咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 5 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 2 篇 网络空间安全
    • 1 篇 信息与通信工程
    • 1 篇 测绘科学与技术
  • 1 篇 理学
    • 1 篇 地球物理学

主题

  • 1 篇 honeypot
  • 1 篇 device
  • 1 篇 quality of servi...
  • 1 篇 scheme,applicati...
  • 1 篇 energy consumpti...
  • 1 篇 to
  • 1 篇 delay constraint...
  • 1 篇 identification
  • 1 篇 restrictive
  • 1 篇 deep belief netw...
  • 1 篇 electronic
  • 1 篇 q-learning
  • 1 篇 distributed recu...
  • 1 篇 security assessm...
  • 1 篇 signature
  • 1 篇 ics
  • 1 篇 e-cash
  • 1 篇 routing
  • 1 篇 formal analysis
  • 1 篇 electronic payme...

机构

  • 2 篇 dept. of electro...
  • 2 篇 national informa...
  • 1 篇 school of inform...
  • 1 篇 general office c...
  • 1 篇 guangzhou inform...
  • 1 篇 jiangsu province...
  • 1 篇 kennesaw state u...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 china informatio...
  • 1 篇 information clas...
  • 1 篇 state key labora...
  • 1 篇 china national i...
  • 1 篇 school of electr...
  • 1 篇 jinan university...
  • 1 篇 beijing key labo...
  • 1 篇 cyberspace insti...
  • 1 篇 chongqing indust...
  • 1 篇 school of electr...

作者

  • 3 篇 wu shizhong
  • 2 篇 yang zongkai
  • 2 篇 谭运猛
  • 1 篇 shan chun
  • 1 篇 陈晓桦
  • 1 篇 yunzhewang
  • 1 篇 you lu
  • 1 篇 tan yunmeng
  • 1 篇 hu changzhen
  • 1 篇 li zhitang
  • 1 篇 linqian cui
  • 1 篇 lanhui liu
  • 1 篇 quanlong guan
  • 1 篇 罗铮
  • 1 篇 xiaojun pan
  • 1 篇 zhang yu
  • 1 篇 yu xiao
  • 1 篇 yanbin sun
  • 1 篇 张保稳
  • 1 篇 mohan li

语言

  • 7 篇 英文
检索条件"机构=China National Information Security Testing Evaluation & Certification Center"
7 条 记 录,以下是1-10 订阅
排序:
Ontology-Based Model of Network and Computer Attacks for security Assessment
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2013年 第5期18卷 554-562页
作者: 高建波 张保稳 陈晓桦 罗铮 School of information security Engineering Shanghai Jiaotong University General Office China Information Security Certification Center information Classified security Protection evaluation center Third Institute of Ministry of Public Security of China
With increased cyber attacks over years,information system security assessment becomes more and more *** paper provides an ontology-based attack model,and then utilizes it to assess the information system security fro... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Efficient Restrictive Blind Signature Scheme with Applications to Electronic Cash
收藏 引用
High Technology Letters 2002年 第4期8卷 60-63页
作者: 谭运猛 Yang Zongkai Wu Shizhong Dept. of Electronics & information Eng. Huazhong University of Science and Technology Wuhan 430074 P.R.China national information security testing evaluation & certification center Beijing 100091 P.R.China
In this paper, a new restrictive blind signature scheme is proposed. Compared with Brands restrictive blind signature scheme, our scheme is even more restrictive and efficient. And our scheme is proved secure, too. ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Heuristic Algorithm on QoS Routing
收藏 引用
High Technology Letters 2002年 第3期8卷 52-56页
作者: 谭运猛 Yang Zongkai Wu Shizhong Dept. of Electronics & information Eng. Huazhong University of Science and Technology Wuhan 430074 P.R.China national information security testing evaluation & certification center Beijing 100091 P.R.China
This paper focuses on solving the delay constrained least cost routing problem, and propose a simple, distributed heuristic solution, called distributed recursive delay constrained least cost (DR DCLC) unicast routing... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Identifying Honeypots from ICS Devices Using Lightweight Fuzzy testing
收藏 引用
Computers, Materials & Continua 2020年 第11期65卷 1723-1737页
作者: Yanbin Sun Xiaojun Pan Chao Xu Penggang Sun Quanlong Guan Mohan Li Men Han Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China Guangzhou information Technology security evaluation center Guangzhou510006China Jinan University Guangzhou510006China Kennesaw State University 1100 South Marietta Pkwy MariettaGeorgia30060USA
The security issues of industrial control systems(ICSs)have become increasingly *** an important part of ICS security,honeypots and anti-honeypots have become the focus of offensive and defensive ***,research on ICS h... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Software Defect Prediction via Deep Belief Network
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 925-932页
作者: WEI Hua SHAN Chun HU Changzhen ZHANG Yu YU Xiao School of Computer Science and Technology Beijing Institute of Technology china information Technology security evaluation center Beijing Key Laboratory of Software security Engineering Technology Beijing Institute of Technology School of Electrical and information Engineering and Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and Architecture State Key Laboratory in china for Geomechanics and Deep Underground Engineering (Beijing) China University of Mining and Technology School of Computer Science and Technology Shandong University of Technology
Defect distribution prediction is a meaningful topic because software defects are the fundamental cause of many attacks and data loss. Building accurate prediction models can help developers find bugs and prioritize t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An Efficient Fair Electronic Cash System
收藏 引用
High Technology Letters 2003年 第3期9卷 1-5页
作者: 郭涛 Li Zhitang Tan Yunmeng Wu Shizhong Department of Computer Science & Technology Huazhong University of Science and Technology Wuhan 430074 P.R.China Department of Communication Science & Technology Huazhong University of Science and TechnologyWuhan 430074 P.R.China china national information security testing evaluation & certification center Beijing 100091P.R.China
In this paper, an efficient fair e-cash system is presented. Based on the improved Brands’ e-cash scheme, it is expanded by adding two roles, government and judges. The user can keep unconditionally anonymous in norm... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Residential Energy Consumption Forecasting Based on Federated Reinforcement Learning with Data Privacy Protection
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第10期137卷 717-732页
作者: You Lu Linqian Cui YunzheWang Jiacheng Sun Lanhui Liu School of Electronic and information Engineering Suzhou University of Science and TechnologySuzhou215009China Jiangsu Province Key Laboratory of Intelligent Building Energy Efficiency Suzhou University of Science and TechnologySuzhou215009China Chongqing Industrial Big Data Innovation center Co. Ltd.Chongqing400707China
Most studies have conducted experiments on predicting energy consumption by integrating data formodel ***, the process of centralizing data can cause problems of data ***,many laws and regulationson data security and ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论