咨询与建议

限定检索结果

文献类型

  • 496 篇 期刊文献
  • 16 篇 会议

馆藏范围

  • 512 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 454 篇 工学
    • 201 篇 计算机科学与技术...
    • 143 篇 网络空间安全
    • 104 篇 软件工程
    • 80 篇 电子科学与技术(可...
    • 80 篇 控制科学与工程
    • 70 篇 仪器科学与技术
    • 70 篇 信息与通信工程
    • 43 篇 机械工程
    • 19 篇 航空宇航科学与技...
    • 10 篇 电气工程
    • 9 篇 交通运输工程
    • 8 篇 光学工程
    • 4 篇 土木工程
    • 4 篇 兵器科学与技术
    • 3 篇 力学(可授工学、理...
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 船舶与海洋工程
    • 3 篇 生物医学工程(可授...
  • 112 篇 管理学
    • 112 篇 管理科学与工程(可...
  • 91 篇 理学
    • 36 篇 数学
    • 33 篇 物理学
    • 12 篇 系统科学
    • 3 篇 生物学
    • 2 篇 大气科学
  • 36 篇 军事学
    • 33 篇 军队指挥学
  • 11 篇 医学
    • 10 篇 临床医学
  • 6 篇 艺术学
    • 6 篇 设计学(可授艺术学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 法学
    • 3 篇 社会学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 20 篇 security
  • 19 篇 deep learning
  • 17 篇 machine learning
  • 17 篇 network security
  • 11 篇 network
  • 10 篇 ddos
  • 10 篇 blockchain
  • 9 篇 intrusion detect...
  • 9 篇 attack
  • 9 篇 robustness
  • 8 篇 deep neural netw...
  • 8 篇 cloud computing
  • 7 篇 complex networks
  • 7 篇 authentication
  • 7 篇 defense
  • 7 篇 feature extracti...
  • 7 篇 deep reinforceme...
  • 6 篇 cyber security
  • 6 篇 attack detection
  • 6 篇 anomaly detectio...

机构

  • 8 篇 information secu...
  • 8 篇 college of compu...
  • 7 篇 ieee
  • 6 篇 state key labora...
  • 5 篇 college of compu...
  • 5 篇 college of liber...
  • 5 篇 state key labora...
  • 5 篇 school of electr...
  • 4 篇 institute of inf...
  • 4 篇 state key labora...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...
  • 4 篇 school of cyber ...
  • 4 篇 department of au...
  • 4 篇 school of comput...
  • 4 篇 atr national key...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 3 篇 beijing national...
  • 3 篇 key laboratory o...

作者

  • 8 篇 wei wang
  • 6 篇 jieren cheng
  • 6 篇 xiangyan tang
  • 5 篇 li chao
  • 5 篇 杨义先
  • 5 篇 deke guo
  • 4 篇 温巧燕
  • 4 篇 fei-yue wang
  • 4 篇 niu xinxin
  • 4 篇 victor ssheng
  • 3 篇 jianwei liu
  • 3 篇 jiang wei
  • 3 篇 mengyang li
  • 3 篇 wei li
  • 3 篇 xin yang
  • 3 篇 yanshan li
  • 3 篇 蔡云泽
  • 3 篇 xin xu
  • 3 篇 陈秀波
  • 3 篇 ya liu

语言

  • 463 篇 英文
  • 49 篇 中文
检索条件"机构=Key Laboratory of Network and Information Attack and Defense Technology"
512 条 记 录,以下是61-70 订阅
排序:
Secure P2P topology based on a multidimensional DHT space mapping
收藏 引用
Science China(information Sciences) 2013年 第5期56卷 224-237页
作者: SUN ZhiXin LUO BingQing CHEN YaDang BU Kai key laboratory of Broadband Wireless Communication and Sensor network technology(Nanjing University of Posts and Telecommunications) Ministry of Education State key laboratory for Novel Software technology Nanjing University
Distributed search and routing algorithms based on the DHT(distributed hash table) protocol have attracted considerable attention in structured P2P(peer-to-peer) research as a result of favorable properties such as di... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
information diffusion network inferring and pathway tracking
收藏 引用
Science China(information Sciences) 2015年 第9期58卷 135-149页
作者: ZHOU DongHao HAN WenBao WANG YongJun YUAN BaoDi College of Computer National University of Defense Technology State key laboratory of Mathematical Engineering and Advanced Computing College of Computer Science and technology Fudan University
network diffusion, such as spread of ideas, rumors, contagious disease, or a new type of behaviors, is one of the fundamental processes within networks. Designing effective strategies for influence spread maximization... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Improved nonlinear invariant attack
收藏 引用
Science China(information Sciences) 2022年 第3期65卷 266-268页
作者: Haipeng TONG Xuan SHEN Chao LI Yunwen LIU College of Liberal and Sciences National University of Defense Technology College of information and Communication National University of Defense Technology
Dear editor,In Asiacrypt 2016, Todo et al. [1] proposed a nonlinear invariant attack, a new type of distinguisher that covers any number of rounds for a substitution-permutation network(SPN) cipher under weak keys. ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Feasibility of Double-Click attack on a Passive Detection Quantum key Distribution System
收藏 引用
Chinese Physics Letters 2011年 第7期28卷 27-30页
作者: ZHANG Peng LI Chao Department of Mathematics and System Science Science CollegeNational University of Defense TechnologyChangsha 410073 State key laboratory of information Security Institute of SoftwareChinese Academy of SciencesBeijing 100190
An eavesdropper(Eve)can exploit all the imperfections of a practical quantum key distribution(QKD)system to obtain some information about the secret key,no matter whether these imperfections are from the physical laye... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Preventing IP Source Address Spoofing: A Two-Level, State Machine-Based Method
收藏 引用
Tsinghua Science and technology 2009年 第4期14卷 413-422页
作者: 毕军 刘冰洋 吴建平 沈燕 Tsinghua National laboratory for information Science and technology Network Research Center Tsinghua University China Education and Research Network (CERNET)
A signature-and-verification-based method, automatic peer-to-peer anti-spoofing (APPA), is pro- posed to prevent IP source address spoofing. In this method, signatures are tagged into the packets at the source peer,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quantum photonic network on chip
收藏 引用
Chinese Physics B 2018年 第5期27卷 59-73页
作者: Qun-Yong Zhang Ping Xu Shi-Ning Zhu National laboratory of Solid State Microstructures and School of Physics Nanjing University Nanjing 210093 China Institute for Quantum information and State key laboratory of High Performance Computing College of Computing National University of Defense Technology Changsha 410073 China
We provide an overview of quantum photonic network on chip. We begin from the discussion of the pros and cons of several material platforms for engineering quantum photonic chips. Then we introduce and analyze the bas... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Mission-oriented capability evaluation for combat network based on operation loops
收藏 引用
Defence technology(防务技术) 2024年 第12期42卷 156-175页
作者: Yang Wang Junyong Tao Xiaoke Zhang Guanghan Bai Yunan Zhang laboratory of Science and technology on Integrated Logistics Support College of Intelligence Science and TechnologyNational University of Defense TechnologyChangsha 410073China National key laboratory for Complex Systems Simulation Beijing 100101China
With continuous growth in scale,topology complexity,mission phases,and mission diversity,challenges have been placed for efficient capability evaluation of modern combat *** at the problems of insufficient mission con... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Overview of General Theory of Security
收藏 引用
China Communications 2017年 第7期14卷 1-10页
作者: Min Lei Yixian Yang Xinxin Niu Yu Yang Jie Hao information Security Center Beijing University of Posts and Telecommunications Guizhou University Guizhou Provincial Key Laboratory of Public Big Data Jiangsu Engineering Center of network Monitoring Nanjing University of Information Science & Technology
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Related-tweakey impossible differential attack on QARMA-128
收藏 引用
Science China(information Sciences) 2022年 第2期65卷 246-247页
作者: Juan DU Wei WANG Muzhou LI Meiqin WANG key laboratory of Cryptologic technology and information Security Ministry of EducationShandong University
Dear editor,QARMA[1]is a family of hardware-oriented lightweight tweakable block ciphers designed by *** contains two versions,which support block sizes of 64 and 128 bits,denoted by QARMA-64 and QARMA-128,*** structu... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Robustness Model of Complex networks with Tunable attack information Parameter
收藏 引用
Chinese Physics Letters 2007年 第7期24卷 2138-2141页
作者: 吴俊 谭跃进 邓宏钟 李勇 College of information Systems and Management National University of Defense Technology Changsha 410073
We introduce a novel model for robustness of complex with a tunable attack information parameter. The random failure and intentional attack known are the two extreme cases of our model. Based on the model, we study th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论