咨询与建议

限定检索结果

文献类型

  • 10 篇 期刊文献

馆藏范围

  • 10 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 5 篇 计算机科学与技术...
    • 5 篇 网络空间安全
    • 2 篇 电气工程
    • 1 篇 土木工程
    • 1 篇 船舶与海洋工程
  • 1 篇 理学
    • 1 篇 数学

主题

  • 10 篇 security assessm...
  • 1 篇 grid online anal...
  • 1 篇 security control...
  • 1 篇 spatial demand e...
  • 1 篇 fuzzy-anp.topsis
  • 1 篇 ahp-topsis
  • 1 篇 power flow redis...
  • 1 篇 incomplete inter...
  • 1 篇 coupled power-tr...
  • 1 篇 multi-attribute ...
  • 1 篇 abnormal behavio...
  • 1 篇 hesitant fuzzy s...
  • 1 篇 formal analysis
  • 1 篇 network traffic
  • 1 篇 dominance- based...
  • 1 篇 multi-attribute ...
  • 1 篇 integrity of the...
  • 1 篇 performance impr...
  • 1 篇 security metrics
  • 1 篇 virtual machine ...

机构

  • 2 篇 department of in...
  • 1 篇 state key labora...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 institute of com...
  • 1 篇 school of electr...
  • 1 篇 key laboratory o...
  • 1 篇 school of comput...
  • 1 篇 riphah institute...
  • 1 篇 school of inform...
  • 1 篇 department of el...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 general office c...
  • 1 篇 china electric p...
  • 1 篇 school of mechat...
  • 1 篇 collegeofcivilen...
  • 1 篇 school of electr...
  • 1 篇 department of in...

作者

  • 2 篇 rajeev kumar
  • 2 篇 赵亮
  • 2 篇 raees ahmad khan
  • 1 篇 tianyu yang
  • 1 篇 yu xia
  • 1 篇 陈晓桦
  • 1 篇 hongbin sun
  • 1 篇 yangrong chen
  • 1 篇 june li
  • 1 篇 yujie sheng
  • 1 篇 mohammad ubaidul...
  • 1 篇 ruiwen zhang
  • 1 篇 muhammad rafiq m...
  • 1 篇 jialan
  • 1 篇 xue
  • 1 篇 zhi
  • 1 篇 xue zhi
  • 1 篇 lingling li
  • 1 篇 xiaoyu li
  • 1 篇 xiaoxin zhou

语言

  • 10 篇 英文
检索条件"主题词=security assessment"
10 条 记 录,以下是1-10 订阅
排序:
Ontology-Based Model of Network and Computer Attacks for security assessment
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2013年 第5期18卷 554-562页
作者: 高建波 张保稳 陈晓桦 罗铮 School of Information security Engineering Shanghai Jiaotong University General Office China Information Security Certification Center Information Classified security Protection Evaluation Center Third Institute of Ministry of Public Security of China
With increased cyber attacks over years,information system security assessment becomes more and more *** paper provides an ontology-based attack model,and then utilizes it to assess the information system security fro... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Hybrid Computational Modeling for Web Application security assessment
收藏 引用
Computers, Materials & Continua 2022年 第1期70卷 469-489页
作者: Adil Hussain Seh Jehad F.Al-Amri Ahmad F.Subahi Md Tarique Jamal Ansari Rajeev Kumar Mohammad Ubaidullah Bokhari Raees Ahmad Khan Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow226025Uttar PradeshIndia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Science University College of Al JamoumUmm Al Qura UniversityMakkah21421Saudi Arabia Department of Computer Applications Shri Ramswaroop Memorial UniversityBarabanki225003Uttar PradeshIndia Department of Computer Science Aligarh Muslim UniversityAligarh202002Uttar PradeshIndia
Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current *** has led to digital revolution,and in this context,the hardwired technologies in the softwar... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Synthetic security assessment based on variable consistency dominance-based rough set approach
收藏 引用
High Technology Letters 2010年 第4期16卷 413-421页
作者: 赵亮 Xue Zhi Department of Electronic Engineering Shanghai Jiao Tong University Shanghai 200240 P.R. China
security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain univers... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Synthetic security assessment for incomplete interval-valued information system
收藏 引用
High Technology Letters 2012年 第2期18卷 160-166页
作者: 赵亮 Xue Zhi School of Electronic and Electric Engineering Shanghai Jiaotong University.Shanghai 200240China
In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group dec... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Crucial problems on security assessment of a building site adjacent to an excavated high slope
收藏 引用
Journal of Chongqing University 2002年 第2期1卷 38-41页
作者: 文海家 ZHANG Jialan CollegeofCivilEngineering ChongqingUniversityChongqing400045P.R.China
The subject of this work is the assessment on the stability of an excavated high slope in order to insure the security of the building site adjacent to the slope, which is frequently encountered in town construction i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Quantitative security Metric Model for security Controls:Secure Virtual Machine Migration Protocol as Target of assessment
收藏 引用
China Communications 2018年 第8期15卷 126-140页
作者: Tayyaba Zeb Muhammad Yousaf Humaira Afzal Muhammad Rafiq Mufti School of Electrical Engineering and Computer Science(SEECS) National University of Sciences and TechnologylslamabadPakistan Riphah Institute of Systems Engineering(RISE) Riphah International UniversityIslamabadPakistan Institute of Computing Department of Computer ScienceBahauddin Zakariya UniversityMultanPakistan Department of Computer Sciences COMSATS Institute of Information TechnologyVehariPakistan
Quantitative security metrics are desirable for measuring the performance of information security controls. security metrics help to make functional and business decisions for improving the performance and cost of the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Potential security Threat and Its Solution in Coupled Urban Power-traffic Networks with High Penetration of Electric Vehicles
收藏 引用
CSEE Journal of Power and Energy Systems 2022年 第4期8卷 1097-1109页
作者: Yujie Sheng Qinglai Guo Tianyu Yang Zhe Zhou Hongbin Sun State Key Laboratory of Power Systems Department of Electrical EngineeringTsinghua UniversityBeijing 100084China School of Mechatronic Engineering and Automation Shanghai UniversityShanghai 200444China
The growing penetration of electric vehicles(EVs)and the popularity of fast charging stations(FCSs)have greatly strengthened the coupling of the urban power network(PN)and traffic network(TN).In this paper,a potential... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Integrity assessment of Medical Devices for Improving Hospital Services
收藏 引用
Computers, Materials & Continua 2021年 第6期67卷 3619-3633页
作者: Fahad A.Alzahrani Masood Ahmad Mohd Nadeem Rajeev Kumar Raees Ahmad Khan Department of Computer Engineering Umm Al-Qura UniversityMecca24381Saudi Arabia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow226025Uttar PradeshIndia Department of Computer Application Shri Ramswaroop Memorial UniversityBarabanki225003Uttar PradeshIndia
The present study examines the various techniques being used to maintain the integrity of the medical devices,and develops a quantitative framework to list these in the sequence of *** achieve the intended objective,t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fortifying Smart Grids: A Holistic assessment Strategy against Cyber Attacks and Physical Threats for Intelligent Electronic Devices
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 2579-2609页
作者: Yangrong Chen June Li Yu Xia Ruiwen Zhang Lingling Li Xiaoyu Li Lin Ge School of Computer Science Zhengzhou University of AeronauticsZhengzhou450046China Henan Xin’an Century Technology Co. Ltd.Henan Data Security Engineering Technology Research CenterZhengzhou450046China Key Laboratory of Aerospace Information security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan430072China
Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control *** the context of the heightened security c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Real-time Online Analysis of Power Grid
收藏 引用
CSEE Journal of Power and Energy Systems 2020年 第1期6卷 236-238页
作者: Mike Zhou Jianfeng Yan Xiaoxin Zhou China Electric Power Research Institute Beijing 100192China
The unprecedented operational complexity and se-curity risks in operating the Chinese UHV AC/DC power grid calls for a new generation of real-time(sec-order)online analysis systems to provide decision *** recent Digit... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论