咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 3 篇 网络空间安全
    • 2 篇 动力工程及工程热...
    • 2 篇 计算机科学与技术...
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 7 篇 internet securit...
  • 2 篇 dos attacks
  • 1 篇 internet of thin...
  • 1 篇 intrusion detect...
  • 1 篇 source address s...
  • 1 篇 cyberattack
  • 1 篇 catboost
  • 1 篇 ddos
  • 1 篇 filter-based rea...
  • 1 篇 software-defined...
  • 1 篇 网络空间国际秩序
  • 1 篇 authentication
  • 1 篇 systems
  • 1 篇 xgboost
  • 1 篇 filtering scheme
  • 1 篇 网络安全
  • 1 篇 spoofing prevent...
  • 1 篇 信息主权
  • 1 篇 costs
  • 1 篇 international ne...

机构

  • 1 篇 college of infor...
  • 1 篇 school of comput...
  • 1 篇 school of comput...
  • 1 篇 guangxi colleges...
  • 1 篇 state key labora...
  • 1 篇 turan university...
  • 1 篇 nanjing universi...
  • 1 篇 al-farabi kazakh...
  • 1 篇 state key labora...
  • 1 篇 satbayev univers...
  • 1 篇 institute of inf...
  • 1 篇 zhejiang provinc...
  • 1 篇 tsinghua nationa...
  • 1 篇 hangzhou city br...
  • 1 篇 purdue universit...
  • 1 篇 school of cyber ...
  • 1 篇 hangzhou global ...

作者

  • 2 篇 lu ning
  • 1 篇 xiaohua ye
  • 1 篇 毕军
  • 1 篇 kui ren
  • 1 篇 yongsheng shen
  • 1 篇 guanglin qin
  • 1 篇 yan xiang
  • 1 篇 olga ussatova
  • 1 篇 崔聪聪
  • 1 篇 bingsheng zhang
  • 1 篇 daofeng li
  • 1 篇 eric t.matson
  • 1 篇 nikita ussatov
  • 1 篇 吴建平
  • 1 篇 hu wenhao
  • 1 篇 chengfeng dong
  • 1 篇 junjie chen
  • 1 篇 shan gao
  • 1 篇 jing maohua
  • 1 篇 沈燕

语言

  • 5 篇 英文
  • 2 篇 中文
检索条件"主题词=Internet security"
7 条 记 录,以下是1-10 订阅
排序:
A General Authentication and Key Agreement Framework for Industrial Control System
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 1046-1062页
作者: Shan GAO Junjie CHEN Bingsheng ZHANG Kui REN Xiaohua YE Yongsheng SHEN School of Cyber Science and Technology Zhejiang University Hangzhou Global Scientific and Technological Innovation Center Zhejiang University Zhejiang Provincial Key Laboratory of Blockchain and Cyberspace Governance Hangzhou City Brain Co. Ltd
In modern industrial control systems(ICSs), when user retrieving the data stored in field device like smart sensor, there exists two main problems: one is lack of the verification for identification of user and field ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Comprehensive DDoS Attack Classification Using Machine LearningAlgorithms
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 577-594页
作者: Olga Ussatova Aidana Zhumabekova Yenlik Begimbayeva Eric T.Matson Nikita Ussatov Al-Farabi Kazakh National University Almaty050040Kazakhstan Institute of Information and Computational Technologies Almaty050010Kazakhstan Satbayev University Almaty050013Kazakhstan Purdue University West Lafayette47907INUSA Turan University Almaty050013Kazakhstan
The fast development of internet technologies ignited the growthof techniques for information security that protect data, networks, systems,and applications from various threats. There are many types of threats. Thede... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
SAFE:a Scalable Filter-Based Packet Filtering Scheme
收藏 引用
China Communications 2016年 第2期13卷 163-177页
作者: LU Ning HU Wenhao College of Information Science and Engineering Northeastern University.ShenyangLiaoning110819 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing100000China Nanjing University of Information Science and Technology Nanjing Jiangsu210044 China
Recently, attacks have become Denial-of-Service (DOS) the mainstream threat to the internet service availability. The filter-based packet filtering is a key technology to defend against such attacks. Relying on the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
ResNeSt-biGRU: An Intrusion Detection Model Based on internet of Things
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1005-1023页
作者: Yan Xiang Daofeng Li Xinyi Meng Chengfeng Dong Guanglin Qin School of Computer and Electronics Information Guangxi UniversityNanning530004China Guangxi Colleges and Universities Key Laboratory of Multimedia Communications and Information Processing Guangxi UniversityNanning530004China
The rapid expansion of internet of Things (IoT) devices across various sectors is driven by steadily increasingdemands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device has... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Preventing IP Source Address Spoofing: A Two-Level, State Machine-Based Method
收藏 引用
Tsinghua Science and Technology 2009年 第4期14卷 413-422页
作者: 毕军 刘冰洋 吴建平 沈燕 Tsinghua National Laboratory for Information Science and Technology Network Research Center Tsinghua University China Education and Research Network (CERNET)
A signature-and-verification-based method, automatic peer-to-peer anti-spoofing (APPA), is pro- posed to prevent IP source address spoofing. In this method, signatures are tagged into the packets at the source peer,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Router Based Packet Filtering Scheme for Defending Against DoS Attacks
收藏 引用
China Communications 2014年 第10期11卷 136-146页
作者: LU Ning SU Sen JING Maohua HAN Jian School of Computer and Communication Engineering Northeastern University at Qinhuangdao State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications.
The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
后棱镜时代的国际网络治理
收藏 引用
国际法学 2014年 第11期
作者: 崔聪聪
美国已建立起一整套涵盖网络空间战略、法律、军事和技术保障的网络防控体系。美国对ICANN的监管权的移交不会导致其丧失对互联网的实际控制权。自上而下的方法不是互联网国际治理的最优解决方案,互联网治理需要利益相关方的共同参与... 详细信息
来源: 人大复印报刊资料 评论