×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [25]
北京大学 [24]
清华大学 [7]
北京航空航天大学 [6]
西安交通大学 [5]
武汉大学 [5]
更多...
内容类型
期刊论文 [48]
会议论文 [27]
其他 [16]
学位论文 [12]
专利 [1]
发表日期
2022 [1]
2021 [1]
2020 [2]
2019 [3]
2018 [2]
2017 [2]
更多...
学科主题
Computer S... [3]
计算机软件::软件理... [2]
Computer S... [1]
Physics [1]
流体力学,流体力学:... [1]
计算机科学技术基础学... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共104条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Ultrasensitive dual-mode visualization of perchlorate in water, soil and air boosted by close and stable Pt-Pt packing endowed low-energy absorption and emission
期刊论文
JOURNAL OF MATERIALS CHEMISTRY A, 2022, 卷号: 10, 期号: 15, 页码: 8195-8207
作者:
Su, Z (Su, Zhen) [1] , [2]
;
Li, YS (Li, Yushu) [1]
;
Li, JG (Li, Jiguang) [1] , [2]
;
Li, K (Li, Kun) [3]
;
Dou, XC (Dou, Xincun) [1] , [2]
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2022/05/06
A Deviation-based Detection Method against False Data Injection Attacks in Smart Grid
期刊论文
IEEE Access, 2021, 卷号: 9, 页码: 15499-15509
作者:
Pei C(裴超)
;
Xiao Y(肖杨)
;
Liang W(梁炜)
;
Han XJ(韩晓佳)
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2021/01/30
State estimation
false data injection attacks
smart grid
cyber security
Kalman filter
cyber physical system
A KG-based Enhancement Framework for Fact Checking Using Category Information
会议论文
线上, 2020年11月
作者:
Wang S(王帅)
;
Wang L(王磊)
;
Mao WJ(毛文吉)
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2022/07/01
fact checking knowledge graph
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 卷号: 14, 页码: 387-402
作者:
Xu, Dongyang
;
Ren, Pinyi
;
Ritcey, James A.
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2019/11/19
channel training
Physical-layer authentication
OFDM
anti-attack
independence-checking coding
HCIC: Hardware-Assisted Control-Flow Integrity Checking
期刊论文
IEEE Internet of Things Journal, 2019, 卷号: Vol.6 No.1, 页码: 458-471
作者:
Zhang, JL
;
Qi, BH
;
Qin, Z
;
Qu, G
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2019/12/13
Runtime
Cryptography
Internet of Things
Malware
Programming
Resists
Code reuse attacks (CRAs)
control flow integrity (CFI)
hardware-assisted security
physical unclonable function (PUF)
An Empirical Study of Open Source Flight Control Software Program Model Checking
会议论文
19th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2019, Sofia, Bulgaria, 2019-07-22
作者:
Cao, Zhiqin
;
Yin, Jinyu
;
Wang, Yichen
;
Li, Yu
;
Zhang, Jintao
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
期刊论文
JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2018, 卷号: 24, 页码: 1258-1270
作者:
Theera-Umpon, Nipon
;
Han, Kun-Hee
;
Bae, Woo-Sik
;
Lee, Sanghyuk
;
Van Huy Pham
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/19
U-Healthcare Service
Security Policy
Casper
Model Checking
Integrated authentication protocol
Authentication protocol
Optimal Independence-Checking Coding for Secure Uplink Training in Large-Scale MISO-OFDM Systems
会议论文
作者:
Xu, Dongyang
;
Ren, Pinyi
;
Ritcey, James A.
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/11/26
Channel estimation
Independence-checking coding
OFDM
Physical layer security
Pilot-aware attack
A secure and efficient public auditing scheme using RSA algorithm for cloud storage
期刊论文
JOURNAL OF SUPERCOMPUTING, 2017, 卷号: 73, 期号: 12
作者:
Xu, Zhiyan
;
Wu, Libing
;
Khan, Muhammad Khurram
;
Choo, Kim-Kwang Raymond
;
He, Debiao
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/05
Cloud storage
Data integrity checking
Data recovery attack
Provable security
©版权所有 ©2017 CSpace - Powered by
CSpace