×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [4]
北京航空航天大学 [1]
武汉大学 [1]
内容类型
会议论文 [3]
期刊论文 [3]
发表日期
2019 [2]
2017 [2]
2016 [2]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共6条,第1-6条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Compression–compression fatigue behaviour of gyroid-type triply periodic minimal surface porous structures fabricated by selective laser melting
期刊论文
Acta Materialia, 2019, 卷号: 181
作者:
Yang, Lei
;
Yan, Chunze
;
Cao, Wenchao
;
Liu, Zhufeng
;
Song, Bo
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
Research on image processing and intelligent recognition of space debris
会议论文
Automatic Target Recognition XXIX 2019, Baltimore, MD, United states, 2019-04-15
作者:
Guo, Linghua
;
Zhang, Haopeng
;
Zhai, Hua
;
Gong, Cheng
;
Song, Bin
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Web anomaly detection based on frequent closed episode rules
期刊论文
Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, 2017, 页码: 967-972
作者:
Wang, Lei
;
Cao, Shoufeng
;
Wan, Lin
;
Wang, Fengyu
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
Frequent closed episode rules
Spark
Web anomaly detection
Web logs
Web Anomaly Detection Based on Frequent Closed Episode Rules
会议论文
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, AUG 01-04, 2017
作者:
Wang, Lei
;
Cao, Shoufeng
;
Wan, Lin
;
Wang, Fengyu
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/31
Web logs
Frequent closed episode rules
Web anomaly detection
Spark
Matching similar functions in different versions of a malware
期刊论文
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, 2016, 页码: 252-259
作者:
Xiao, Yajuan
;
Cao, Shoufeng
;
Cao, Zhenzhong
;
Wang, Fengyu
;
Lin, Fengbo
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/16
Function feature
Function matching
Malware
Reverse analysis
Matching Similar Functions in Different Versions of a Malware
会议论文
15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), AUG 23-26, 2016
作者:
Xiao, Yajuan
;
Cao, Shoufeng
;
Cao, Zhenzhong
;
Wang, Fengyu
;
Lin, Fengbo
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/31
reverse analysis
Malware
function feature
function matching
©版权所有 ©2017 CSpace - Powered by
CSpace