咨询与建议

限定检索结果

文献类型

  • 8 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 5 篇 网络空间安全
    • 4 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 环境科学与工程(可...
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 1 篇 军事学
    • 1 篇 战略学

主题

  • 9 篇 active defense
  • 1 篇 target-attacker-...
  • 1 篇 deep learning
  • 1 篇 user station
  • 1 篇 pursuit-evasion ...
  • 1 篇 serverless compu...
  • 1 篇 cooperative guid...
  • 1 篇 differential gam...
  • 1 篇 guidance law
  • 1 篇 relative interce...
  • 1 篇 cooperate policy
  • 1 篇 minimum effort o...
  • 1 篇 ballistic missil...
  • 1 篇 module
  • 1 篇 capsule network
  • 1 篇 situation awaren...
  • 1 篇 backdoor attack
  • 1 篇 optimal guidance
  • 1 篇 breakthrough met...
  • 1 篇 cyber security

机构

  • 2 篇 information engi...
  • 1 篇 school of cyber ...
  • 1 篇 the school of el...
  • 1 篇 shenyang institu...
  • 1 篇 state key labora...
  • 1 篇 the school of cy...
  • 1 篇 school of inform...
  • 1 篇 the college of e...
  • 1 篇 the nari group c...
  • 1 篇 beijing institut...
  • 1 篇 school of automa...
  • 1 篇 key laboratory o...
  • 1 篇 the sixth facult...
  • 1 篇 shenyang institu...
  • 1 篇 school of inform...
  • 1 篇 turpan electric ...
  • 1 篇 school of automa...
  • 1 篇 beijing advanced...
  • 1 篇 tsinghua univers...
  • 1 篇 school of aerona...

作者

  • 1 篇 jun’e li
  • 1 篇 li liang
  • 1 篇 ke song
  • 1 篇 jianjing shen
  • 1 篇 zhang shuai
  • 1 篇 shuo zhang
  • 1 篇 hongyan yin
  • 1 篇 ling ouyang
  • 1 篇 linbo tao
  • 1 篇 wang yawen
  • 1 篇 bin wu
  • 1 篇 linlin wang
  • 1 篇 qi wang
  • 1 篇 haizhao liang
  • 1 篇 peng hu
  • 1 篇 manli li
  • 1 篇 xiangyu li
  • 1 篇 yingjun wu
  • 1 篇 binghao yan
  • 1 篇 guo yunfei

语言

  • 8 篇 英文
  • 1 篇 中文
检索条件"主题词=Active defense"
9 条 记 录,以下是1-10 订阅
排序:
DLP:towards active defense against backdoor attacks with decoupled learning process
收藏 引用
Cybersecurity 2024年 第1期7卷 122-134页
作者: Zonghao Ying Bin Wu State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina
Deep learning models are well known to be susceptible to backdoor attack,where the attacker only needs to provide a tampered dataset on which the triggers are injected.Models trained on the dataset will passively impl... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cooperative differential games guidance laws for multiple attackers against an active defense target
收藏 引用
Chinese Journal of Aeronautics 2022年 第5期35卷 374-389页
作者: Fei LIU Xiwang DONG Qingdong LI Zhang REN School of Automation Science and Electrical Engineering Science and Technology on Aircraft Control LaboratoryBeihang UniversityBeijing 100083China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang UniversityBeijing 100083China Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education of ChinaChongqing UniversityChongqing 400044China
This paper is concerned with a scenario of multiple attackers trying to intercept a target with active defense.Three types of agents are considered in the guidance:The multiple attackers,the target and the defender,wh... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
ATSSC:An Attack Tolerant System in Serverless Computing
收藏 引用
China Communications 2024年 第6期21卷 192-205页
作者: Zhang Shuai Guo Yunfei Hu Hongchao Liu Wenyan Wang Yawen Information Engineering University Zhengzhou 450002China
Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming.With serverless computing,developers only provide function code to serverless platform,and these functions are ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Concept and Research Framework for Coordinated Situation Awareness and active defense of Cyber-physical Power Systems Against Cyber-attacks
收藏 引用
Journal of Modern Power Systems and Clean Energy 2021年 第3期9卷 477-484页
作者: Ming Ni Manli Li Jun’e Li Yingjun Wu Qi Wang the NARI Group Corporation(State Grid Electric Power Research Institute) NARI Technology Co.Ltd.and the State Key Laboratory of Smart Grid Protection and ControlNanjing 211106China the School of Cyber Science and Engineering Wuhan Universityand the Key Laboratory of Aerospace Information Security and Trusted Computing of the Ministry of EducationWuhan 430072China the College of Energy and Electrical Engineering Hohai UniversityNanjing 211100China the School of Electrical Engineering Southeast UniversityNanjing 210096China
Due to the tight coupling between the cyber and physical sides of a cyber-physical power system(CPPS),the safe and reliable operation of CPPSs is being increasingly impacted by cyber security.This situation poses a ch... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Optimal guidance against active defense ballistic missiles via differential game strategies
收藏 引用
Chinese Journal of Aeronautics 2020年 第3期33卷 978-989页
作者: Haizhao LIANG Jianying WANG Yonghai WANG Linlin WANG Peng LIU School of Aeronautics and Astronautics Sun Yat-sen UniversityGuangzhou 510275China Beijing Institute of Space Long March Vehicle Beijing 100076China
The optimal guidance problem for an interceptor against a ballistic missile with active defense is investigated in this paper.A class of optimal guidance schemes are proposed based on linear quadratic differential gam... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
User Station Security Protection Method Based on Random Domain Name Detection and active defense
收藏 引用
Journal of Information Security 2023年 第1期14卷 39-51页
作者: Hongyan Yin Xiaokang Ren Jinyu Liu Shuo Zhang Wenkun Liu School of Information Engineering University of Shenyang Shenyang China Shenyang Institute of Computing Technology Chinese Academy of Sciences Shenyang China Shenyang Institute of Computing Technology Co. Ltd. CAS Chinese Academy of Sciences Shenyang China Turpan Electric Power Supply Company State Grid Xinjiang Electric Power Company Limited Turpan China
The power monitoring system is the most important production management system in the power industry. As an important part of the power monitoring system, the user station that lacks grid binding will become an import... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Intelligent active defense Method Against Trojan Based on Behavior Sequence
An Intelligent Active Defense Method Against Trojan Based on...
收藏 引用
2015年中国智能自动化学术会议
作者: Linbo Tao Jianjing Shen Peng Hu The Sixth Faculty of the PLA Information Engineering University
For the question of lacking Trojans structure analyzing and relationship research of behavior sequence combination in current plan of active defense, the paper studies principles of traditional anti-virus and active d... 详细信息
来源: cnki会议 评论
A differential game for cooperative target defense with two slow defenders
收藏 引用
Science China(Information Sciences) 2020年 第12期63卷 269-271页
作者: Li LIANG Fang DENG School of Automation Beijing Institute of Technology School of Information Engineering Inner Mongolia University of Science and Technology
Dear editor,active defense is an effective way to improve battlefield survivability [1]. In the actual battlefield environment, equipment with weaker survivability usually needs a friendly platform to protect it from ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Preventing Hardware Trojans in Switch Chip Based on Payload Decoupling
收藏 引用
China Communications 2021年 第8期18卷 96-108页
作者: Ke Song Binghao Yan Xiangyu Li Qinrang Liu Ling OuYang Information Engineering University Zhengzhou 450002China Tsinghua University Beijing 100084China
Hardware Trojans in integrated circuit chips have the characteristics of being covert,destructive,and difficult to protect,which have seriously endangered the security of the chips themselves and the information syste... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论