咨询与建议

限定检索结果

文献类型

  • 16 篇 期刊文献

馆藏范围

  • 16 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 5 篇 控制科学与工程
    • 5 篇 计算机科学与技术...
    • 5 篇 软件工程
    • 4 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 城乡规划学
    • 1 篇 风景园林学(可授工...
    • 1 篇 公安技术
  • 6 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 3 篇 农学
    • 2 篇 农业资源与环境
    • 1 篇 作物学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 文学
    • 1 篇 外国语言文学
  • 1 篇 理学
    • 1 篇 系统科学

主题

  • 4 篇 climate change
  • 2 篇 resilience
  • 2 篇 drought
  • 1 篇 cyber security
  • 1 篇 data imbalance
  • 1 篇 adaptation
  • 1 篇 80 and over
  • 1 篇 protected areas
  • 1 篇 critical infrast...
  • 1 篇 submarine
  • 1 篇 access control
  • 1 篇 trust value
  • 1 篇 survival
  • 1 篇 sites
  • 1 篇 artificial gener...
  • 1 篇 industry 4.0
  • 1 篇 botnet
  • 1 篇 deep learning
  • 1 篇 elliptic curve c...
  • 1 篇 land-based

机构

  • 2 篇 centre for cyber...
  • 1 篇 biological and e...
  • 1 篇 centre of infect...
  • 1 篇 community health...
  • 1 篇 austrian institu...
  • 1 篇 centre for secur...
  • 1 篇 department of ge...
  • 1 篇 school of inform...
  • 1 篇 department of ge...
  • 1 篇 departamento de ...
  • 1 篇 wageningen unive...
  • 1 篇 barcelona superc...
  • 1 篇 department of bi...
  • 1 篇 operation wallac...
  • 1 篇 nuffield departm...
  • 1 篇 department of gl...
  • 1 篇 inlecom commerci...
  • 1 篇 umred health tra...
  • 1 篇 the mitre corpor...
  • 1 篇 the interdiscipl...

作者

  • 2 篇 ye zhu
  • 2 篇 gang li
  • 2 篇 yang cao
  • 1 篇 aswani kumar che...
  • 1 篇 manuel j.macía
  • 1 篇 aida cuni-sanche...
  • 1 篇 hamidu seki
  • 1 篇 chengyuan li
  • 1 篇 salahuddin ahmed
  • 1 篇 keith f. joiner
  • 1 篇 andrew r.marshal...
  • 1 篇 william woodgate
  • 1 篇 djibrilla amadou...
  • 1 篇 mohamed darouach
  • 1 篇 ?rjan bodin
  • 1 篇 martine exterman...
  • 1 篇 yash shekhawat
  • 1 篇 ayyanagouda pati...
  • 1 篇 burton singer
  • 1 篇 meisam gordan

语言

  • 15 篇 英文
  • 1 篇 中文
检索条件"机构=Centre for Cyber Resilience and Trust"
16 条 记 录,以下是1-10 订阅
排序:
Embrace open-environment machine learning for robust AI
收藏 引用
National Science Review 2024年 第8期11卷 10-11页
作者: Gang Li Aswani Kumar Cherukuri The centre for cyber resilience and trust Deakin University The Vellore Institute of Technology
Humans possess an extraordinary ability to continuously learn and apply knowledge across different environments and tasks, and this ability to understand and acquire diverse intellectual capabilities is referred to as... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Automation and Orchestration of Zero trust Architecture:Potential Solutions and Challenges
收藏 引用
Machine Intelligence Research 2024年 第2期21卷 294-317页
作者: Yang Cao Shiva Raj Pokhrel Ye Zhu Robin Doss Gang Li centre for cyber resilience and trust Deakin UniversityBurwood 3125Australia School of Information Technology Deakin UniversityGeelong 3216Australia
Zero trust architecture(ZTA)is a paradigm shift in how we protect data,stay connected and access *** is non-perimeter-based defence,which has been emerging as a promising revolution in the cyber security *** can be us... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Application
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 4197-4218页
作者: Ibraheem Al-Hejri Farag Azzedin Sultan Almuhammadi Naeem Firdous Syed Information and Computer Science Department King Fahd University of Petroleum andMineralsDhahran31261Saudi Arabia Center for cyber resilience and trust(CREST) Deakin UniversityGeelong3220Australia
The use of the Internet of Things(IoT)is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of *** critical infrastructure domains... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Ripple Knowledge Graph Convolutional Networks for Recommendation Systems
收藏 引用
Machine Intelligence Research 2024年 第3期21卷 481-494页
作者: Chen Li Yang Cao Ye Zhu Debo Cheng Chengyuan Li Yasuhiko Morimoto Graduate School of Informatics Nagoya UniversityChikusaNagoya 464-8602Japan centre for cyber resilience and trust Deakin UniversityBurwood 3125Australia Science TechnologyEngineering and Mathematics(STEM)University of South AustraliaAdelaide 5000Australia Graduate School of Engineering Hiroshima UniversityHigashi-hiroshima 10587Japan
Using knowledge graphs to assist deep learning models in making recommendation decisions has recently been proven to effectively improve the model′s interpretability and *** paper introduces an end-to-end deep learni... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A network perspective of human±nature interactions in dynamic and fast-changing landscapes
收藏 引用
National Science Review 2023年 第7期 19-35页
作者: ?rjan Bodin Haibin Chen Stockholm resilience centre Stockholm University College of Economics and Management Northwest Agriculture and Forestry University
Increasing and intensifying the use of land represents a prominent sustainability challenge of particular importance in regions undergoing rapid change while at the same time exhibiting large natural and anthropocentr...
来源: 同方期刊数据库 同方期刊数据库 评论
DERNNet:Dual Encoding Recurrent Neural Network Based Secure Optimal Routing in WSN
收藏 引用
Computer Systems Science & Engineering 2023年 第5期45卷 1375-1392页
作者: A.Venkatesh S.Asha School of Computer Science and Engineering Vellore Institute of TechnologyChennaiIndia centre for cyber Physical Systems&School of Computer Science and Engineering Vellore Institute of TechnologyChennaiIndia
A Wireless Sensor Network(WSN)is constructed with numerous sensors over geographical *** basic challenge experienced while designing WSN is in increasing the network lifetime and use of low *** sensor nodes are resour... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Algebraic Detection Approach for Control Systems under Multiple Stochastic cyber-attacks
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2015年 第3期2卷 258-266页
作者: Yumei Li Holger Voos Mohamed Darouach Changchun Hua the Interdisciplinary centre for Security Reliability and trust(SnT) University of Luxembourg the centre de la Recherche en Automatique de Nancy(CRAN) Universite de Lorraine the Institute of Electrical Engineering Yanshan University
In order to compromise a target control system successfully, hackers possibly attempt to launch multiple cyberattacks aiming at multiple communication channels of the control system. However, the problem of detecting ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Detecting anomalies in blockchain transactions using machine learning classifiers and explainability analysis
收藏 引用
Blockchain(Research and Applications) 2024年 第3期5卷 106-122页
作者: Mohammad Hasan Mohammad Shahriar Rahman Helge Janicke Iqbal H.Sarker Department of Computer Science and Engineering Premier University4000 ChitagongBangladesh Department of Computer Science and Engineering United International University1212 DhakaBangladesh cyber Security Cooperative Research centre 6027 PerthAustralia centre for Securing Digital Futures Edith Cowan University6027 PerthAustralia
As the use of blockchain for digital payments continues to rise,it becomes susceptible to various malicious *** detecting anomalies within blockchain transactions is essential for bolstering trust in digital ***,the t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
cybersecurity for Allied Future Submarines
收藏 引用
World Journal of Engineering and Technology 2018年 第4期6卷 696-712页
作者: Keith F. Joiner Simon Reay Atkinson Pete Christensen Elena Sitnikova Systems Capability centre University of New South Wales Canberra at Australian Defence Force Academy Canberra Australia centre for International Security Studies and Sydney cyber Security Network University of Sydney Sydney Australia The MITRE Corporation McLean VA US Australian centre for cyber Security Canberra University of New South Wales Canberra at Australian Defence Force Academy Canberra Australia
cyber has become a supposedly cheap first-strike weapon of political choice by potential adversaries in a milieu placing insurgency, terrorism, international crime and state-based influences in close un-regulated prox... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Monitoring Peer-to-Peer Botnets:Requirements,Challenges,and Future Works
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 3375-3398页
作者: Arkan Hammoodi Hasan Kabla Mohammed Anbar Selvakumar Manickam Alwan Ahmed Abdulrahman Alwan Shankar Karuppayah National Advanced IPv6 centre(NAv6) Universiti Sains MalaysiaPulau Pinang11800Malaysia
The cyber-criminal compromises end-hosts(bots)to configure a network of bots(botnet).The cyber-criminals are also looking for an evolved architecture that makes their techniques more resilient and stealthier such as P... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论