×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海电子信息职业技术... [3]
上海大学 [2]
西安交通大学 [1]
重庆大学 [1]
心理研究所 [1]
自动化研究所 [1]
更多...
内容类型
会议论文 [10]
发表日期
2024 [1]
2021 [1]
2013 [1]
2012 [1]
2011 [1]
2009 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共10条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Distinguishing Neural Speech Synthesis Models Through Fingerprints in Speech Waveforms
会议论文
Taiyuan, Shanxi, China, 2024-07-27
作者:
Zhang, Chu Yuan
;
Yi, Jiangyan
;
Tao, Jianhua
;
Wang, Chenglong
;
Yan, Xinrui
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2024/06/26
A Questionnaire and Big Data-based Study on the Mixing up of Chinese Structural Particles
会议论文
Conference: 2nd International Conference on Education, Knowledge and Information Management, ICEKIM 2021, 不详, January 29, 2021 - January 31, 2021
作者:
Gao, Yu
;
Wang, Jing
;
Buxin, Han
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/08/16
Sequence Alignment-Based Detection Method for Resource Misuse in Information Systems
会议论文
6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), 2013-11-23
作者:
Zhang, Gaoyu[1]
;
He, Xiaoxia[2]
;
Zhou, Zhizhao[3]
;
Wang, Chao[4]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/30
Information System
Sequence Alignment
Resource Misuse Detection
Design and Implementation of Lightweight Wireless Lan Intrusion Detection System
会议论文
4th International Conference on Multimedia Information Networking and Security (MINES), NOV 02-04, 2012
作者:
Wu Jian
;
Fang Zhi-feng
;
Cao Yong
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/31
WLAN
intrusion detection
misuse detection
anomaly detection
detection of attack density
Dynamic identifying and tracking framework for cutters using RFID technology in digital workshop
会议论文
作者:
Zhou, Guanghui
;
Xiao, Zhongdong
;
Wang, Ben
;
Jiang, Pingyu
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/10
Accurate tracking
cutter
Enabling technologies
Life-forecasting
Misuse detection
Prototype system
Real-time information
Status tracking
Intrusion detection system combining misuse detection and anomaly detection using genetic network programming
会议论文
ICCAS-SICE 2009 - ICROS-SICE International Joint Conference 2009, 2009-08-18
作者:
Gong, Yunlu[1]
;
Mabu, Shingo[2]
;
Chen, Ci[3]
;
Wang, Yifei[4]
;
Hirasawa, Kotaro[5]
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/04/30
Towards a Semantic Web-enabled Knowledge Base to Elicit Security Requirements for Misuse Cases
会议论文
Beijing, PEOPLES R CHINA, JUN 08-11, 2011
作者:
Hu, Haibo[1]
;
Yang, Dan[1]
;
Xiang, Hong[1]
;
Fu, Li[1]
;
Ye, Chunxiao[2]
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/11/28
ATTACK SCENARIOS FOR POSSIBLE MISUSE OF PERIPHERAL PARTS IN THE GERMAN HEALTH INFORMATION INFRASTRUCTURE
会议论文
Funchal, Madeira, Portugal 【会议录】, 2010
作者:
AlexanderKaletsch
;
AliSunyaev
;
SebastianDunnebeil
;
HelmutKrcmar
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/01/04
Security
Analysis
Electronic
Health
Card
Health
Information
Infrastructure
Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme
会议论文
2008
作者:
Tong-LeeLim
;
TieyanLi
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2020/01/13
telecommunication
security
radiofrequency
identification
electronic
product
code
denial
of
information
attack
EPCglobal
standards
EPC
Class-1
Gen-2
standard
RFID
tag-reader
mutual
authentication
scheme
Authentication
Correlation
Protocols
Security
Standards
Analytical
models
An analysis of Information Systems Security Management (ISSM): The hierarchical organizations vs. emergent organization
会议论文
2009
作者:
Yasin,N.M.
;
Norman,A.A.
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/01/13
security
of
data
computer
network
management
DP
management
electronic
commerce
emergent
organization
environment
information
systems
security
management
hierarchical
organizations
business
stakeholders
Internet
misuse
e-commerce
company
Standards
organizations
Companies
Information
security
©版权所有 ©2017 CSpace - Powered by
CSpace