×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [11]
内容类型
期刊论文 [6]
会议论文 [5]
发表日期
2018 [1]
2017 [3]
2016 [2]
2014 [1]
2012 [3]
2008 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共11条,第1-10条
帮助
限定条件
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis
期刊论文
Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, 2018, 页码: 283-288
作者:
Wang, Pengfei
;
Wang, Fengyu
;
Lin, Fengbo
;
Cao, Zhenzhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
botnet detection
P2P botnet
periodicity behavior
Spark
Web anomaly detection based on frequent closed episode rules
期刊论文
Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, 2017, 页码: 967-972
作者:
Wang, Lei
;
Cao, Shoufeng
;
Wan, Lin
;
Wang, Fengyu
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
Frequent closed episode rules
Spark
Web anomaly detection
Web logs
Sink location privacy protection under direction attack in wireless sensor networks
期刊论文
WIRELESS NETWORKS, 2017, 卷号: 23, 期号: 2, 页码: 579-591
作者:
Wang, Jian
;
Wang, Fengyu
;
Cao, Zhenzhong
;
Lin, Fengbo
;
Wu, Jiayan
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/12
Sink node
WSNs
Location privacy
Direction attack
Direction
information
Web Anomaly Detection Based on Frequent Closed Episode Rules
会议论文
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, AUG 01-04, 2017
作者:
Wang, Lei
;
Cao, Shoufeng
;
Wan, Lin
;
Wang, Fengyu
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/31
Web logs
Frequent closed episode rules
Web anomaly detection
Spark
Matching similar functions in different versions of a malware
期刊论文
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, 2016, 页码: 252-259
作者:
Xiao, Yajuan
;
Cao, Shoufeng
;
Cao, Zhenzhong
;
Wang, Fengyu
;
Lin, Fengbo
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/16
Function feature
Function matching
Malware
Reverse analysis
Matching Similar Functions in Different Versions of a Malware
会议论文
15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), AUG 23-26, 2016
作者:
Xiao, Yajuan
;
Cao, Shoufeng
;
Cao, Zhenzhong
;
Wang, Fengyu
;
Lin, Fengbo
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/31
reverse analysis
Malware
function feature
function matching
A retrospective study: the prevalence and prognostic value of anemia in patients undergoing radiotherapy for esophageal squamous cell carcinoma
期刊论文
WORLD JOURNAL OF SURGICAL ONCOLOGY, 2014, 卷号: 12
作者:
Zhang, Fang
;
Cheng, Fengyu
;
Cao, Lifang
;
Wang, Shengchuan
;
Zhou, Wei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/17
Anemia
Survival
Prevalence
Esophageal neoplasms
Squamous cell
carcinoma
Radiotherapy
A novel method to defense against Web DDoS
期刊论文
International Journal of Digital Content Technology and its Applications, 2012, 卷号: 6, 期号: 19, 页码: 162-170
作者:
Yan, Haitao
;
Wang, Fengyu
;
Cao, ZhenZhong
;
Lin, Fengbo
;
Chen, Chuantong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/23
Arrival Interval
DDoS(Distributed Denial of Service)
Packet Length
Rhythm Matrix
The Research of Method of Malignant Load Identification Based on Wavelet Analysis
会议论文
International Conference on Solid State Devices and Materials Science (SSDMS), APR 01-02, 2012
作者:
Wei, Shaoliang
;
Qin, Shiqun
;
Gao, Wenchang
;
Cheng, Fengyu
;
Cao, Zhongyue
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
Wavelet analysis
Malignant load identification
Meyer wavelet
Research of Characteristics of the Low Voltage Power Line in Underground Coal Mine
会议论文
International Conference on Solid State Devices and Materials Science (SSDMS), APR 01-02, 2012
作者:
Wei, Shaoliang
;
Qin, Shiqun
;
Gao, Wenchang
;
Cheng, Fengyu
;
Cao, Zhongyue
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/31
characteristics
PLCs
underground coal mine
©版权所有 ©2017 CSpace - Powered by
CSpace