咨询与建议

限定检索结果

文献类型

  • 378 篇 期刊文献
  • 10 篇 会议

馆藏范围

  • 388 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 353 篇 工学
    • 160 篇 计算机科学与技术...
    • 94 篇 网络空间安全
    • 86 篇 仪器科学与技术
    • 72 篇 电子科学与技术(可...
    • 67 篇 信息与通信工程
    • 59 篇 控制科学与工程
    • 48 篇 软件工程
    • 25 篇 机械工程
    • 16 篇 电气工程
    • 8 篇 公安技术
    • 7 篇 材料科学与工程(可...
    • 7 篇 航空宇航科学与技...
    • 5 篇 动力工程及工程热...
    • 4 篇 化学工程与技术
    • 3 篇 建筑学
    • 3 篇 交通运输工程
    • 2 篇 土木工程
    • 2 篇 测绘科学与技术
    • 2 篇 地质资源与地质工...
    • 2 篇 农业工程
  • 84 篇 管理学
    • 80 篇 管理科学与工程(可...
  • 37 篇 理学
    • 13 篇 物理学
    • 12 篇 数学
    • 5 篇 系统科学
    • 3 篇 化学
  • 36 篇 艺术学
    • 36 篇 设计学(可授艺术学...
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 临床医学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 1 篇 法学
  • 1 篇 农学

主题

  • 38 篇 blockchain
  • 28 篇 internet of thin...
  • 18 篇 security
  • 12 篇 deep learning
  • 10 篇 privacy protecti...
  • 10 篇 authentication
  • 10 篇 iot
  • 10 篇 machine learning
  • 9 篇 anomaly detectio...
  • 8 篇 internet
  • 8 篇 privacy
  • 7 篇 internet of thin...
  • 7 篇 cloud computing
  • 6 篇 e-commerce
  • 6 篇 smart contract
  • 6 篇 federated learni...
  • 6 篇 edge computing
  • 5 篇 internet securit...
  • 5 篇 system
  • 5 篇 encryption

机构

  • 14 篇 state key labora...
  • 12 篇 information secu...
  • 6 篇 海南大学
  • 6 篇 school of cybers...
  • 6 篇 institute for ne...
  • 6 篇 purple mountain ...
  • 6 篇 state key labora...
  • 6 篇 school of inform...
  • 5 篇 school of comput...
  • 5 篇 tsinghua nationa...
  • 5 篇 department of co...
  • 5 篇 college of elect...
  • 5 篇 school of cyber ...
  • 5 篇 cyberspace insti...
  • 4 篇 national mobile ...
  • 4 篇 tonghua normal u...
  • 4 篇 institute of big...
  • 4 篇 tsinghua nationa...
  • 4 篇 key laboratory o...
  • 4 篇 state key labora...

作者

  • 10 篇 gang xu
  • 6 篇 xiu-bo chen
  • 5 篇 xiubo chen
  • 5 篇 weijin jiang
  • 4 篇 xiangyang luo
  • 4 篇 junwei cao
  • 4 篇 yueting chai
  • 4 篇 yuhui xu
  • 4 篇 liu ying
  • 4 篇 wu jianping
  • 4 篇 jiahui chen
  • 4 篇 hui li
  • 4 篇 yixian yang
  • 4 篇 zhen chen
  • 4 篇 yi liu
  • 4 篇 yirong jiang
  • 3 篇 bin cao
  • 3 篇 xin liu
  • 3 篇 wenbing zhao
  • 3 篇 chen chen

语言

  • 358 篇 英文
  • 30 篇 中文
检索条件"机构=Internet Commerce Security Laboratory"
388 条 记 录,以下是91-100 订阅
排序:
Adaptive Learning-Based Delay-Sensitive and Secure Edge-End Collaboration for Multi-Mode Low-Carbon Power IoT
收藏 引用
China Communications 2022年 第7期19卷 324-336页
作者: Haijun Liao Zehan Jia Ruiqiuyu Wang Zhenyu Zhou Fei Wang Dongsheng Han Guangyuan Xu Zhenti Wang Yan Qin Hebei Key laboratory of Power internet of Things Technology North China Electric Power UniversityBaoding 071003HebeiChina State Grid Anhui Electric Power Company Chuzhou Power Supply Company Chuzhou 239000AnhuiChina
Multi-mode power internet of things(PIoT)combines various communication media to provide spatio-temporal coverage for low-carbon operation in smart ***-end collaboration is feasible to achieve the full utilization of ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
QBIoT:A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1727-1751页
作者: Ang Liu Qing Zhang Shengwei Xu Huamin Feng Xiu-bo Chen Wen Liu Network and Information Management Division Beijing Electronic Science and Technology InstituteBeijing100070China Department of Cyberspace security Beijing Electronic Science and Technology InstituteBeijing100070China Information security Institute Beijing Electronic Science and Technology InstituteBeijing100070China General Office Beijing Electronic Science and Technology InstituteBeijing100070China Information security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China
The internet of Things(IoT)is a network system that connects physical devices through the internet,allowing them to ***,IoT has become an integral part of our lives,offering convenience and smart ***,the growing numbe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Secure Energy internet Scheme for IoV Based on Post-Quantum Blockchain
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 6323-6336页
作者: Jiansheng Zhang Yang Xin Yuyan Wang Xiaohui Lei Yixian Yang Information security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Beijing Everyone Crowdsourcing Technology Company Ltd. Beijing 100018China
With the increasing use of distributed electric vehicles(EV),energy management in the internet of vehicles(IoV)has attracted more attention,especially demand response(DR)management to achieve efficient energy manageme... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fortifying Smart Grids: A Holistic Assessment Strategy against Cyber Attacks and Physical Threats for Intelligent Electronic Devices
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 2579-2609页
作者: Yangrong Chen June Li Yu Xia Ruiwen Zhang Lingling Li Xiaoyu Li Lin Ge School of Computer Science Zhengzhou University of AeronauticsZhengzhou450046China Henan Xin’an Century Technology Co. Ltd.Henan Data Security Engineering Technology Research CenterZhengzhou450046China Key laboratory of Aerospace Information security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan430072China
Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control *** the context of the heightened security c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Survey on Binary Code Vulnerability Mining Technology
收藏 引用
Journal of Information Hiding and Privacy Protection 2021年 第4期3卷 165-179页
作者: Pengzhi Xu Zetian Mai Yuhao Lin Zhen Guo Victor S.Sheng School of Cyberspace security(School of Cryptology) Hainan UniversityHaikouChina Key laboratory of internet Information Retrieval of Hainan Province HaikouChina Department of Computer Science Texas Tech University TexasUSA
With the increase of software complexity,the security threats faced by the software are also increasing day by *** people pay more and more attention to the mining of software *** source code has rich semantics and st... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
AR-CNN: an attention ranking network for learning urban perception
收藏 引用
Science China(Information Sciences) 2022年 第1期65卷 164-174页
作者: Zhetao LI Ziwen CHEN Wei-Shi ZHENG Sangyoon OH Kien NGUYEN Key laboratory of Hunan Province for internet of Things and Information security Xiangtan University Key laboratory of Intelligent Computing & Information Processing of Ministry of Education Xiangtan University School of Data and Computer Science Sun Yat-sen University Department of Computer and Information Engineering Ajou University Graduate School of Engineering Chiba University
An increasing number of deep learning methods is being applied to quantify the perception of urban environments, study the relationship between urban appearance and resident safety, and improve urban appearance. Most ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Unified Measurement Solution of Software Trustworthiness Based on Social-to-Software Framework
收藏 引用
Journal of Computer Science & Technology 2018年 第3期33卷 603-620页
作者: Xi Yang Gul Jabeen Ping Luo Xiao-Ling Zhu Mei-Hua Liu Key laboratory for Information System security School of Software Tsinghua University Beijing 100084 China School of Computer and Information Hefei University of Technology Hefei 230009 China Department of Foreign Languages and Literatures Tsinghua University Beijing 100084 China
As trust becomes increasingly important in software domain, software trustworthiness--as a complex high- composite concept, has developed into a big challenge people have to face, especially in the current open, dynam... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Constant-round auction with insulated bidders
收藏 引用
Science China(Information Sciences) 2022年 第4期65卷 264-266页
作者: Jie MA Bin QI Kewei LV State Key laboratory of Information security Institute of Information EngineeringChinese Academy of Sciences Data Assurance and Communication security Research Center Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences
Dear editor,In recent years, online auction has gained widespread popularity as a primary characteristic of electronic commerce among masses. It has also become a primary topic of research interest. Cryptographic prim... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Double-Blockchain Assisted Secure and Anonymous Data Aggregation for Fog-Enabled Smart Grid
收藏 引用
Engineering 2022年 第1期8卷 159-169页
作者: Siguang Chen Li Yang Chuanxin Zhao Vijayakumar Varadarajan Kun Wang Jiangsu Key Lab of Broadband Wireless Communication and internet of Things Nanjing University of Posts and TelecommunicationsNanjing 210003China Jiangsu Engineering Research Center of Communication and Network Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China Anhui Provincial Key laboratory of Network and Information security Anhui Normal UniversityWuhu 241000China School of Computer Science and Engineering Vellore Institute of TechnologyChennai 600127India Department of Electrical and Computer Engineering University of CaliforniaLos AngelesCA 90095USA
As a future energy system,the smart grid is designed to improve the efficiency of traditional power systems while providing more stable and reliable ***,this efficient and reliable service relies on collecting and ana... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Behind HumanBoost: Analysis of Users’ Trust Decision Patterns for Identifying Fraudulent Websites
收藏 引用
Journal of Intelligent Learning Systems and Applications 2012年 第4期4卷 319-329页
作者: Daisuke Miyamoto Hiroaki Hazeyama Youki Kadobayashi Takeshi Takahashi Information Technology Center The University of Tokyo Tokyo Japan internet Engineering laboratory Graduate School of Information Science Nara Advanced Institute of Science and Technology Nara Japan security Architecture laboratory National Institute of Information and Communications Technology Tokyo Japan.
This paper analyzes users’ trust decision patterns for detecting phishing sites. Our previous work proposed HumanBoost [1] which improves the accuracy of detecting phishing sites by using users’ Past Trust Decisions... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论