×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海电子信息职业技术... [8]
兰州大学 [1]
安徽大学 [1]
广东外语外贸大学(超... [1]
湖南大学 [1]
内容类型
期刊论文 [11]
学位论文 [1]
发表日期
2018 [2]
2015 [1]
2013 [2]
2010 [1]
2009 [2]
2008 [2]
更多...
学科主题
社会学 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共12条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
An efficient and secure 3‐factor user‐authentication protocol for multiserver environment.
期刊论文
International Journal of Communication Systems, 2018, 卷号: Vol.31 No.14, 页码: 1
作者:
Li, Xiaohong
;
Sun, Aiying
;
He, Debiao
;
Luo, Min
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/04/24
MULTI-factor
authentication
*CLIENT/SERVER
computing
security
measures
*CYBERTERRORISM
*MALWARE
prevention
*DATA
security
A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks.
期刊论文
SENSORS, 2018, 卷号: Vol.18 No.2
作者:
Cao, Y
;
Zhao, XJ
;
Ye, WB
;
Han, QB
;
Pan, XF
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/26
WIRELESS
sensor
network
security
CYBERTERRORISM
SUPPORT
vector
machines
COMPLEMENTARY
metal
oxide
semiconductors
ELECTRIC
potential
ELECTRIC
oscillators
Information Technology in Domain of Electronic Intelligence and Cyberterrorism Combat
期刊论文
Computer Technology and Application, 2015, 卷号: Vol.6
作者:
SergiiKavun
;
RobertBrumnik
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
Information
Technology
Cyberterrorism
Combat
Electronic
Intelligence
Domain
Application-layer DoS attack detection based on HMM.
期刊论文
Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, 卷号: Vol.30 No.11, 页码: 3393-3399
作者:
XIE Bai-lin
;
JIANG Sheng-yi
;
ZHANG Qian-sheng
;
HAN De-zhi
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/03/04
APPLICATION software
DENSITY of states
CYBERTERRORISM
HIDDEN Markov models
DETECTORS
COMPUTER network protocols
Research on privacy preservation in wireless body area network.
期刊论文
Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, 卷号: Vol.30 No.11, 页码: 3210-3215
作者:
GAOPeng
;
WUfang-ming
;
YANGYong-jian
;
DUZhan-wei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/01/04
COMPUTER
security
BODY
area
networks
CYBERTERRORISM
DATA
analysis
INFORMATION
theory
COMPUTER
science
--
Research
Cyber Crime Law in India: Has Law Kept Pace with Emerging Trends? An Empirical Study
期刊论文
Journal of International Commercial Law and Technology, 2010, 卷号: Vol.5 No.1, 页码: 22-28
作者:
N.S.Nappinai
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/01/13
cybercrime
India
Information
Technology
service
Industry
Information
Technology
Act
2000
digital
electronic
cyberterrorism
data
protection
act
cyberstalking
N.S.
Nappinai
S.Kierkegaard
Stealthy and Subtle.
期刊论文
Aviation Week and Space Technology, 2009, 卷号: Vol.171 No.17, 页码: 76-78
作者:
Barrie,Douglas
;
Fulghum,DavidA.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/01/13
CYBERTERRORISM
INFORMATION
technology
ELECTRONICS
in
military
engineering
PREVENTION
Wide Cyber Attack Is Linked to China.
期刊论文
Wall Street Journal(Eastern Edition), 2009, 卷号: Vol.253 No.73, 页码: A18
作者:
WORTHEN,BEN
;
Gorman,Siobhan
;
Dean,Jason
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/01/13
CYBERTERRORISM
COMPUTER
software
ELECTRONIC
government
information
ADMINISTRATIVE
agencies
COMPUTER
security
MALWARE
UNITED
States
Plugging the Holes.
期刊论文
Government Executive, 2008, 卷号: Vol.40 No.12, 页码: 34-40
作者:
Aitoro,JillR.
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/01/13
COMPUTER
networks
--
Security
measures
DATA
protection
ADMINISTRATIVE
agencies
CYBERTERRORISM
UNITED
States
ELECTRONIC
government
information
Detecting Word Substitutions in Text.
期刊论文
IEEE Transactions on Knowledge and Data Engineering, 2008, 卷号: Vol.20 No.8, 页码: 1067-1076
作者:
Roussinov,Dmitridmitri.roussinov@asu.edu
;
Skillicom,DavidB.skill@cs.queensu.ca
;
SzewangFongfong@cs.queensu.ca
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2020/01/13
CYBERTERRORISM
DATA
protection
DATA
security
COMPUTER
security
ELECTRONIC
mail
systems
INFORMATION
storage
&
retrieval
systems
COMPUTER
networks
INFORMATION
science
INFORMATION
technology
SECURITY
measures
©版权所有 ©2017 CSpace - Powered by
CSpace