咨询与建议

限定检索结果

文献类型

  • 21 篇 期刊文献
  • 7 篇 会议

馆藏范围

  • 28 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25 篇 工学
    • 14 篇 计算机科学与技术...
    • 11 篇 网络空间安全
    • 6 篇 电气工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 控制科学与工程
    • 4 篇 信息与通信工程
    • 2 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 生物医学工程(可授...
    • 1 篇 软件工程
  • 11 篇 理学
    • 9 篇 数学
    • 4 篇 物理学
    • 1 篇 系统科学
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 28 篇 security analysi...
  • 3 篇 internet of thin...
  • 2 篇 public-key crypt...
  • 2 篇 polynomial trans...
  • 2 篇 oracle
  • 2 篇 diffie-hellman
  • 1 篇 set-inclusion
  • 1 篇 bell entangled s...
  • 1 篇 hiding capacity
  • 1 篇 quantum secret s...
  • 1 篇 sg
  • 1 篇 mobile-commerce ...
  • 1 篇 measurement basi...
  • 1 篇 lblock algorithm
  • 1 篇 energy network
  • 1 篇 semi-quantum pri...
  • 1 篇 constraint optim...
  • 1 篇 s-box
  • 1 篇 reducing trust
  • 1 篇 forgery attack

机构

  • 1 篇 escuela superior...
  • 1 篇 college of infor...
  • 1 篇 the department o...
  • 1 篇 department of ma...
  • 1 篇 software design ...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 school of cybers...
  • 1 篇 nationalkeylabor...
  • 1 篇 department of co...
  • 1 篇 school of inform...
  • 1 篇 higher colleges ...
  • 1 篇 delhi technologi...
  • 1 篇 装甲兵工程学院
  • 1 篇 school of comput...
  • 1 篇 center for cyber...
  • 1 篇 department of el...
  • 1 篇 division of comp...
  • 1 篇 department of in...
  • 1 篇 seventh research...

作者

  • 1 篇 yuhua sun
  • 1 篇 guo xiaojing
  • 1 篇 manuel sanchez r...
  • 1 篇 hongbin sun
  • 1 篇 mohsen ali alawa...
  • 1 篇 abdullah khalil
  • 1 篇 xueqian fu
  • 1 篇 jiazhong lu
  • 1 篇 lili yan
  • 1 篇 qingfeng cheng
  • 1 篇 邵立嵩
  • 1 篇 jining zhao
  • 1 篇 chunxiang xu
  • 1 篇 jingting xue
  • 1 篇 jianfeng ma
  • 1 篇 胡文文
  • 1 篇 何广强
  • 1 篇 liheng hu
  • 1 篇 ting chen
  • 1 篇 chen cai-sen

语言

  • 27 篇 英文
  • 1 篇 中文
检索条件"主题词=security analysis"
28 条 记 录,以下是1-10 订阅
排序:
MV-Honeypot:security Threat analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 655-669页
作者: Arpita Dinesh Sarang Mohsen Ali Alawami Ki-Woong Park SysCore Lab.(Convergence Engineering for Intelligent Drone) Sejong UniversitySeoul05006Republic of Korea Division of Computer Engineering Hankuk University of Foreign StudiesYongin-si17035Republic of Korea Department of Information security Sejong UniversitySeoul05006Republic of Korea
Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various ***,the Avatar and Metaverse are being ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A car-following model based on the optimized velocity and its security analysis
收藏 引用
Transportation Safety and Environment 2023年 第4期5卷 127-134页
作者: Rong Fei Lu Yang Xinhong Hei Bo Hu Aimin Li School of Computer Science and Engineering Xi’an University of TechnologyNo.5 Jinhua South RoadXi’an 710048ShaanxiP.R.China Software Design Department Hangzhou Holly Sys Automation Co.Ltd.No.29Jinye 1st RoadXi’an 710065ShaanxiP.R.China
An enhanced optimal velocity model(EOVM)that considers driving safety is established to alleviate traffic congestion and ensure driving *** headway is introduced as a criterion for determining whether the car is *** t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Optimal Unification of Static and Dynamic Features for Smartphone security analysis
收藏 引用
Intelligent Automation & Soft Computing 2023年 第1期35卷 1035-1051页
作者: Sumit Kumar S.Indu Gurjit Singh Walia Scientific analysis Group DRDODelhi110054India Delhi Technological University Delhi110042India
Android Smartphones are proliferating extensively in the digital world due to their widespread applications in a myriad *** increased popularity of the android platform entices malware developers to design malicious a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
security analysis of a Park-level Agricultural Energy Network Considering Agrometeorology and Energy Meteorology
收藏 引用
CSEE Journal of Power and Energy Systems 2020年 第3期6卷 743-748页
作者: Xueqian Fu Dechang Yang Qinglai Guo Hongbin Sun College of Information and Electrical Engineering China Agricultural UniversityChina State Key Laboratory of Power Systems Department of Electrical EngineeringTsinghua UniversityChina
China’s industrial manufacturing industry is well developed,but its agriculture is *** only way to solve this problem is to improve through modern *** cross integration of new energy development and modern agricultur... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
security analysis of a Privacy-Preserving Identity-Based Encryption Architecture
收藏 引用
Journal of Information security 2022年 第4期13卷 323-336页
作者: Carlisle Adams School of Electrical Engineering and Computer Science University of Ottawa Ottawa Canada
Identity-Based Encryption (IBE) has seen limited adoption, largely due to the absolute trust that must be placed in the private key generator (PKG)—an authority that computes the private keys for all the users in the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
security analysis of Discrete Logarithm Based Cryptosystems
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1715-1717页
作者: WANG Yuzhu LIAO Xiaofeng School of Computer Chongqing University Chongqing 400030 China
Discrete logarithm based cryptosysterns have subtle problems that make the schemes vulnerable. This paper gives a comprehensive listing of security issues in the systems and analyzes three classes of attacks which are... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
security analysis of continuous-variable quantum key distribution scheme
收藏 引用
Chinese Physics B 2007年 第5期16卷 1364-1369页
作者: 朱俊 何广强 曾贵华 The State Key Laboratory on Fiber-Optic Local Area Networks and Advanced Optical Communication Systems Electronic Engineering Department Shanghai Jiaotong University Shanghai 200240 China
In this paper security of the quantum key distribution scheme using correlations of continuous variable Einstein- Podolsky-Rosen (EPR) pairs is investigated. A new approach for calculating the secret information ra... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
security analysis on S-Box of LBlock Algorithm Based on Trace-Driven Cache Timing Attack
Security Analysis on S-Box of LBlock Algorithm Based on Trac...
收藏 引用
第17届中国系统仿真技术及其应用学术年会(17th CCSSTAE 2016)
作者: Yu Xi Cai Hong-liu Chen Cai-sen Xiang Yang-xia Department of Information Engineering Academy of Armored Forces Engineering Ministry of Science Research Academy of Armored Forces Engineering
Based on the Cache timing attack for lightweight block cipher,this paper mainly analyzes the nonlinear structure characteristics of S-box in cryptographic ***,the algebraic properties of S-box are analyzed,the truth-t... 详细信息
来源: cnki会议 评论
security analysis of Key Generation Function with Binary Response Data for IoT Applications
Security Analysis of Key Generation Function with Binary Res...
收藏 引用
第十届海峡两岸统计与概率研讨会
作者: Yu-Jung Huang Department of Electronic Engineering I-Shou University
The term Internet of Things(Io T) refers to the networked interconnection of physical objects or "things" embedded with electronics, software, and sensors, which enables these objects to collect and exchange data. Fro... 详细信息
来源: cnki会议 评论
security analysis of Cyber-Physical System under False Data Injection Attacks
Security Analysis of Cyber-Physical System under False Data ...
收藏 引用
第40届中国控制会议
作者: Ruirui Liu Hao Yu Fei Hao Seventh Research Division School of Automation Science and Electrical EngineeringBeihang University The Department of Electrical and Computer Engineering University of Alberta
In this paper,the security analysis of the cyber-physical system which is modeled as linear dynamical system is *** attackers can maliciously inject some false data into measurement and actuation channels;and the fals... 详细信息
来源: cnki会议 评论