CORC

浏览/检索结果: 共6条,第1-6条 帮助

已选(0)清除 条数/页:   排序方式:
Improvement and simulation of ZRP routing protocol based on Beidou Satellite 会议论文
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2015-01-01
作者:  Tang Qing;  Bo Yang;  Lv Liangshuang;  Xia Chunhe
收藏  |  浏览/下载:2/0  |  提交时间:2020/01/06
Modeling, conflict detection, and verification of a new virtualization role-based access control framework 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2015, 卷号: 8, 页码: 1904-1925
作者:  Luo, Yang;  Xia, Chunhe;  Lv, Liangshuang;  Wei, Zhao;  Li, Yazhuo
收藏  |  浏览/下载:4/0  |  提交时间:2020/01/06
Automatic generation algorithm of penetration graph in penetration testing 会议论文
NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), BWCCA, Guangzhou, PEOPLES R CHINA, 2014-01-01
作者:  Qiu, Xue;  Wang, Shuguang;  Jia, Qiong;  Xia, Chunhe;  Lv, LiangShuang
收藏  |  浏览/下载:4/0  |  提交时间:2020/01/06
A Botnet-Oriented Collaborative Defense Scheme Description Language 会议论文
9th International Conference on Computational Intelligence and Security (CIS), PEOPLES R CHINA, 2013-01-01
作者:  Huan, Liming;  Yu, Yang;  Lv, Liangshuang;  Li, Shiying;  Xia, Chunhe
收藏  |  浏览/下载:2/0  |  提交时间:2020/01/06
A conflict-related rules detection tool for access control policy 会议论文
2nd CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, 2013-07-10
作者:  Liang, Xiaoyan;  Lv, Liangshuang;  Xia, Chunhe;  Luo, Yang;  Li, Yazhuo
收藏  |  浏览/下载:7/0  |  提交时间:2020/01/06
Network penetration testing scheme description language 会议论文
2011 International Conference on Computational and Information Sciences, ICCIS 2011, Chengdu, Sichuan, China, 2011-10-21
作者:  Dai, Zhiyong;  Lv, Liangshuang;  Liang, Xiaoyan;  Bo, Yang
收藏  |  浏览/下载:1/0  |  提交时间:2020/01/06


©版权所有 ©2017 CSpace - Powered by CSpace