CORC

浏览/检索结果: 共38条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Dynamic Evolutionary Game-based Modeling, Analysis and Performance Enhancement of Blockchain Channels 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 1, 页码: 188-202
作者:  PeiYun Zhang;  MengChu Zhou;  ChenXi Li;  Abdullah Abusorrah
收藏  |  浏览/下载:30/0  |  提交时间:2023/01/03
Temporal high-order proximity aware behavior analysis on Ethereum 期刊论文
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 页码: 21
作者:  Ao, Xiang;  Liu, Yang;  Qin, Zidi;  Sun, Yi;  He, Qing
收藏  |  浏览/下载:16/0  |  提交时间:2021/12/01
DRRS-BC: Decentralized Routing Registration System Based on Blockchain 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 12, 页码: 1868-1876
作者:  Huimin Lu;  Yu Tang;  Yi Sun
收藏  |  浏览/下载:43/0  |  提交时间:2021/09/03
A High-Reliability Multi-Faceted Reputation Evaluation Mechanism for Online Services 期刊论文
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 卷号: 12, 期号: 6, 页码: 836-850
作者:  Wang, Miao;  Wang, Guiling;  Zhang, Yujun;  Li, Zhongcheng
收藏  |  浏览/下载:15/0  |  提交时间:2020/12/10
DeepScan: Exploiting Deep Learning Malicious Account Detection in Location-Based Social Networks 期刊论文
IEEE COMMUNICATIONS MAGAZINE, 2018, 卷号: 56, 期号: 11, 页码: 21-27
作者:  Gong, Qingyuan;  Chen, Yang;  He, Xinlei;  Zhuang, Zhou;  Wang, Tianyi
收藏  |  浏览/下载:41/0  |  提交时间:2019/01/08
Droidward: an effective dynamic analysis method for vetting android applications 期刊论文
Cluster computing-the journal of networks software tools and applications, 2018, 卷号: 21, 期号: 1, 页码: 265-275
作者:  Yang, Yubin;  Wei, Zongtao;  Xu, Yong;  He, Haiwu;  Wang, Wei
收藏  |  浏览/下载:63/0  |  提交时间:2019/05/09
Detecting Malicious Behaviors in JavaScript Applications 期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 12284-12294
作者:  Mao, Jian;  Bian, Jingdong;  Bai, Guangdong;  Wang, Ruilong;  Chen, Yue
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/30
PROSOCIAL BEHAVIOR IN ENVY SCENARIOS 期刊论文
SOCIAL BEHAVIOR AND PERSONALITY, 2017, 卷号: 45, 期号: 11, 页码: 1803-1814
作者:  Li, Xiujun;  Su, Yuhui;  Liu, Xiaoshi;  Shi, Wendian;  Shi, Kan
收藏  |  浏览/下载:42/0  |  提交时间:2018/02/04
Analysis of Malicious Injection Attack on CAN Data in In-Vehicle Network Based on Driving Behavior and Velocity 期刊论文
Ruan Jian Xue Bao/Journal of Software, 2017, 卷号: 28, 页码: 1-10
作者:  Ding, Nan;  Liang, Wen-Bin;  Xu, Li;  Song, Cai-Xia;  Tan, Guo-Zhen
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/02
Causality reasoning about network events for detecting stealthy malware activities 期刊论文
COMPUTERS & SECURITY, 2016, 卷号: 58, 页码: 180-198
作者:  Zhang, Hao;  Yao, Danfeng (Daphne);  Rarnakrishnan, Naren;  Zhang, Zhibin
收藏  |  浏览/下载:11/0  |  提交时间:2019/12/13


©版权所有 ©2017 CSpace - Powered by CSpace