×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海电子信息职业... [260]
清华大学 [75]
华南理工大学 [65]
软件研究所 [32]
兰州理工大学 [17]
北京航空航天大学 [14]
更多...
内容类型
期刊论文 [355]
会议论文 [153]
会议 [7]
其他 [6]
学位论文 [6]
发表日期
2022 [2]
2020 [2]
2019 [11]
2018 [15]
2017 [14]
2016 [16]
更多...
学科主题
Computer S... [3]
computer s... [2]
Computer S... [1]
accidents ... [1]
computer a... [1]
computer t... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共527条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
作者升序
作者降序
提交时间升序
提交时间降序
题名升序
题名降序
Coordinated Cyber Security Enhancement for Grid-Transportation Systems With Social Engagement
期刊论文
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 页码: 15
作者:
Zhao, Pengfei
;
Li, Shuangqi
;
Hu, Paul Jen-Hwa
;
Cao, Zhidong
;
Gu, Chenghong
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2022/11/14
Transportation
Computer crime
Renewable energy sources
Smart cities
Vehicle-to-grid
Uncertainty
Turbines
Cyber-attack
cyber security
electric vehicle
false data injection attacks
multi-energy system
smart city manage-ment
social effort
Survey of Industrial Control Systems Security
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 卷号: 59, 期号: 5, 页码: 1035-1053
作者:
Yang, Ting
;
Zhang, Jiayuan
;
Huang, Zaiqi
;
Chen, Yujie
;
Huang, Chenglong
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2022/08/09
Computer architecture
Control systems
Digital devices
Firmware
Industrial research
Industrial water treatment
Internet of things
Network architecture
Network security
Attack
Communications security
Control system security
Countermeasure
Digital technologies
Energy
Industrial control system security
Industrial control systems
Manufacturing industries
Security research
Security and Efficient Authentication Scheme for Mobile Edge Computing
期刊论文
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 卷号: 44, 期号: 1, 页码: 110-116
作者:
Xue, Jian-Bin
;
Bai, Zi-Mei
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2021/06/03
Authentication
Computer terminals
Cryptography
Edge computing
Mobile telecommunication systems
Security systems
Authentication scheme
Computing environments
Efficient authentication
Lightweight identity authentication protocol
Man in the middle attacks
Mutual authentication
Physical layer security
Symmetric crypto systems
The design of large scale IP address and port scanning tool
期刊论文
Sensors (Switzerland), 2020, 卷号: 20, 期号: 16, 页码: 1-12
作者:
Yuan, Chao
;
Du, Jinze
;
Yue, Min
;
Ma, Tao
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2020/11/14
Computer viruses
Heavy ions
Linear accelerators
Network security
Scanning
Transmission control protocol
Viruses
Accelerator system
Control network
Development needs
Graphic displays
Heavy-ion accelerator
Rapid expansion
Security situation
Stable operation
A Blockchain-Based Computing Architecture for Mobile Ad Hoc Cloud
期刊论文
IEEE NETWORK, 2020, 卷号: 34, 期号: 4, 页码: 140-149
作者:
Jiao, Zhenzhen
;
Zhang, Baoxian
;
Zhang, Li
;
Liu, Min
;
Gong, Wei
收藏
  |  
浏览/下载:37/0
  |  
提交时间:2020/12/10
Blockchain
Ad hoc networks
Cloud computing
Smart contracts
Task analysis
Security
Computer architecture
The Security Assessment on Programmable Logic Controller based on Attack Tree Model and FAHP
会议论文
Shenyang, China, July 12, 2019 - July 14, 2019
作者:
Feng, Tao
;
Shi, Yanxia
;
Gong, Renbin
;
Zhao, Qianchuan
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2020/11/15
Analytic hierarchy process
Computation theory
Computer circuits
Controllers
Data acquisition
Decision making
Forestry
Intelligent computing
Probability
Programmable logic controllers
Programmed control systems
Security of data
Attack tree
Fuzzy analytic hierarchy process
Industrial control systems
Programmable logic controllers (PLC)
Protective measures
Security attributes
Shapiro-Wilk tests
Supervisory control and data acquisition
Research on co-design of security control and communication for cyber physical system under cyber-attacks
会议论文
Xiamen, China, July 5, 2019 - July 7, 2019
作者:
Shi, Yahong
;
Li, Wei
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/11/15
Actuators
Computer crime
Crime
Cyber Physical System
Delay control systems
Design
Discrete event simulation
Embedded systems
Fault detection
Fault tolerance
Network security
Plant management
Communication quality
Communication schemes
Conservative designs
Cyber-physical systems (CPS)
Lyapunov Krasovskii function
Security controls
Time-delay systems
Trigger conditions
Research on secure routing technology based on NDN for VANET
会议论文
Hong Kong, Hong kong, June 1, 2019 - June 3, 2019
作者:
Gai, Xiaowei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/11/15
Cryptography
Distributed computer systems
Dynamics
Floods
Memory architecture
Mobile security
Mobile telecommunication systems
Network architecture
Network routing
Signal processing
Transmission control protocol
Vehicular ad hoc networks
Data network
Forward-secure
Identity based cryptography
Named data networkings
Network environments
Security requirements
Trust values
Wireless mobile networks
Enhanced Hidden Moving Target Defense in Smart Grids
期刊论文
IEEE Transactions on Smart Grid, 2019, 卷号: 10, 页码: 2208-2223
作者:
Tian, Jue
;
Tan, Rui
;
Guan, Xiaohong
;
Liu, Ting
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2019/11/19
Computer security
False data injection attack
moving target defense
Power measurement
smart grid
Smart grids
State estimation
state estimation.
Study on the Constituent Elements of Domestic General Chip Industry Technology Alliance
会议论文
15th International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2018, Sichuan Province, China, 2018-12-14
作者:
Ge, Zhong-Quan
;
Gao, Xing
;
Deng, Xing-Xing
;
Mao, Jiang-Wei
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2019/12/02
Computer science
Computers, Chip production
Constituent elements
Construction factor
Integrated circuit technology
Network power
Objective facts
Public Products
Technology alliance, Network security
©版权所有 ©2017 CSpace - Powered by
CSpace