咨询与建议

限定检索结果

文献类型

  • 152 篇 期刊文献

馆藏范围

  • 152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 138 篇 工学
    • 100 篇 计算机科学与技术...
    • 41 篇 网络空间安全
    • 33 篇 软件工程
    • 8 篇 仪器科学与技术
    • 3 篇 信息与通信工程
    • 2 篇 机械工程
    • 2 篇 控制科学与工程
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
  • 40 篇 管理学
    • 40 篇 管理科学与工程(可...
  • 4 篇 理学
    • 3 篇 数学
  • 4 篇 医学
    • 2 篇 临床医学
    • 1 篇 药学(可授医学、理...
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 2 篇 农学
    • 2 篇 园艺学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 13 篇 网络安全
  • 4 篇 网络空间安全
  • 4 篇 信息传播
  • 4 篇 机器学习
  • 3 篇 人工智能
  • 3 篇 隐私保护
  • 3 篇 计算机
  • 3 篇 分布式系统
  • 3 篇 计算机网络
  • 3 篇 p2p
  • 3 篇 社交网络
  • 3 篇 在线社交网络
  • 3 篇 护卫模式
  • 2 篇 web缓存
  • 2 篇 匿名通信
  • 2 篇 安全防护
  • 2 篇 并行处理
  • 2 篇 分布式
  • 2 篇 命令控制信道
  • 2 篇 可生存性

机构

  • 79 篇 哈尔滨工业大学
  • 25 篇 北京邮电大学
  • 15 篇 广州大学
  • 8 篇 中国科学院计算技...
  • 7 篇 中国科学院大学
  • 7 篇 国防科技大学
  • 7 篇 school of comput...
  • 7 篇 中国科学院信息工...
  • 5 篇 中国网络空间安全...
  • 5 篇 中国科学院研究生...
  • 5 篇 国家计算机网络与...
  • 4 篇 beijing universi...
  • 3 篇 国家计算机网络应...
  • 3 篇 国防科学技术大学
  • 3 篇 信息内容安全技术...
  • 3 篇 东莞电子科技大学
  • 3 篇 北京丁牛科技有限...
  • 3 篇 电子科技大学
  • 2 篇 中北大学
  • 2 篇 national compute...

作者

  • 120 篇 方滨兴
  • 21 篇 张宏莉
  • 14 篇 binxing fang
  • 12 篇 胡铭曾
  • 10 篇 云晓春
  • 10 篇 fang binxing
  • 10 篇 贾焰
  • 8 篇 田志宏
  • 7 篇 崔翔
  • 6 篇 hongli zhang
  • 6 篇 郭莉
  • 5 篇 张宇
  • 5 篇 李爱平
  • 5 篇 殷丽华
  • 4 篇 刘奇旭
  • 4 篇 周斌
  • 4 篇 唐剑琪
  • 4 篇 王忠儒
  • 4 篇 罗浩
  • 4 篇 张兆心

语言

  • 124 篇 中文
  • 28 篇 英文
检索条件"作者=Binxing FANG"
152 条 记 录,以下是1-10 订阅
排序:
Lightweight Mutual Authentication Scheme for Protecting Identity in Insecure Environment
收藏 引用
China Communications 2018年 第6期15卷 158-168页
作者: Xu Wu Jin Xu binxing fang School of Cyberspace Security Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education
Many improved authentication solutions were put forward, on purpose of authenticating more quickly and ***, neither the overuse of hash function,or additional symmetric encryption, can truly increase the overall secur... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
VMScan: an out-of-VM malware scanner
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2020年 第4期27卷 59-68页
作者: Lin Jie Liu Chuanyi fang binxing School of Computer Science and Technology Harbin Institute of TechnologyShenzhenShenzhen 518055China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and TelecommunicationsBeijing 100876China Department of Information and Electronic Engineering Chinese Academy of EngineeringBeijing 100088China
The harm caused by malware in cloud computing environment is more and more serious. Traditional anti-virus software is in danger of being attacked when it is deployed in virtual machine on a large scale, and it tends ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Structure-independent disaster recovery:Concept,architecture and implementations
收藏 引用
Science in China(Series F) 2009年 第5期52卷 813-823页
作者: ZHENG WeiMin fang binxing Department of Computer Science and Technology Tsinghua University Beijing 100084 China Beijing University of Posts and Telecommunications Beijing 100876 China
Disaster recovery (DR) techniques ensure the data safety and service continuity under different natural and human-made disasters by constructing a high reliable storage system. Traditional disaster recovery methods ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Theories of Social Media: Philosophical Foundations
收藏 引用
Engineering 2018年 第1期4卷 94-102页
作者: Jiayin Qi Emmanuel Monod binxing fang Shichang Deng School of Management Shanghai University of International Business and Economics Shanghai 201620 China Institute of Artificial Intelligence and Change Management Shanghai University of International Business and Economics Shanghai 200336 China Institute of Cyberspace Advanced Technology Guangzhou University Guangzhou 510006 China China Electronics Corporation Beijing 100082 China Key Laboratory of Trustworthy Distributed Computing and Service of Ministry of Education Belting University of Posts and Telecommunications Beijing 100876 China
Although many different views of social media coexist in the field of information systems (IS), such the- ories are usually not introduced in a consistent framework based on philosophical foundations, This paper int... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Threat-Based Declassification and Endorsement for Mobile Computing
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 1041-1052页
作者: YIN Lihua GUO Yunchuan ZHANG Huibing HUANG Wenting fang binxing Cyberspace Institute of Advanced Technology Guangzhou University The State Key Laboratory of Information Security Institute of Information Engineering CAS Guangxi Key Lab of Trusted Software Guilin University of Electronic Technology The National Computer Network Emergency Response Technical Team/Coordination Center of China
Declassification and endorsement can efficiently improve the usability of mobile ***, both declassify and endorse operations in practice are often ad-hoc and nondeterministic, thus, being insecure. From a new perspect... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Understanding information interactions in diffusion: an evolutionary game-theoretic perspective
收藏 引用
Frontiers of Computer Science 2016年 第3期10卷 518-531页
作者: Yuan SU Xi ZHANG Lixin LIU Shouyou SONG binxing fang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationSchool of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China
Social networks are fundamental media for dif- fusion of information and contagions appear at some node of the network and get propagated over the edges. Prior re- searches mainly focus on each contagion spreading ind... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The New Frontiers of Cybersecurity
收藏 引用
Engineering 2018年 第1期4卷 1-2页
作者: binxing fang Kui Ren Yan Jia China Electronics Corporation Beijing 100846 China Guangzhou University Guangzhou 510006 China Beijing University of Posts and Telecommunications Beijing 100876 China University at Buffalo State University of New York Buffalo NY 14228 USA Notional University of Defense Technology Changsha 410073 China
Security technology is a special kind of companion technology that is developed for the underlying applications it serves. It is becoming increasingly critical in today's society, as these underlying applications bec... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder
收藏 引用
Science China(Information Sciences) 2024年 第8期67卷 238-252页
作者: Xiang LUO Chang LIU Gaopeng GOU Gang XIONG Zhen LI binxing fang Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Technology Harbin Institute of Technology (Shenzhen)
Accurate identification of malicious traffic is crucial for implementing effective defense countermeasures and has led to extensive research efforts. However, the continuously evolving techniques employed by adversari... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Modeling Multi-factor Sequential User Behavior Data over Social Networks
收藏 引用
Chinese Journal of Electronics 2016年 第2期25卷 364-371页
作者: WANG Peng ZHANG Peng ZHOU Chuan GUO Li fang binxing YANG Tao Institute of Computing Technology Chinese Academy of Sciences Institute of Information Engineering Chinese Academy of Sciences Beijing University of Posts and Telecommunications China Information Technology Security Evaluation Center
Modeling dynamic user behavior over online social networks not only helps us understand user behavior patterns on social networks, but also improves the performance of behavior analysis tasks. Time-varying user behavi... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Review of Data Cleaning Methods for Web Information System
收藏 引用
Computers, Materials & Continua 2020年 第3期62卷 1053-1075页
作者: Jinlin Wang Xing Wang Yuchen Yang Hongli Zhang binxing fang School of Computer Science and Technology Harbin Institute of TechnologyHarbin150006China
Web information system(WIS)is frequently-used and indispensable in daily social *** provides information services in many scenarios,such as electronic commerce,communities,and *** cleaning plays an essential role in v... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论