咨询与建议

限定检索结果

文献类型

  • 73 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 78 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 61 篇 计算机科学与技术...
    • 44 篇 信息与通信工程
    • 39 篇 电气工程
    • 32 篇 电子科学与技术(可...
    • 32 篇 网络空间安全
    • 19 篇 软件工程
    • 16 篇 控制科学与工程
    • 15 篇 仪器科学与技术
    • 11 篇 机械工程
    • 8 篇 生物医学工程(可授...
    • 7 篇 材料科学与工程(可...
    • 4 篇 动力工程及工程热...
    • 4 篇 生物工程
    • 3 篇 力学(可授工学、理...
    • 2 篇 交通运输工程
  • 30 篇 理学
    • 23 篇 数学
    • 5 篇 生物学
    • 4 篇 物理学
    • 4 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
  • 16 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 法学
    • 2 篇 法学
    • 2 篇 社会学
  • 3 篇 教育学
    • 2 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 文学
    • 1 篇 外国语言文学
  • 1 篇 医学

主题

  • 3 篇 deep learning
  • 2 篇 clustering
  • 2 篇 dns
  • 2 篇 network
  • 2 篇 random oracle
  • 2 篇 morphing
  • 2 篇 malware
  • 2 篇 millimeter wave
  • 2 篇 vulnerability de...
  • 2 篇 chinese characte...
  • 2 篇 stochastic geome...
  • 2 篇 event detection
  • 2 篇 security
  • 2 篇 cluster
  • 2 篇 edge computing
  • 2 篇 interpolation
  • 2 篇 cloud computing
  • 1 篇 internet of thin...
  • 1 篇 fraudulent phone...
  • 1 篇 zero-watermark d...

机构

  • 23 篇 national compute...
  • 15 篇 national compute...
  • 5 篇 institute of inf...
  • 5 篇 national compute...
  • 3 篇 university of ch...
  • 3 篇 school of cybers...
  • 2 篇 school of comput...
  • 2 篇 national enginee...
  • 2 篇 national compute...
  • 2 篇 nanjing universi...
  • 2 篇 the national com...
  • 2 篇 beijing universi...
  • 2 篇 beijing universi...
  • 2 篇 national compute...
  • 2 篇 school of cyber ...
  • 2 篇 china mobile res...
  • 2 篇 state key labora...
  • 2 篇 school of comput...
  • 2 篇 institute of inf...
  • 2 篇 department of co...

作者

  • 4 篇 yongjian wang
  • 4 篇 yan hanbing
  • 3 篇 lihong wang
  • 3 篇 liehuang zhu
  • 3 篇 ruiguang li
  • 3 篇 zhang honggang
  • 3 篇 li ruiguang
  • 2 篇 yongpeng wu
  • 2 篇 xu bin
  • 2 篇 lu ma
  • 2 篇 hanbing yan
  • 2 篇 hewei yu
  • 2 篇 yuan qingsheng
  • 2 篇 shouying bai
  • 2 篇 ming liu
  • 2 篇 hua zhang
  • 2 篇 ye li
  • 2 篇 xin jin
  • 2 篇 wenjie liu
  • 2 篇 hao peng

语言

  • 78 篇 英文
检索条件"机构=Computer Network Emergency Response Technical Team/Coordination Center of China"
78 条 记 录,以下是1-10 订阅
排序:
Learning group interaction for sports video understanding from a perspective of athlete
收藏 引用
Frontiers of computer Science 2024年 第4期18卷 175-188页
作者: Rui HE Zehua FU Qingjie LIU Yunhong WANG Xunxun CHEN Intelligent Recognition and Image Processing(IRIP)Lab School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Hangzhou Innovation Institute Behang UniversityHangzhou 310051China National computer network emergency response technical team/coordination center of china(CNCERT or CNCERT/CC) Beijing 100029China
Learning activities interactions between small groups is a key step in understanding team sports *** research focusing on team sports videos can be strictly regarded from the perspective of the audience rather than th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Modeling and Performance Analysis of UAV-Aided Millimeter Wave Cellular networks with Stochastic Geometry
收藏 引用
china Communications 2024年 第6期21卷 146-162页
作者: Li Junruo Wang Yuanjie Cui Qimei Hou Yanzhao Tao Xiaofeng National Engineering Laboratory for Mobile network Technologies Beijing University of Posts and TelecommunicationsBeijing 100876China National computer network emergency response technical team/coordination center of china(CNCERT/CC) Beijing 100029China Department of Broadband Communication Peng Cheng LaboratoryShenzhen 518055China
UAV-aided cellular networks,millimeter wave(mm-wave) communications and multi-antenna techniques are viewed as promising components of the solution for beyond-5G(B5G) and even 6G *** leveraging the power of stochastic... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Distributed Region Tracking and Perimeter Surveillance for Second-Order Multi-Agent Systems in Star-Shaped Sets
收藏 引用
Journal of Systems Science & Complexity 2024年 第5期37卷 1995-2020页
作者: SHANG Juan MO Lipo MI Rongxin CAO Xianbing School of Mathematics and Statistics Beijing Technology and Business University The Department of Foundation Shijiazhuang Institute of Railway Technology School of computer and Artificial Intelligence Beijing Technology and Business University Research Centre for Agri-Product Quality Traceability Beijing Technology and Business University coordination center of china National Computer Network Emergency Response Technical Team
This paper investigates region tracking and perimeter surveillance of second-order multi-agent systems, where all agents move within a star-shaped set. First, by coordination transformations,the region tracking proble... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
AWeb Application Fingerprint Recognition Method Based on Machine Learning
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第7期140卷 887-906页
作者: Yanmei Shi Wei Yu Yanxia Zhao Yungang Jia School of Integrated Circuit Science and Engineering Tianjin University of TechnologyTianjin300382China College of International Business Zhejiang Yuexiu UniversityShaoxing312030China School of Public Administration Zhejiang Gongshang UniversityHangzhou310018China Tianjin Branch of National computer network emergency response technical team/coordination center of china Tianjin300100China
Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and *** fingerprint recognition metho... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
BArcherFuzzer:An Android System Services Fuzzier via Transaction Dependencies of BpBinder
收藏 引用
Intelligent Automation & Soft Computing 2024年 第3期39卷 527-544页
作者: Jiawei Qin Hua Zhang Hanbing Yan Tian Zhu Song Hu Dingyu Yan The State Key Laboratory of networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing100080China The National computer network emergency response technical team/coordination center of china Beijing100012China
By the analysis of vulnerabilities of Android native system services,we find that some vulnerabilities are caused by inconsistent data transmission and inconsistent data processing logic between client and *** existin... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Automatic Malware Classification via PRICoLBP
收藏 引用
Chinese Journal of Electronics 2018年 第4期27卷 852-859页
作者: YAN Hanbing ZHOU Hao ZHANG Honggang National computer network emergency response technical team/coordination center of china Beijing University of Posts and Telecommunications
Creating effective features is a critical issue in malware analysis. It requires a proper tradeoff between discriminative power and invariance. Previous studies have shown that it is fairly effective to design feature... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
WAF-Based Chinese Character Recognition for Spam Image Filtering
收藏 引用
Chinese Journal of Electronics 2018年 第5期27卷 1050-1055页
作者: LI Siyuan LI Ruiguang XU Yuan ZHOU Hao YAN Hanbing XU Bin ZHANG Honggang Beijing University of Posts and Telecommunication National computer network emergency response technical team coordination center of china
We address the problem of filtering image spam, a kind of rapidly spread spam in which the text is embedded into images to defeat text-based spam ***, we focus on image spam with Chinese text as "spam" which is a more... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Modeling and Analysis of the Decentralized Interactive Cyber Defense Approach
收藏 引用
china Communications 2022年 第10期19卷 116-128页
作者: Ming Liu Ruiguang Li Weiling Chang Jieming Gu Shouying Bai Jia Cui Lu Ma National computer network emergency response technical team/coordination center of china Beijing 100029China
Powered by the Internet and the ever-increasing level of informatization, the cyberspace has become increasingly complex and its security situation has become increasingly grim, which requires new adaptive and collabo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Taint Analysis Framework Applied to Android Applications in the Packed State
收藏 引用
china Communications 2023年 第3期20卷 336-346页
作者: Shouying Bai Lu Ma Huan Ma Wei Liu National computer network emergency response technical team/coordination center of china Beijing 100029China
In recent years,Android applications have caused personal privacy leaks *** order to analyze the malicious behavior,taint analysis technology can be used to track the API call chain,build a control-flow graph of funct... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A negative selection algorithm based on hierarchical clustering of self set
收藏 引用
Science china(Information Sciences) 2013年 第8期56卷 203-215页
作者: CHEN Wen LI Tao LIU XiaoJie ZHANG Bing College of computer Science Sichuan University National computer network emergency response technical team Coordination Center of China
Negative selection algorithm(NSA) is an important method of generating artificial immune ***,the traditional NSAs aim at eliminating the self-recognized invalid detectors,by matching candidate detectors with the whole... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论