CORC

浏览/检索结果: 共11条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Identifying Peer-to-Peer Botnets Through Periodicity Behavior Analysis 期刊论文
Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, 2018, 页码: 283-288
作者:  Wang, Pengfei;  Wang, Fengyu;  Lin, Fengbo;  Cao, Zhenzhong
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/11
Web anomaly detection based on frequent closed episode rules 期刊论文
Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, 2017, 页码: 967-972
作者:  Wang, Lei;  Cao, Shoufeng;  Wan, Lin;  Wang, Fengyu
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/11
Sink location privacy protection under direction attack in wireless sensor networks 期刊论文
WIRELESS NETWORKS, 2017, 卷号: 23, 期号: 2, 页码: 579-591
作者:  Wang, Jian;  Wang, Fengyu;  Cao, Zhenzhong;  Lin, Fengbo;  Wu, Jiayan
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/12
Web Anomaly Detection Based on Frequent Closed Episode Rules 会议论文
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, AUG 01-04, 2017
作者:  Wang, Lei;  Cao, Shoufeng;  Wan, Lin;  Wang, Fengyu
收藏  |  浏览/下载:12/0  |  提交时间:2019/12/31
Matching similar functions in different versions of a malware 期刊论文
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, 2016, 页码: 252-259
作者:  Xiao, Yajuan;  Cao, Shoufeng;  Cao, Zhenzhong;  Wang, Fengyu;  Lin, Fengbo
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/16
Matching Similar Functions in Different Versions of a Malware 会议论文
15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), AUG 23-26, 2016
作者:  Xiao, Yajuan;  Cao, Shoufeng;  Cao, Zhenzhong;  Wang, Fengyu;  Lin, Fengbo
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/31
A retrospective study: the prevalence and prognostic value of anemia in patients undergoing radiotherapy for esophageal squamous cell carcinoma 期刊论文
WORLD JOURNAL OF SURGICAL ONCOLOGY, 2014, 卷号: 12
作者:  Zhang, Fang;  Cheng, Fengyu;  Cao, Lifang;  Wang, Shengchuan;  Zhou, Wei
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/17
A novel method to defense against Web DDoS 期刊论文
International Journal of Digital Content Technology and its Applications, 2012, 卷号: 6, 期号: 19, 页码: 162-170
作者:  Yan, Haitao;  Wang, Fengyu;  Cao, ZhenZhong;  Lin, Fengbo;  Chen, Chuantong
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/23
The Research of Method of Malignant Load Identification Based on Wavelet Analysis 会议论文
International Conference on Solid State Devices and Materials Science (SSDMS), APR 01-02, 2012
作者:  Wei, Shaoliang;  Qin, Shiqun;  Gao, Wenchang;  Cheng, Fengyu;  Cao, Zhongyue
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/31
Research of Characteristics of the Low Voltage Power Line in Underground Coal Mine 会议论文
International Conference on Solid State Devices and Materials Science (SSDMS), APR 01-02, 2012
作者:  Wei, Shaoliang;  Qin, Shiqun;  Gao, Wenchang;  Cheng, Fengyu;  Cao, Zhongyue
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/31


©版权所有 ©2017 CSpace - Powered by CSpace