咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 6 篇 计算机科学与技术...
    • 3 篇 信息与通信工程
    • 3 篇 网络空间安全
    • 2 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 化学工程与技术
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 1 篇 定量评估
  • 1 篇 可靠多播
  • 1 篇 apache
  • 1 篇 automated defens...
  • 1 篇 电子现金
  • 1 篇 network defense
  • 1 篇 preventive and r...
  • 1 篇 容错算法
  • 1 篇 software-defined...
  • 1 篇 android malware
  • 1 篇 obfuscation
  • 1 篇 流行模式
  • 1 篇 adaptive defense
  • 1 篇 安全风险评价
  • 1 篇 cybersecurity dy...
  • 1 篇 框架
  • 1 篇 计算机系统
  • 1 篇 诱导
  • 1 篇 programmable def...
  • 1 篇 global state est...

机构

  • 1 篇 department of co...
  • 1 篇 national enginee...
  • 1 篇 school of comput...
  • 1 篇 the school of ma...
  • 1 篇 department of co...
  • 1 篇 the artificial i...
  • 1 篇 复旦大学
  • 1 篇 saic intelligent...
  • 1 篇 the school of ma...
  • 1 篇 school of comput...
  • 1 篇 computer school ...
  • 1 篇 state key lab of...
  • 1 篇 key lab of aeros...
  • 1 篇 department of co...
  • 1 篇 the department o...
  • 1 篇 national enginee...
  • 1 篇 department of co...

作者

  • 4 篇 shouhuai xu
  • 1 篇 haoyu chen
  • 1 篇 liqiang zhang
  • 1 篇 hai jin
  • 1 篇 bin yuan
  • 1 篇 paul parker
  • 1 篇 fei yan
  • 1 篇 张根度
  • 1 篇 ren zheng
  • 1 篇 zhaofeng liu
  • 1 篇 yan xu
  • 1 篇 deqing zou
  • 1 篇 徐寿怀
  • 1 篇 wenlian lu
  • 1 篇 qianmu li
  • 1 篇 朱洪
  • 1 篇 deqiang li
  • 1 篇 bo zhao

语言

  • 5 篇 英文
  • 1 篇 中文
检索条件"作者=Shouhuai XU"
6 条 记 录,以下是1-10 订阅
排序:
Malware Evasion Attacks Against IoT and Other Devices: An Empirical Study
收藏 引用
Tsinghua Science and Technology 2024年 第1期29卷 127-142页
作者: Yan xu Deqiang Li Qianmu Li Shouhuai XU School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Department of Computer Science University of Colorado Colorado SpringsColorado SpringsCO 80918USA
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge computing.While enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
SAND: semi-automated adaptive network defense via programmable rule generation and deployment
收藏 引用
Science China(Information Sciences) 2022年 第7期65卷 121-138页
作者: Haoyu CHEN Deqing ZOU Hai JIN Shouhuai XU Bin YUAN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHubei Engineering Research Center on Big Data Security School of Cyber Science and EngineeringHuazhong University of Science and Technology Department of Computer Science University of Colorado at Colorado Springs
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Using Event-Based Method to Estimate Cybersecurity Equilibrium
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2021年 第2期8卷 455-467页
作者: Zhaofeng Liu Ren Zheng Wenlian Lu Shouhuai XU the School of Mathematical Sciences Fudan UniversityShanghai 200433China the Artificial Intelligence Laboratory SAIC Motor Corporation LimitedShanghai 200041 SAIC Intelligent Technology(Shanghai)Corporation Limited Shanghai 200433China the School of Mathematical Sciences Fudan Universityand Shanghai Center for Mathematical SciencesFudan Universityand also with Shanghai Key Laboratory for Contemporary Applied MathematicsShanghai 200433China the Department of Computer Science University of Texas at San AntonioSan Antonio TX 78249 USA
Estimating the global state of a networked system is an important problem in many application domains.The classical approach to tackling this problem is the periodic(observation)method,which is inefficient because it ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Dependence-Induced Risk: Security Metrics and Their Measurement Framework
收藏 引用
China Communications 2016年 第11期13卷 119-128页
作者: Liqiang Zhang Fei Yan Bo Zhao Shouhuai XU Computer School Wuhan University Key Lab of Aerospace Information Security and Trusted Computing Wuhan University State Key Lab of Software Engineering Wuhan University Department of Computer Science University of Texas at San Antonio
Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A PROBABILISTIC CHARACTERIZATION OF A FAULT-TOLERANT GOSSIPING ALGORITHM
收藏 引用
Journal of Systems Science & Complexity 2009年 第1期22卷 88-108页
作者: Paul PARKER Department of Computer Science University of Texas at San Antonio One UTSA Circle
Gossiping is a popular technique for probabilistic reliable multicast (or broadcast).However,it is often difficult to understand the behavior of gossiping algorithms in an analytic fashion.Indeed,existing analyses of ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
使用电子现金的安全系统(英文)
收藏 引用
计算机工程 1999年 第S1期25卷 129-132,146页
作者: 徐寿怀 张根度 朱洪 复旦大学计算机系 上海200433
提出了一种新方法来保护使用电子现金的计算机系统,电子现金是一个最近得到广泛研究的概念。该文的第一个贡献在于利用电子现金作为密码,使得在某种程序上这种密码成为对系统一次性密码的扩展。然而,一次性密码的缺陷我解决方案中不... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论