CORC

浏览/检索结果: 共99条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Detecting Vulnerability on IoT Device Firmware: A Survey 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 1, 页码: 25-41
作者:  Xiaotao Feng;  Xiaogang Zhu;  Qing-Long Han;  Wei Zhou;  Sheng Wen
收藏  |  浏览/下载:27/0  |  提交时间:2023/01/03
Boundary delineation and grading functional zoning of Sanjiangyuan National Park based on biodiversity importance evaluations 期刊论文
SCIENCE OF THE TOTAL ENVIRONMENT, 2022, 卷号: 825
作者:  Ma, BR;  Zeng, WH;  Xie, YX;  Wang, ZZ;  Hu, GZ
收藏  |  浏览/下载:20/0  |  提交时间:2022/12/02
Dynamic response analysis of loess slope reinforced by frame anchors based on numerical simulation and shaking table test 期刊论文
Journal of GeoEngineering, 2020, 卷号: 15, 期号: 2, 页码: 89-101
作者:  Ye, Shuai-Hua;  Zhao, Zhuang-Fu;  Zhu, Yan-Peng
收藏  |  浏览/下载:4/0  |  提交时间:2022/02/17
Dynamic response analysis of loess slope reinforced by frame anchors based on numerical simulation and shaking table test 期刊论文
Journal of GeoEngineering, 2020, 卷号: 15, 期号: 2, 页码: 89-101
作者:  Ye, Shuai-Hua;  Zhao, Zhuang-Fu;  Zhu, Yan-Peng
收藏  |  浏览/下载:10/0  |  提交时间:2020/11/14
Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 卷号: 16, 期号: 5, 页码: 3322-3329
作者:  Sangaiah, Arun Kumar;  Medhane, Darshan Vishwasrao;  Bian, Gui-Bin;  Ghoneim, Ahmed;  Alrashoud, Mubarak
收藏  |  浏览/下载:24/0  |  提交时间:2020/06/02
Who is Vulnerable to Ecosystem Service Change? Reconciling Locally Disaggregated Ecosystem Service Supply and Demand 期刊论文
ECOLOGICAL ECONOMICS, 2019, 卷号: 157, 页码: 312-320
作者:  Ma, Sai;  Smailes, Marina;  Zheng, Hua;  Robinson, Brian E.
收藏  |  浏览/下载:7/0  |  提交时间:2020/10/19
EXPLORING THE VULNERABILITY OF FRACTAL COMPLEX NETWORKS THROUGH CONNECTION PATTERN AND FRACTAL DIMENSION 期刊论文
FRACTALS-COMPLEX GEOMETRY PATTERNS AND SCALING IN NATURE AND SOCIETY, 2019, 卷号: 27
作者:  Li, Dong-Yan;  Wang, Xing-Yuan;  Huang, Peng-He
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/02
CVSkSA: cross-architecture vulnerability search in firmware based on kNN-SVM and attributed control flow graph (Open Access) 期刊论文
Software Quality Journal, 2019, 卷号: 27, 期号: 3
作者:  Zhao, Dongdong;  Lin, Hong;  Ran, Linjun;  Han, Mushuai;  Tian, Jing
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2018
作者:  Zhou, Yadong;  Chen, Kaiyue;  Zhang, Junjie;  Leng, Junyuan;  Tang, Yazhe
收藏  |  浏览/下载:6/0  |  提交时间:2019/11/26
Stability Analysis of Flood Bunds: A Study on Geotechnical Health Evaluation of Embankments 会议论文
Baleli, Quetta, April 2, 2018 - April 3, 2018
作者:  Noshin, Sumayya;  Alam, Mehtab;  Sadiq, Shamsher;  Mandokhail, Saeedullah Jan
收藏  |  浏览/下载:35/0  |  提交时间:2018/10/19


©版权所有 ©2017 CSpace - Powered by CSpace