CORC

浏览/检索结果: 共44条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Virtual chain: A storage model supporting cross-blockchain transaction 期刊论文
Concurrency Computation, 2022, 卷号: 34, 期号: 12, 页码: 1-16
作者:  Wang Y(王妍);  Yang, Bingqing;  Liu JX(刘荆欣);  Zeng H(曾辉);  Xia CQ(夏长清)
收藏  |  浏览/下载:57/0  |  提交时间:2020/09/26
Cycle-tree guided attack of random K-core: Spin glass model and efficient message-passing algorithm 期刊论文
SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2022, 卷号: 65, 期号: 3, 页码: 230511
作者:  Zhou, Hai-Jun
收藏  |  浏览/下载:4/0  |  提交时间:2023/01/16
On the modulo degree complexity of Boolean functions 期刊论文
THEORETICAL COMPUTER SCIENCE, 2020, 卷号: 818, 页码: 32-40
作者:  Li, Qian;  Sun, Xiaoming
收藏  |  浏览/下载:4/0  |  提交时间:2020/12/10
Mortality predispositions of conifers across western USA 期刊论文
NEW PHYTOLOGIST, 2020, 页码: DOI: 10.1111/nph.16864
作者:  Wang Wenzhi;  English Nathan B.;  Grossiord Charlotte;  Gessler Arthur;  Das Adrian J.
收藏  |  浏览/下载:33/0  |  提交时间:2020/10/23
基于模糊攻防树和熵权法的工控系统脆弱性量化评估方法 期刊论文
计算机应用研究, 2020, 卷号: 37, 期号: 8, 页码: 2409-2412, 2416
作者:  巩天宇;  尚文利;  侯静;  陈春雨;  尹隆
收藏  |  浏览/下载:2/0  |  提交时间:2019/08/04
The Security Assessment on Programmable Logic Controller based on Attack Tree Model and FAHP 会议论文
Shenyang, China, July 12, 2019 - July 14, 2019
作者:  Feng, Tao;  Shi, Yanxia;  Gong, Renbin;  Zhao, Qianchuan
收藏  |  浏览/下载:7/0  |  提交时间:2020/11/15
Insect assemblages attacking seeds and fruits in a rainforest in Thailand 期刊论文
ENTOMOLOGICAL SCIENCE, 2019, 卷号: 22, 期号: x, 页码: 137-150
作者:  Basset, Yves;  Ctvrtecka, Richard;  Dahl, Chris;  Miller, Scott E.;  Quicke, Donald L. J.
收藏  |  浏览/下载:136/0  |  提交时间:2019/06/26
基于模糊攻防树和熵权法的工控系统脆弱性量化评估方法 期刊论文
计算机应用研究, 2019, 页码: 1-6
作者:  尹隆;  陈春雨;  侯静;  尚文利;  巩天宇
收藏  |  浏览/下载:23/0  |  提交时间:2019/08/04
Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2019, 页码: 1-11
作者:  Zeng P(曾鹏);  Shang WL(尚文利);  Gong TY(巩天宇);  Chen CY(陈春雨);  Hou J(侯静)
收藏  |  浏览/下载:73/0  |  提交时间:2019/04/13
Prediction of groups responsible for terrorism attack using tree based models 会议论文
作者:  ALfatih, Mohammed;  Li, Chunlin;  Saadalla, Naila Elhag
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace