×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [3]
西安交通大学 [2]
北京航空航天大学 [2]
华南理工大学 [2]
湖南大学 [2]
北京大学 [1]
更多...
内容类型
会议论文 [7]
期刊论文 [7]
会议 [1]
其他 [1]
发表日期
2018 [4]
2015 [1]
2013 [1]
2012 [1]
2011 [1]
2010 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共16条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
作者升序
作者降序
提交时间升序
提交时间降序
题名升序
题名降序
A Self-Adaptive Bell–LaPadula Model Based on Model Training With Historical Access Logs
期刊论文
IEEE Transactions on Information Forensics and Security, 2018, 卷号: Vol.13 No.8, 页码: 2047-2061
作者:
Zhuo Tang
;
Xiaofei Ding
;
Ying Zhong
;
Li Yang
;
Keqin Li
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/26
Hidden
Markov
models
Training
Access
control
Data
models
Feature
extraction
Machine
learning
Adversarial
sample
BLP
machine
learning
mandatory
access
control
maximum
entropy
model
rule
optimization
A Self-Adaptive Bell-LaPadula Model based on Model Training with Historical Access Logs
期刊论文
IEEE Transactions on Information Forensics and Security, 2018, 卷号: Vol.13 No.8, 页码: 2047-2061
作者:
Tang, Z
;
Ding, XF
;
Zhong, Y
;
Yang, L
;
Li, KQ
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/26
Hidden
Markov
models
Training
Access
control
Data
models
Feature
extraction
Machine
learning
adversarial
sample
BLP
machine
learning
mandatory
access
control
maximum
entropy
model
rule
optimization.
Cooperative Content Transmission for Vehicular Ad Hoc Networks using Robust Optimization
会议论文
Proceedings - IEEE INFOCOM
作者:
Tian, D.
;
Zhou, J.
;
Chen, M.
;
Sheng, Z.
;
Ni, Q.
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/30
Dedicated short range communications
Fading channels
Maximum likelihood estimation
Medium access control
Military vehicles
Optimization
Stochastic control systems
Stochastic models
Stochastic systems
Vehicle to vehicle communications
Vehicle transmissions
Wireless telecommunication systems
Cooperative transmission
Dedicated short range communications (DSRC)
Medium access control layer
Nakagami fading channel
Probability of failure
Robust optimization models
Theoretical development
Vehicular Adhoc Networks (VANETs)
Vehicular ad hoc networks
RWAC: A Self-contained Read and Write Access Control Scheme for Group Collaboration
会议论文
Proceedings - IEEE Symposium on Computers and Communications
作者:
Wang, J.
;
Lang, B.
;
Zhu, R.
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Cryptography
Digital devices
Digital storage
Access control models
Attribute-based encryptions
Ciphertext-policy attribute-based encryptions
Group collaboration
Group signatures
Personal digital devices
Read and write access control
Signature generation
Access control
An RSU-coordinated synchronous multi-channel MAC scheme for vehicular Ad Hoc networks (EI收录)
期刊论文
IEEE Access, 2015, 卷号: 3, 页码: 2794-2802
作者:
Li, Xiaohuan[1,2]
;
Hu, Bin-Jie[1]
;
Chen, Hongbin[2]
;
Andrieux, Guillaume[3]
;
Wang, Yide[3]
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/04/25
Access control
Ad hoc networks
Aggregates
Analytical models
Medium access control
Mobile telecommunication systems
Telecommunication networks
Based on the attribute encrypted cloud storage scheme
会议论文
Shiyan, Hubei, China, June 21, 2013 - June 23, 2013
作者:
Zhu, Li-Ye
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2020/11/15
Cryptography
Access control models
Access control policies
Ciphertexts
Cloud storage services
Cloud storages
Conspiracy attack
Formatting
Security problems
Access control based on group signatures in cloud service
会议论文
作者:
Zheng, Han
;
Zhao, Zhongmeng
;
Zhang, Xuanping
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/10
Access control models
Access control policies
Cloud providers
Cloud service providers
Cloud services
Group signatures
Sensitive informations
User privacy
Computing turn delay in city road network with GPS collected trajectories
会议论文
2011 International Workshop on Trajectory Data Mining and Analysis, TDMA'11, Co-located with UbiComp 2011, Beijing, China, September 18, 2011 - September 18, 2011
Zhang,Hengcai(张恒才)
;
Lu,Feng
;
Zhou,Liang
;
Duan,Yingying
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2013/05/21
Data mining
Forecasting
Mathematical models
Motor transportation
Neural networks
Time division multiple access
Topology
Traffic control
Trajectories
Cross-layer approach to multiuser H.264 video transmission over wireless networks
期刊论文
Journal of Multimedia, 2010, 卷号: 5, 期号: 2, 页码: 110-117
作者:
Li, Fan
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/18
Compressed domain
Cross layer
Cross layer optimization
Gilbert-Elliott models
H.264
H.264 video transmission
Media access control
Perceptual video quality
Validating Access Control Configurations in J2EE Applications
其他
2008-01-01
Sun, Lianshan
;
Huang, Gang
;
Mei, Hong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2015/11/13
J2EE Security
Access Control
Validation
POLICIES
MODELS
DEPLOYMENT
CHECKING
©版权所有 ©2017 CSpace - Powered by
CSpace