咨询与建议

限定检索结果

文献类型

  • 136 篇 期刊文献
  • 10 篇 会议

馆藏范围

  • 146 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 144 篇 工学
    • 107 篇 计算机科学与技术...
    • 44 篇 软件工程
    • 41 篇 网络空间安全
    • 39 篇 控制科学与工程
    • 34 篇 电子科学与技术(可...
    • 31 篇 电气工程
    • 29 篇 信息与通信工程
    • 24 篇 机械工程
    • 21 篇 材料科学与工程(可...
    • 12 篇 仪器科学与技术
    • 10 篇 生物医学工程(可授...
    • 8 篇 力学(可授工学、理...
    • 6 篇 交通运输工程
    • 3 篇 安全科学与工程
    • 3 篇 公安技术
  • 52 篇 理学
    • 34 篇 数学
    • 15 篇 生物学
    • 9 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 3 篇 系统科学
    • 2 篇 化学
    • 2 篇 天文学
  • 32 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 7 篇 法学
    • 5 篇 社会学
    • 3 篇 法学
  • 6 篇 医学
    • 6 篇 临床医学
  • 5 篇 教育学
    • 4 篇 心理学(可授教育学...
    • 2 篇 教育学
  • 4 篇 农学
    • 4 篇 作物学
  • 1 篇 经济学
  • 1 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 18 篇 deep learning
  • 9 篇 object detection
  • 9 篇 machine learning
  • 8 篇 anomaly detectio...
  • 7 篇 intrusion detect...
  • 6 篇 convolutional ne...
  • 6 篇 security
  • 6 篇 network security
  • 5 篇 intrusion detect...
  • 4 篇 feature extracti...
  • 4 篇 cyber security
  • 3 篇 internet of thin...
  • 3 篇 support vector m...
  • 3 篇 network
  • 3 篇 blockchain
  • 3 篇 detection
  • 3 篇 privacy protecti...
  • 3 篇 neural network
  • 3 篇 data fusion
  • 3 篇 computer vision

机构

  • 4 篇 china informatio...
  • 3 篇 department of fu...
  • 3 篇 department of el...
  • 2 篇 engineering rese...
  • 2 篇 institute of inf...
  • 2 篇 ministry of educ...
  • 2 篇 department of co...
  • 2 篇 school of cybers...
  • 2 篇 ieee
  • 2 篇 security enginee...
  • 2 篇 department of co...
  • 2 篇 department of in...
  • 2 篇 state key lab of...
  • 2 篇 school of cyber ...
  • 2 篇 department of co...
  • 2 篇 national compute...
  • 2 篇 department of co...
  • 2 篇 college of compu...
  • 2 篇 state key labora...
  • 1 篇 china mobile inf...

作者

  • 4 篇 il-gu lee
  • 3 篇 xiaohong guan
  • 3 篇 walid el-shafai
  • 3 篇 jiang wu
  • 3 篇 hwankuk kim
  • 2 篇 yong peng
  • 2 篇 jiho shin
  • 2 篇 feng xie
  • 2 篇 meng li
  • 2 篇 omar almomani
  • 2 篇 tianming liu
  • 2 篇 jiqiang liu
  • 2 篇 qixu liu
  • 2 篇 muhammad waqas
  • 2 篇 shanshan tu
  • 2 篇 so-eun jeon
  • 2 篇 ye-eun kim
  • 2 篇 xiaolong xu
  • 2 篇 haizhen wang
  • 2 篇 jung taek seo

语言

  • 145 篇 英文
  • 1 篇 中文
检索条件"机构=Intelligent Network Security Detection and Evaluation Laboratory"
146 条 记 录,以下是41-50 订阅
排序:
Using dummy data for RFID tag and reader authentication
收藏 引用
Digital Communications and networks 2022年 第5期8卷 804-813页
作者: Baha’A.Alsaify Dale R.Thompson Abdallah Alma'aitah Jia Di Department of network Engineering and security Jordan University of Science and TechnologyIrbid21163Jordan Computer Science and Computer Engineering Department University of ArkansasFayetteville72701ARUSA
Radio-Frequency IDentification(RFID)technology is an essential enabler of a multitude of intelligent *** robust authentication of RFID system components is critical in providing trustworthy data delivery from/to *** t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Raft Consensus Algorithm Based on Credit Model in Consortium Blockchain
收藏 引用
Wuhan University Journal of Natural Sciences 2020年 第2期25卷 146-154页
作者: CHEN Yunfang LIU Ping ZHANG Wei School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023JiangsuChina Jiangsu Key laboratory of Big Data security and intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023JiangsuChina
As one of the underlying technologies of the blockchain,the consensus algorithm plays a vital role in ensuring security and *** a consensus algorithm for the private blockchain,Raft has better performance than the res... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection
收藏 引用
Cybersecurity 2018年 第1期1卷 933-944页
作者: Yixiang Wang Shaohua lv Jiqiang Liu Xiaolin Chang Jinqiang Wang Beijing Key laboratory of security and Privacy in intelligent Transportation Beijing Jiaotong University3Shangyuancun100044 BeijingChina Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University3 Shangyuancun100044 BeijingChina
Deep learning(DL)has exhibited its exceptional performance in fields like intrusion *** augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL ***,the classic a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 维普期刊数据库 维普期刊数据库 评论
Robust Transmission Capacity Margin evaluation Based on All-Scenario-Feasible Optimization
Robust Transmission Capacity Margin Evaluation Based on All-...
收藏 引用
第36届中国控制会议
作者: Weisheng Liu Xiaohong Guan Jiang Wu Feilong Song Dong Xie Ministry of Education Key Lab for intelligent networks and network security Xi’an Jiaotong University
A robust and effective evaluation method for the safety of optimal generation scheduling has great potential on optimizing operation of electrical power and energy *** on the concept of transmission capacity margin,a ... 详细信息
来源: cnki会议 评论
A Sensor-Service Collaboration Approach for Target Tracking in Wireless Camera networks
收藏 引用
China Communications 2017年 第7期14卷 44-56页
作者: Shuai Zhao Le Yu State Key laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications China Mobile Information security Center
Mobile target tracking is a necessary function of some emerging application domains, such as virtual reality, smart home and intelligent healthcare. However, existing portable devices for target tracking are resource ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Intrusion detection Model with Twin Support Vector Machines
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2014年 第4期19卷 448-454页
作者: 何俊 郑世慧 Information security Center National Engineering laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications
Intrusion detection system(IDS) is becoming a critical component of network security. However,the performance of many proposed intelligent intrusion detection models is still not competent to be applied to real networ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Bio-inspired Hybrid Feature Selection Model for Intrusion detection
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 133-150页
作者: Adel Hamdan Mohammad Tariq Alwada’n Omar Almomani Sami Smadi Nidhal ElOmari Computer Science Department The World Islamic Sciences and Education UniversityAmmanJordan network and Cybersecurity Department Teesside UniversityMiddlesbroughUnited Kingdom Information and network security The World Islamic Sciences and Education UniversityAmmanJordan Software Engineering The World Islamic Sciences and Education UniversityAmmanJordan
Intrusion detection is a serious and complex *** due to a large number of attacks around the world,the concept of intrusion detection has become very *** research proposes a multilayer bioinspired feature selection mo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Early Warning Model of Telecommunication network Fraud Based on User Portrait
收藏 引用
计算机、材料和连续体(英文) 2023年 第4期75卷 1561-1576页
作者: Wen Deng Guangjun Liang Chenfei Yu Kefan Yao Chengrui Wang Xuan Zhang Department of Computer Information and Cyber security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Department of Public security of Jiangsu Province Key Laboratory of Digital ForensicsNanjingChina
With the frequent occurrence of telecommunications and networkfraud crimes in recent years, new frauds have emerged one after another whichhas caused huge losses to the people. However, due to the lack of an effective... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The detection of Fraudulent Smart Contracts Based on ECA-EfficientNet and Data Enhancement
收藏 引用
Computers, Materials & Continua 2023年 第12期77卷 4073-4087页
作者: Xuanchen Zhou Wenzhong Yang Liejun Wang Fuyuan Wei KeZiErBieKe HaiLaTi Yuanyuan Liao College of Software Xinjiang UniversityUrumqi830000China Key laboratory of Signal detection and Processing in Xinjiang Uygur Autonomous Region Urumqi830000China Key laboratory of Multilingual Information Technology in Xinjiang Uygur Autonomous Region Urumqi830000China
With the increasing popularity of Ethereum,smart contracts have become a prime target for fraudulent activities such as Ponzi,honeypot,gambling,and phishing *** some researchers have studied intelligent fraud detectio... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
SSD Real-Time Illegal Parking detection Based on Contextual Information Transmission
收藏 引用
Computers, Materials & Continua 2020年 第1期62卷 293-307页
作者: Huanrong Tang Aoming Peng Dongming Zhang Tianming Liu Jianquan Ouyang Key laboratory of intelligent Computing and Information Processing Ministry of EducationCollege of Information EngineeringXiangtan UniversityXiangtan411105China National Computer network Emergency Response Technical Team/Coordination Center of China Beijing100029China Department of Computer Science the University of GeorgiaAthensGeorgiaUSA
With the improvement of the national economic level,the number of vehicles is still increasing year by *** to the statistics of National Bureau of Statics,the number is approximately up to 327 million in China by the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论