咨询与建议

限定检索结果

文献类型

  • 183 篇 期刊文献
  • 12 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 196 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 120 篇 工学
    • 63 篇 计算机科学与技术...
    • 27 篇 网络空间安全
    • 24 篇 电气工程
    • 23 篇 信息与通信工程
    • 21 篇 材料科学与工程(可...
    • 15 篇 电子科学与技术(可...
    • 14 篇 力学(可授工学、理...
    • 12 篇 机械工程
    • 8 篇 控制科学与工程
    • 8 篇 环境科学与工程(可...
    • 7 篇 航空宇航科学与技...
    • 6 篇 动力工程及工程热...
    • 6 篇 软件工程
    • 4 篇 仪器科学与技术
    • 3 篇 冶金工程
    • 2 篇 化学工程与技术
  • 55 篇 医学
    • 51 篇 临床医学
  • 40 篇 理学
    • 19 篇 数学
    • 10 篇 物理学
    • 7 篇 天文学
    • 6 篇 化学
    • 3 篇 生物学
    • 2 篇 系统科学
    • 2 篇 生态学
  • 7 篇 法学
    • 5 篇 社会学
    • 1 篇 法学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 农学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 196 篇 attack
  • 30 篇 of
  • 30 篇 security
  • 17 篇 network
  • 15 篇 detection
  • 13 篇 angle
  • 12 篇 system
  • 10 篇 sulfate
  • 10 篇 service
  • 10 篇 model
  • 9 篇 denial
  • 8 篇 key
  • 8 篇 data
  • 8 篇 injection
  • 7 篇 sensor
  • 7 篇 control
  • 7 篇 power
  • 7 篇 vulnerability
  • 7 篇 and
  • 6 篇 false

机构

  • 4 篇 school of civil ...
  • 3 篇 department of co...
  • 2 篇 liu-hui center o...
  • 2 篇 department of ch...
  • 2 篇 department of me...
  • 2 篇 institute of mac...
  • 2 篇 1st division 3rd...
  • 2 篇 departmant of in...
  • 2 篇 synergetic innov...
  • 2 篇 department of el...
  • 2 篇 college of aeros...
  • 1 篇 department of ae...
  • 1 篇 electrical engin...
  • 1 篇 shanghai institu...
  • 1 篇 department of in...
  • 1 篇 a estructural un...
  • 1 篇 universidade pau...
  • 1 篇 school of softwa...
  • 1 篇 department of ma...
  • 1 篇 poland

作者

  • 7 篇 sanjeev kumar
  • 4 篇 邓德华
  • 2 篇 刘杰
  • 2 篇 arman sargolzaei
  • 2 篇 2 liu-hui center...
  • 2 篇 鲍皖苏
  • 2 篇 su caihong1 & zh...
  • 2 篇 suhwan kim
  • 2 篇 hossein jadidole...
  • 2 篇 yong wang
  • 2 篇 raja sekhar redd...
  • 2 篇 alexey brykov
  • 2 篇 vahid tabataba v...
  • 2 篇 tae ho cho
  • 2 篇 yongjin kwon
  • 2 篇 maxim mokeev
  • 2 篇 arif sari
  • 2 篇 saman sargolzaei
  • 2 篇 chris p. tsokos
  • 2 篇 haiming li

语言

  • 168 篇 英文
  • 28 篇 中文
检索条件"主题词=attack"
196 条 记 录,以下是1-10 订阅
排序:
EsECC_SDN:attack Detection and Classification Model for MANET
收藏 引用
Computers, Materials & Continua 2023年 第3期74卷 6665-6688页
作者: Veera Ankalu Vuyyuru Youseef Alotaibi Neenavath Veeraiah Saleh Alghamdi Korimilli Sirisha Department of Computer Science and Engineering Koneru Lakshmaiah Education FoundationVaddeswaram522502A.PIndia Department of Computer Science College of Computers and Information SystemsUmm Al-Qura UniversityMakkah21955Saudi Arabia Department of Electronics and Communications DVR&DHS MIC Engineering CollegeKanchikacharla521180A.PIndia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Electronics and Communications BVC Institute of Technology&ScienceAmalapuram533221A.PIndia
Mobile Ad Hoc Networks(MANET)is the framework for social networking with a realistic framework.In theMANETenvironment,based on the query,information is transmitted between the sender and receiver.In the MANET network,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Experimental investigation of influence of strake wings on self-induced roll motion at high angles of attack
收藏 引用
Chinese Journal of Aeronautics 2016年 第6期29卷 1591-1601页
作者: Geng Xi Shi Zhiwei Cheng Keming College of Aerospace Engineering Nanjing University of Aeronautics and Astronautics
The modern high performance air vehicles are required to have extreme maneuverability,which includes the ability of controlled maneuvers at high angle of attack. However, the nonlinear and unsteady aerodynamic phenome... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A New Distinguishing attack on Grain-V1 with 111 Initialization Rounds
收藏 引用
Journal of Systems Science & Complexity 2019年 第3期32卷 970-984页
作者: MA Zhen TIAN Tian QI Wenfeng National Digital Switching System Engineering & Technological Research Center
The Grain-v1 stream cipher has been selected in the eSTREAM hardware finalists. In this paper, the authors derive a new distinguishing attack on Grain-v1 with 111 initialization rounds in a single-key setting. To achi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Infrared radiation characteristics of a hypersonic vehicle under time-varying angles of attack
收藏 引用
Chinese Journal of Aeronautics 2019年 第4期32卷 861-874页
作者: Qinglin NIU Zhichao YUAN Biao CHEN Shikui DONG School of Energy Science and Engineering Harbin Institute of Technology Key Laboratory of Aerospace Thermophysics of Ministry of Industry and Information Technology Harbin Institute of Technology Key Laboratory of Chemical Laser Dalian Institute of Chemical Physics Chinese Academy of Sciences
Hypersonic vehicles emit strong infrared(IR) radiation signatures that can be treated as a detecting source for object identification and routine diagnosis. This paper is aimed at examining the intrinsic radiation cha... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Preventing Recommendation attack in Trust-Based Recommender Systems
收藏 引用
Journal of Computer Science & Technology 2011年 第5期26卷 823-828页
作者: 张富国 School of Information and Technology Jiangxi University of Finance and Economics Institute of Information Resource Management Jiangxi University of Finance and Economics Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics
Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation attack.Prior work has shown incorporating trust mechanism into traditional col... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Optimal Hybrid Learning Approach for attack Detection in Linear Networked Control Systems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2019年 第6期6卷 1404-1416页
作者: Haifeng Niu Avimanyu Sahoo Chandreyee Bhowmick S·Jagannathan Seattle WA 98103 USA School of Electrical and Computer Engineering Oklahoma State UniversityStill WaterOK 74078 USA Department of Electrical and Computer Engineering Missouri University of Science and TechnologyRollaMO 65409 USA
A novel learning-based attack detection and estimation scheme is proposed for linear networked control systems(NCS),wherein the attacks on the communication network in the feedback loop are expected to increase networ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Dishonest Behaviors in Online Rating Systems:Cyber Competition,attack Models,and attack Generator
收藏 引用
Journal of Computer Science & Technology 2009年 第5期24卷 855-867页
作者: 杨亚飞 冯沁原 孙琰 代亚非 Department of Electrical and Computer Engineering University of Rhode IslandKingstonRI 02881 U.S.A. CNDS Lab Peking University
Recently, online rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important but challenging problem. Many unfair rating detection approaches have been develo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Wall shear stress can improve prediction accuracy for transient ischemic attack
收藏 引用
World Journal of Clinical Cases 2019年 第18期7卷 2722-2733页
作者: Qiu-Yun Liu Qi Duan Xiao-Hong Fu Mei Jiang Hong-Wei Xia Yong-Lin Wan Department of Ultrasound Naval Military Medical University Affiliated Gongli HospitalShanghai 200000China Department of Ultrasound Shanghai Hemujia HospitalShanghai 200000China Department of Neurology Naval Military Medical University Affiliated Gongli HospitalShanghai 200000China
BACKGROUND Early prediction of transient ischemic attack (TIA) has important clinical value. To date, systematic studies on clinical, biochemical, and imaging indicators related to carotid atherosclerosis have been ca... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
HB-2 high-velocity correlation model at high angles of attack in supersonic wind tunnel tests
收藏 引用
Chinese Journal of Aeronautics 2019年 第7期32卷 1565-1576页
作者: Djordje VUKOVI? Dijana DAMLJANOVI? Department of Experimental Aerodynamics Military Technical InstituteVojnotehnicki Institut
Responding to a need for experimental data on a standard wind tunnel model at high angles of attack in the supersonic speed range, and in the absence of suitable reference data, a series of tests of two HB-2 standard ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Deducing cascading failures caused by cyberattacks based on attack gains and cost principle in cyber-physical power systems
收藏 引用
Journal of Modern Power Systems and Clean Energy 2019年 第6期7卷 1450-1460页
作者: Yufei WANG Yanli LIU Jun’e LI Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China Global Energy Interconnection Research Institute Co.Ltd Beijing 102209China Key Laboratory of Smart Grid of Ministry of Education Tianjin UniversityTianjin 300072China
To warn the cascading failures caused by cyberattacks(CFCAs)in real time and reduce their damage on cyber-physical power systems(CPPSs),a novel early warning method based on attack gains and cost principle(AGCP)is pro... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论