咨询与建议

限定检索结果

文献类型

  • 2,272 篇 期刊文献
  • 60 篇 会议
  • 14 篇 学位论文
  • 1 篇 报纸

馆藏范围

  • 2,347 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,583 篇 工学
    • 902 篇 计算机科学与技术...
    • 605 篇 网络空间安全
    • 301 篇 软件工程
    • 258 篇 信息与通信工程
    • 236 篇 电子科学与技术(可...
    • 179 篇 电气工程
    • 149 篇 仪器科学与技术
    • 139 篇 控制科学与工程
    • 115 篇 材料科学与工程(可...
    • 92 篇 机械工程
    • 40 篇 环境科学与工程(可...
    • 33 篇 生物医学工程(可授...
    • 32 篇 力学(可授工学、理...
    • 28 篇 动力工程及工程热...
    • 27 篇 交通运输工程
  • 253 篇 法学
    • 167 篇 政治学
    • 44 篇 社会学
  • 247 篇 理学
    • 130 篇 数学
    • 43 篇 物理学
    • 39 篇 生物学
  • 243 篇 管理学
    • 118 篇 管理科学与工程(可...
    • 52 篇 公共管理
    • 35 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 203 篇 医学
    • 183 篇 临床医学
  • 172 篇 经济学
    • 159 篇 应用经济学
    • 28 篇 理论经济学
  • 52 篇 艺术学
    • 49 篇 设计学(可授艺术学...
  • 46 篇 农学
  • 38 篇 教育学
    • 28 篇 教育学
  • 34 篇 文学
  • 34 篇 军事学
    • 31 篇 军队指挥学
  • 8 篇 历史学
  • 4 篇 哲学

主题

  • 2,347 篇 security
  • 95 篇 privacy
  • 91 篇 network
  • 73 篇 food
  • 70 篇 system
  • 68 篇 authentication
  • 61 篇 of
  • 60 篇 and
  • 59 篇 internet
  • 55 篇 information
  • 49 篇 blockchain
  • 44 篇 management
  • 44 篇 网络安全
  • 39 篇 安全解决方案
  • 38 篇 encryption
  • 37 篇 internet of thin...
  • 36 篇 data
  • 35 篇 point
  • 35 篇 cryptography
  • 35 篇 social

机构

  • 9 篇 department of co...
  • 7 篇 department of in...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 information tech...
  • 5 篇 西安电子科技大学
  • 4 篇 national digital...
  • 4 篇 university of ch...
  • 4 篇 cpapd
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 4 篇 college of techn...
  • 3 篇 中国金融认证中心
  • 3 篇 department of co...
  • 3 篇 cpapd executive ...
  • 3 篇 key laboratory o...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 中国信息安全技术...
  • 3 篇 山东大学

作者

  • 9 篇 abdelwahed motwa...
  • 9 篇 china
  • 8 篇 mesfer al duhayy...
  • 7 篇 sanjeev kumar
  • 7 篇 anwer mustafa hi...
  • 7 篇 arif sari
  • 6 篇 kang baoyuan
  • 6 篇 夏治强
  • 5 篇 fatma s.alrayes
  • 5 篇 meng xiangqing
  • 5 篇 千堆栈
  • 5 篇 ishfaq yaseen
  • 5 篇 金传升
  • 5 篇 mahmoud ragab
  • 5 篇 fahd n.al-wesabi
  • 4 篇 abu sarwar zaman...
  • 4 篇 ahmed alkhayyat
  • 4 篇 mohammed rizwanu...
  • 4 篇 sasith m. rajaso...
  • 4 篇 吴敌

语言

  • 1,431 篇 英文
  • 915 篇 中文
  • 1 篇 日文
检索条件"主题词=SECURITY"
2347 条 记 录,以下是81-90 订阅
排序:
An Aware-Scheduling security Architecture with Priority-Equal Multi-Controller for SDN
收藏 引用
China Communications 2017年 第9期14卷 144-154页
作者: Chao Qi Jiangxing Wu Guozhen Cheng Jianjian Ai Shuo Zhao National Digital Switching System Engineering & Technological R&D Center
Current SDN controllers suffer from a series of potential attacks. For example, malicious flow rules may lead to system disorder by introducing unexpected flow entries. In this paper, we propose Mcad-SA, an aware deci... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A security scheme for intelligent substation communications considering real-time performance
收藏 引用
Journal of Modern Power Systems and Clean Energy 2019年 第4期7卷 948-961页
作者: Jie ZHANG Jun’e LI Xiong CHEN Ming NI Ting WANG Jianbo LUO Key Laboratory of Aerospace Information security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China NARI Group Corporation(State Grid Electric Power Research Institute) Nanjing 211106China NARI Technology Co.Ltd. Nanjing 211106China State Key Laboratory of Smart Grid Protection and Control Nanjing 211106China
Tampering,forgery and theft of the measurement and control messages in a smart grid could cause one breakdown in the power ***,no security measures are employed for communications in intelligent *** services in an int... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Precision time protocol attack strategies and their resistance to existing security extensions
收藏 引用
Cybersecurity 2021年 第1期4卷 160-176页
作者: Waleed Alghamdi Michael Schukat School of Computer Science National University of Ireland Galway Ireland
The IEEE 1588 precision time protocol(PTP)is very important for many industrial sectors and applications that require time synchronization accuracy between computers down to microsecond and even nanosecond ***,PTP and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An improved multilevel fuzzy comprehensive evaluation algorithm for security performance
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2006年 第4期13卷 48-53页
作者: LI Ling-juan SHEN Ling-tong College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003. China
It is of great importance to take various factors into account when evaluating the network security performance. Multilevel fuzzy comprehensive evaluation is a relatively valid method. However, the traditional multile... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Survey on Quantum Information security
收藏 引用
China Communications 2019年 第10期16卷 1-36页
作者: Huanguo Zhang Zhaoxu Ji Houzhen Wang Wanqing Wu Key Laboratory of Aerospace Information security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China School of Cyber security and Computer Hebei UniversityBaoding 071002China
The security of classical cryptography based on computational complexity assumptions has been severely challenged with the rapid development of quantum computers and quantum algorithms. Quantum cryptography, which off... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Framework for Systematic Classification of Assets for security Testing
收藏 引用
Computers, Materials & Continua 2021年 第1期66卷 631-645页
作者: Sadeeq Jan Omer Bin Tauqeer Fazal Qudus Khan George Tsaramirsis Awais Ahmad Iftikhar Ahmad Imran Maqsood Niamat Ullah National Center for Cyber security Department of CS&ITUniversity of Engineering&TechnologyPeshawarPakistan Department of Information Technology FCITKing Abdulaziz UniversityJeddahSaudi Arabia Dipartimento di Informatica(DI) UniversitàDegli Studi di Milano StataleVia Celoria 18MilanoItaly Department of Computer Science&IT University of Engineering&TechnologyPeshawarPakistan Department of Software Engineering University of Engineering&TechnologyMardanPakistan University of Buner BunerPakistan
Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,*** this increased use,the security of such systems ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Smart Contract:security and Privacy
收藏 引用
Computer Systems Science & Engineering 2021年 第7期38卷 93-101页
作者: Leena S.Alotaibi Sultan S.Alshamrani Department of Information Technology College of Computer and Information TechnologyTaif UniversityP.O.Box 11099TaifSaudi Arabia
Smart contracts are simply self-activated contracts between two *** idea behind their implementation relies on the concept of blockchain,wherein the details and execution of the contract are turned into code and distr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Human Aspects of Smart Technologies'security:The Role of Human Failure
收藏 引用
Journal of Electronic Science and Technology 2016年 第4期14卷 311-318页
作者: Mohammad Aldabbas Bemd Teufel International Institute of Management in Technology University of FribourgFribourg 1700Switzerland
security of smart technologies like smart grids and crowd energy systems cannot rely only on technical solutions, humans play a significant role in failure, security culture, information security, cyber security, trus... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Research on applying physical chaos generator to spacecraft information security
收藏 引用
Science China(Technological Sciences) 2009年 第5期52卷 1463-1470页
作者: ZHAO HePing State Key Laboratory of Information security,Graduate University of Chinese Academy of Sciences,Beijing 100049,China China Academy of Space Technology,Beijing 100094,China State Key Laboratory of Information security Graduate University of Chinese Academy of Sciences Beijing China China Academy of Space Technology Beijing China
The effectiveness of a short-length message extension method based on physical chaos generator was analyzed and the entropy of the extended message was calculated in this *** analysis demon-strated that with the menti... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
HASN:A Hierarchical Attack Surface Network for System security Analysis
收藏 引用
China Communications 2019年 第5期16卷 137-157页
作者: Kangyu Huang Lin Yang Renfang Fu Shengli Zhou Zheng Hong College of Command and Control Engineering Army Engineering UniversityNanjing 210007China China Electronic Equipment & System Engineering Corporation Beijing 100141China State Grid Jiangsu Electric Power Company Research Institute Nanjing 210019China Information Department of Zhejiang Police College Hangzhou 310053China
Attack surfaces, as one of the security models, can help people to analyse the security of systems in cyberspace, such as risk assessment by utilizing various security metrics or providing a cost-effective network har... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论