×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [39]
软件研究所 [24]
沈阳自动化研究所 [9]
清华大学 [7]
厦门大学 [6]
计算技术研究所 [5]
更多...
内容类型
期刊论文 [65]
其他 [25]
会议论文 [19]
学位论文 [10]
SCI/SSCI论文 [1]
发表日期
2023 [1]
2022 [1]
2021 [4]
2020 [5]
2019 [7]
2018 [4]
更多...
学科主题
Computer S... [5]
Computer S... [2]
计算机科学技术 [1]
计算机科学技术::计... [1]
计算机科学技术基础学... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共120条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Detecting Vulnerability on IoT Device Firmware: A Survey
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 1, 页码: 25-41
作者:
Xiaotao Feng
;
Xiaogang Zhu
;
Qing-Long Han
;
Wei Zhou
;
Sheng Wen
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2023/01/03
Firmware emulation
internet of things (IoT) firmware
network fuzzing
security
static analysis
Detection Methods in Smart Meters for Electricity Thefts: A Survey
期刊论文
PROCEEDINGS OF THE IEEE, 2022, 页码: 1-47
作者:
Xia XF(夏小芳)
;
Xiao Y(肖杨)
;
Liang W(梁炜)
;
Cui JT(崔江涛)
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/02/04
Power systems
Companies
Meters
Smart grids
Meter reading
Electric variables measurement
Distribution networks
Binary trees
cyber-physical systems
detection methods
electricity theft
Internet of Things (IoT)
machine learning
measurement mismatch
security
smart grid
smart meters
Formal modeling and security analysis method of security protocol based on CPN
期刊论文
Tongxin Xuebao/Journal on Communications, 2021, 卷号: 42, 期号: 9, 页码: 240-253
作者:
Gong, Xiang
;
Feng, Tao
;
Du, Jinze
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2022/02/17
Analysis method
Attack path
Colored Petri Nets
Formal analysis
Formal modeling
Formal security
Modeling analyzes
Security analysis
Security protocols
State-space
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2021, 卷号: 70, 期号: 7, 页码: 963-978
作者:
Zhao, Lutan
;
Li, Peinan
;
Hou, Rui
;
Huang, Michael C.
;
Liu, Peng
收藏
  |  
浏览/下载:40/0
  |  
提交时间:2021/12/01
Security
Hazards
Micromechanical devices
Microarchitecture
Out of order
Registers
Spectre vulnerabilities defense
security dependence
speculative execution side-channel vulnerabilities
A Review of Fuzzing Techniques
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 卷号: 58, 期号: 5, 页码: 944-963
作者:
Ren, Zezhong
;
Zheng, Han
;
Zhang, Jiayuan
;
Wang, Wenjie
;
Feng, Tao
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/02/17
Engineering education
Corresponding solutions
Machine learning technology
Research frontiers
Research results
Security fields
Security testing
System security
Testing technology
Characteristic Insights on Industrial Cyber Security and Popular Defense Mechanisms
期刊论文
CHINA COMMUNICATIONS, 2021, 卷号: 18, 期号: 1, 页码: 130-150
作者:
Wan M(万明)
;
Li JW(李嘉玮)
;
Liu Y(刘颖)
;
Zhao JM(赵剑明)
;
Wang, Jiushuang
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2021/03/14
industrial cyber threats
industrial characteristics
vulnerabilities
security mechanisms and viewpoints
内部人员异常行为检测分析及在金融领域的应用
学位论文
博士, 北京: 中国科学院大学, 2020
作者:
刘堃
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2021/01/05
内部威胁
规范建模
行为挖掘
异常检测
复杂事件
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0
期刊论文
COMPUTER NETWORKS, 2020, 卷号: 179, 页码: 18
作者:
Zhang, Qianying
;
Zhao, Shijun
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/12/10
Security analysis
Authenticated key exchange
TPM 2.0
IMPULP: A Hardware Approach for In-Process Memory Protection via User-Level Partitioning
期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2020, 卷号: 35, 期号: 2, 页码: 418-432
作者:
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/12/10
in-process isolation
memory protection
out-of-bounds
user-level partitioning
©版权所有 ©2017 CSpace - Powered by
CSpace