210098 China 2. National Engineering Research center of Water Resources Efficient Utilization and Engineering Safety Nanjing 210098 China 3. Yellow River Institute of Hydraulic Research Zhengzhou 450003 China 4. Embankment security Defect Prevention and Control Engineering Research center of MWR Zhengzhou 450003 China
In order to identify the threat of reservoir bank landslide to dam safety and reduce the risk of dam failure,impact factors of the landslide are *** concept of landslide risk degree is put forward to measure the threa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Deniable Authenticated Key Agreement Protocol
收藏 引用
Wuhan University Journal of Natural Sciences 2008年 第6期13卷 645-650页
作者: TIAN Haibo1,2, CHEN Xiaofeng1,2, ZHANG Fangguo1,2, WEI Baodian1,2 1. School of information Science and technology, Sun Yat-Sen University, Guangzhou 510006, Guangdong, china 2. Guangdong Key Laboratory of information security technology, Sun Yat-Sen University, Guangzhou 510275, Guangdong, china School of information Science and technology Sun Yat-Sen University Guangzhou 510006 Guangdong China Guangdong Key Laboratory of information security technology Sun Yat-Sen University Guangzhou 510275 Guangdong China
This paper presents a deniable authenticated key agreement protocol. This protocol can provide an authenticated session key while the sender and the receiver can deny their involvement in such a protocol if the protoc... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A general communication performance evaluation model based on routing path decomposition
收藏 引用
Journal of Zhejiang University-Science C(Computers and Electronics) 2011年 第7期12卷 561-573页
作者: Ai-lian CHENG 1,Yun PAN 1,2,Xiao-lang YAN 2,Ruo-hong HUAN 3 (1 Department of information Science and Electronic Engineering,Zhejiang University,Hangzhou 310027,china) (2 Institute of VLSI Design,Zhejiang University,Hangzhou 310027,china) (3 College of Computer Science and technology,Zhejiang University of technology,Hangzhou 310023,china) Department of information Science and Electronic Engineering Zhejiang University Institute of VLSI Design Zhejiang University
The network-on-chip (NoC) architecture is a main factor affecting the system performance of complicated multi-processor systems-on-chips (MPSoCs).To evaluate the effects of the NoC architectures on communication effic... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Anticoagulation property and security of artificial heart valve material
收藏 引用
Science china(Technological Sciences) 2005年 第2期48卷 145-162页
作者: WANG Xianghui1, , LIU Xianghuai1,22, 3, ZHANG Feng2, LI Changrong2, YU Liujiang2, ZHENG Zhihong2, WANG Xi2, JIANG Zhenbin4, CHEN Anqing4 & XU Jingfang3 1. Department of Physics, East china Normal University, Shanghai 200062, china 2. Ion Beam Lab, Shanghai Institute of Mini-system and information, Chinese Academy of Sciences,Shanghai 200050, china 3. Department of Electronics, School of information Science and technology, East china Normal Univer- sity, Shanghai 200062, china 4. Shanghai Cardiovascular Institute, Zhongshan Hospital, Shanghai 200032, china 1. Department of Physics East China Normal University 200062 Shanghai China 2. Ion Beam Lab Shanghai Institute of Mini-system and information Chinese Academy of Sciences 200050 Shanghai China 3. Department of Electronics School of Information Science and Technology East China Normal University 200062 Shanghai China 4. Shanghai Cardiovascular Institute Zhongshan Hospital 200032 Shanghai China
Heart valve diseases threaten human health. One reliable way to save lives of such patients is to replace the pathologically changed heart valves by artificial ones. Over 2 million patients have received LTI-carbon he... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
New method for signal encryption using blind source separation based on subband decomposition
收藏 引用
Progress in Natural Science:Materials International 2008年 第6期18卷 751-755页
作者: Zuyuan Yang*,Guoxu Zhou,Zongze Wu,Jinlong Zhang School of Electrics and information Engineering,South china University of technology,Guangzhou 510641,china School of Electrics and information Engineering South China University of Technology Guangzhou 510641 China
A novel cryptosystem based on subband decomposition independent component analysis(SDICA)is proposed in this work,where no assumption of independence for the ciphers and the plaintexts is *** the proposed cryptosystem... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Impact Assessment and Protection of Outstanding Landscape Integrity in a Natural Heritage Site:Fairy Valley,Kanas Nature Reserve,Xinjiang,china
收藏 引用
Journal of Mountain Science 2011年 第1期8卷 46-52页
作者: HAN Fang1,2,YANG Zhaoping1,LIU Xinyu1,2,DI Feng3 1 Xinjiang Institute of Ecology and Geography,Chinese Academy of Sciences,Urumqi 830011,china 2 Graduate University of Chinese Academy of Sciences,beijing 100049,china 3 Xinjiang Department of Science and technology,Urumqi 830011,china Xinjiang Institute of Ecology and Geography Chinese Academy of Sciences Urumqi China Graduate University of Chinese Academy of Sciences Beijing China Xinjiang Department of Science and technology Urumqi China
The essential purpose of the Convention Concerning the Protection of World Cultural and Natural Heritage is to protect the integrity of heritage *** landscape is the core embodiment of the aesthetic value of a natural... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Recent progress in fingerprint recognition
收藏 引用
Progress in Natural Science:Materials International 2006年 第3期16卷 231-240页
作者: TIAN Jie, CHEN Xinjian, ZHANG Yangyang, YANG Xin, HE Yuliang, LI Liang, XIE Weihua and ZHENG Zhipeng (center for Biometrics and security Research, Key Laboratory of Complex Systems and Intelligence Science, Institute of Automation, Chinese Academy of Sciences, beijing 100080, china Graduate School of the Chinese Academy of Sciences, beijing 100080, china) [a]center for Biometrics and security Research Key Laboratory of Complex Systems and Intelligence Science Institute of Automation Chinese Academy of Sciences Beijing China [b]Graduate School of the Chinese Academy of Sciences Beijing China
Fingerprint recognition has been increasingly used to realize personal identification in civilian' s daily life, such as ID card, fingerprints hard disk and so on. Great improvement has been achieved in the on-line fi... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论