咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 4 篇 计算机科学与技术...
    • 1 篇 交通运输工程
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 生物学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 4 篇 malicious behavi...
  • 2 篇 blockchain
  • 1 篇 ethereum
  • 1 篇 channel network
  • 1 篇 node discovery p...
  • 1 篇 operating system...
  • 1 篇 peer-to-peer net...
  • 1 篇 application prog...
  • 1 篇 stability analys...
  • 1 篇 android malware ...
  • 1 篇 android (operati...
  • 1 篇 invasive softwar...
  • 1 篇 application prog...
  • 1 篇 evolutionary gam...
  • 1 篇 android maliciou...
  • 1 篇 android document
  • 1 篇 ubiquitous and p...
  • 1 篇 data security
  • 1 篇 feature selectio...
  • 1 篇 external file

机构

  • 1 篇 college of compu...
  • 1 篇 the school of co...
  • 1 篇 guangdong provin...
  • 1 篇 ieee
  • 1 篇 school of comput...
  • 1 篇 the helen and jo...
  • 1 篇 the school of co...
  • 1 篇 the department o...
  • 1 篇 college of intel...
  • 1 篇 research school ...
  • 1 篇 peng cheng labor...

作者

  • 1 篇 tang jiang
  • 1 篇 zhiyuan lin
  • 1 篇 mengchu zhou
  • 1 篇 yude bai
  • 1 篇 abdullah abusorr...
  • 1 篇 xiaohong li
  • 1 篇 yan ran
  • 1 篇 lin jiang
  • 1 篇 zhenchang xing
  • 1 篇 peiyun zhang
  • 1 篇 yang jiyun
  • 1 篇 xuan wang
  • 1 篇 yuxi zhang
  • 1 篇 sen chen
  • 1 篇 yang liu
  • 1 篇 xiang tao
  • 1 篇 chenxi li

语言

  • 4 篇 英文
检索条件"主题词=malicious behavior"
4 条 记 录,以下是1-10 订阅
排序:
Dynamic Evolutionary Game-based Modeling,Analysis and Performance Enhancement of Blockchain Channels
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第1期10卷 188-202页
作者: PeiYun Zhang MengChu Zhou ChenXi Li Abdullah Abusorrah IEEE the School of Computer Science Nanjing University of Information Science&TechnologyNanjing 210044China the Helen and John C.Hartmann Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102 USA the School of Computer and Information Anhui Normal UniversityWuhu 241003China the Department of Electrical and Computer Engineering Faculty of Engineeringand Center of Research Excellence in Renewable Energy and Power SystemsKing Abdulaziz UniversityJeddah 21481Saudi Arabia
The recent development of channel technology has promised to reduce the transaction verification time in blockchain operations.When transactions are transmitted through the channels created by nodes,the nodes need to ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Android Malware Detection Method Based on Permission Complement and API Calls
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 773-785页
作者: YANG Jiyun TANG Jiang YAN Ran XIANG Tao College of Computer Science Chongqing University
The dynamic code loading mechanism of the Android system allows an application to load executable files externally at runtime. This mechanism makes the development of applications more convenient, but it also brings s... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
ArgusDroid: detecting Android malware variants by mining permission-API knowledge graph
收藏 引用
Science China(Information Sciences) 2023年 第9期66卷 115-133页
作者: Yude BAI Sen CHEN Zhenchang XING Xiaohong LI College of Intelligence and Computing Tianjin University Research School of Computer Science Australian National University
Malware family variants make minor and relevant changes of behaviors based on the original malware. To analyze and detect family variants, security experts must not only understand malware behaviors but also further o... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
“Half of the Node Records Are Forged?”: The Problemof Node Records Forgery in Ethereum Network
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第2期138卷 1713-1729页
作者: Yang Liu Zhiyuan Lin Yuxi Zhang Lin Jiang Xuan Wang School of Computer Science and Technology Harbin Institute of Technology(Shenzhen)Shenzhen518055China Peng Cheng Laboratory Shenzhen518055China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Shenzhen518055China
Ethereum, currently the most widely utilized smart contracts platform, anchors the security of myriad smartcontracts upon its own robustness. Its foundational peer-to-peer network facilitates a dependable node connect... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论