咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 7 篇 网络空间安全
    • 3 篇 计算机科学与技术...
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
  • 2 篇 理学
    • 2 篇 系统科学
    • 1 篇 数学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 政治学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 12 篇 cyberspace secur...
  • 2 篇 intrusion detect...
  • 2 篇 information syst...
  • 2 篇 information secu...
  • 2 篇 cryptography
  • 1 篇 emerging enginee...
  • 1 篇 project based le...
  • 1 篇 variational auto...
  • 1 篇 deep learning
  • 1 篇 location-based s...
  • 1 篇 deep learning(dl...
  • 1 篇 system identific...
  • 1 篇 markov transitio...
  • 1 篇 recursive least ...
  • 1 篇 collaborative us...
  • 1 篇 personalized ano...
  • 1 篇 information cont...
  • 1 篇 nato
  • 1 篇 internet worm
  • 1 篇 security metrics

机构

  • 2 篇 institute of inf...
  • 1 篇 key laboratory o...
  • 1 篇 harbin institute...
  • 1 篇 college of infor...
  • 1 篇 college of appli...
  • 1 篇 hebei key labora...
  • 1 篇 computer school ...
  • 1 篇 department of co...
  • 1 篇 school of inform...
  • 1 篇 fujian provincia...
  • 1 篇 college of infor...
  • 1 篇 school of cybers...
  • 1 篇 college of missi...
  • 1 篇 hebei engineerin...
  • 1 篇 college of autom...
  • 1 篇 computer school ...
  • 1 篇 state key lab of...
  • 1 篇 world economic a...
  • 1 篇 state key labora...
  • 1 篇 china national d...

作者

  • 2 篇 liqiang zhang
  • 2 篇 bo zhao
  • 2 篇 fei yan
  • 1 篇 gaopeng gou
  • 1 篇 bailing wang
  • 1 篇 ma jianfeng
  • 1 篇 shisheng zhong
  • 1 篇 chunguang ma
  • 1 篇 shen fang
  • 1 篇 tianhao ji
  • 1 篇 dianhui chu
  • 1 篇 jie li
  • 1 篇 songtao yang
  • 1 篇 ruiyun xie
  • 1 篇 yichao sheng
  • 1 篇 xiaodong zheng
  • 1 篇 dandan wu
  • 1 篇 chang liu
  • 1 篇 pinhui ke
  • 1 篇 fajiang yu

语言

  • 11 篇 英文
  • 1 篇 中文
检索条件"主题词=Cyberspace security"
12 条 记 录,以下是1-10 订阅
排序:
Application of meta-learning in cyberspace security:a survey
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 67-78页
作者: Aimin Yang Chaomeng Lu Jie Li Xiangdong Huang Tianhao Ji Xichang Li Yichao Sheng Hebei Key Laboratory of Data Science and Application North China University of Science and TechnologyTangshan063000China Hebei Engineering Research Center for the Intelligentization of Iron Ore Optimization and Ironmaking Raw Materials Preparation Processes North China University of Science and TechnologyTangshan063000China The Key Laboratory of Engineering Computing in Tangshan City North China University of Science and TechnologyTangshan063000China
In recent years,machine learning has made great progress in intrusion detection,network protection,anomaly detection,and other issues in ***,these traditional machine learning algorithms usually require a lot of data ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Survey on cyberspace security
收藏 引用
Science China(Information Sciences) 2015年 第11期58卷 5-47页
作者: ZHANG HuanGuo HAN WenBao LAI XueJia LIN DongDai MA JianFeng LI JianHua Computer School of Wuhan University State Key Laboratory of Mathematics Engineering and Advanced Computing Department of Computer Shanghai Jiaotong University Institute of Information Engineering Chinese Academy of Sciences School of Cyber Engineering Xidian University School of Information security Engineering Shanghai Jiaotong University
Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and work in cyberspace. cyberspace is the collection of all info... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
cyberspace security:a New Global Agenda
收藏 引用
Peace 2013年 第4期 26-34页
作者: Liang Ping World Economic and Political Institute CASS
With rapid development of cyber technology,cyber networks help promote various countries’political,economic and social development,but also incubate new threats to national *** Western major countries have adopted na... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Artificial intelligence algorithms for cyberspace security applications:a technological and status review
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2023年 第8期24卷 1117-1142页
作者: Jie CHEN Dandan WU Ruiyun XIE School of Cybersecurity Northwestern Polytechnical UniversityXi’an710000China China Electronics Technology Network Information security Co. Ltd.Chengdu610000China
Three technical problems should be solved urgently in cyberspace security:the timeliness and accuracy of network attack detection,the credibility assessment and prediction of the security situation,and the effectivene... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The Interdisciplinary Education for The Emerging Engineering Majors:Taking cyberspace security Major as An Example
收藏 引用
计算机教育 2020年 第12期 20-26页
作者: Kaikun Dong Xiaofei Xu Shisheng Zhong Dianhui Chu Huaqiang Zhang Bailing Wang Harbin Institute of Technology Weihai 264209China
The new generation of world information technology revolution has promoted the vigorous development and rapid transform of the new *** in-depth implementation of a series of Chinese important national strategies such... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Achieve Personalized Anonymity Through Query Blocks Exchanging
收藏 引用
China Communications 2016年 第11期13卷 106-118页
作者: Chunguang Ma Lei Zhang Songtao Yang Xiaodong Zheng Pinhui Ke College of Computer Science and Technology Harbin Engineering University Fujian Provincial Key Laboratory of Network security and Cryptology Fujian Normal University College of Information and Electronic Technology Jiamusi University College of Applied Technology Qiqihar University
In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
SecMVX:Analysis on the Vulnerability of Multi-Variant Execution
收藏 引用
China Communications 2021年 第8期18卷 85-95页
作者: Bingzheng Li Zheng Zhang Xiaomei Wang Sheng Qu Jiangxing Wu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China China National Digital Switching System Engineering and Technological R&D Center Zhengzhou 450002China
As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel *** with patch-style passive defense,MVX can defend against known and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Dependence-Induced Risk: security Metrics and Their Measurement Framework
收藏 引用
China Communications 2016年 第11期13卷 119-128页
作者: Liqiang Zhang Fei Yan Bo Zhao Shouhuai Xu Computer School Wuhan University Key Lab of Aerospace Information security and Trusted Computing Wuhan University State Key Lab of Software Engineering Wuhan University Department of Computer Science University of Texas at San Antonio
Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize cyberspace and system security risks. In this paper,we study the class of security risks that are in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
MUS Model:A Deep Learning-Based Architecture for IoT Intrusion Detection
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 875-896页
作者: Yu Yan Yu Yang Shen Fang Minna Gao Yiding Chen College of Information Engineering University of Engineering of the Chinese People’s Armed Police Force(PAP)Xi’an710000China College of Missile Engineering Rocket Force Engineering UniversityXi’an710000China
In the face of the effective popularity of the Internet of Things(IoT),but the frequent occurrence of cybersecurity incidents,various cybersecurity protection means have been proposed and *** them,Intrusion Detection ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Survey on Key Technology Development and Application in Trusted Computing
收藏 引用
China Communications 2016年 第11期13卷 70-90页
作者: Juan Wang Yuan Shi Guojun Peng Huanguo Zhang Bo Zhao Fei Yan Fajiang Yu Liqiang Zhang School of computer Wuhan University Key Laboratory of Aerospace Information security and trusted computing Ministry of Education Wuhan University
Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country who is going to strengthen network construction like Chi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论