×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [3]
兰州大学 [2]
山东大学 [2]
清华大学 [1]
大连理工大学 [1]
北京航空航天大学 [1]
更多...
内容类型
会议论文 [7]
期刊论文 [6]
发表日期
2023 [1]
2018 [2]
2017 [2]
2016 [2]
2015 [1]
2013 [2]
更多...
学科主题
computer s... [1]
mine and q... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共13条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Dynamic Evolutionary Game-based Modeling, Analysis and Performance Enhancement of Blockchain Channels
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 1, 页码: 188-202
作者:
PeiYun Zhang
;
MengChu Zhou
;
ChenXi Li
;
Abdullah Abusorrah
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2023/01/03
Blockchain
channel network
evolutionary game
malicious behavior
secure computing
stability analysis
Understanding the behaviors of BGP-based DDoS protection services
会议论文
作者:
Tung, Tony Miu
;
Wang, Chenxu
;
Wang, Jinhe
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/11/19
DDoS Attack
Ddos attack mitigations
Distributed denial of service attack
DPS behavior
Malicious traffic
Routing dynamics
Robust detection of android UI similarity
会议论文
IEEE International Conference on Communications
作者:
Mao, J.
;
Bian, J.
;
Ma, H.
;
Jia, Y.
;
Liang, Z.
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
User interfaces
Abnormal behavior
Fundamental features
Malicious codes
Robust detection
Sensitive informations
Unique features
Visual appearance
Visual similarity
Android (operating system)
PROSOCIAL BEHAVIOR IN ENVY SCENARIOS
期刊论文
SOCIAL BEHAVIOR AND PERSONALITY, 2017, 卷号: 45, 期号: 11, 页码: 1803-1814
作者:
Li, Xiujun
;
Su, Yuhui
;
Liu, Xiaoshi
;
Shi, Wendian
;
Shi, Kan
收藏
  |  
浏览/下载:44/0
  |  
提交时间:2018/02/04
Prosocial Behavior
Fairness
Envy
Benign Envy
Malicious Envy
Social Comparison
An android malware detection system based on behavior comparison analysis
会议论文
作者:
Tao, Jing
;
Zhang, Yan
;
Cao, Pengfei
;
Wang, Zheng
;
Zhao, Qiqi
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/11/26
Android applications
Android malware
Behavior analysis
Behavior comparisons
Design and Development
Malicious behavior
Real environments
Strong consistency
Modeling Multi-factor Sequential User Behavior Data over Social Networks
期刊论文
CHINESE JOURNAL OF ELECTRONICS, 2016, 卷号: 25, 期号: 2, 页码: 364-371
作者:
Wang Peng
;
Zhang Peng
;
Zhou Chuang
;
Guo Li
;
Fang Binxing
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/12/13
Malicious user detection
User behavior
Social networks
Bayesian model
Social influence
An outlier mining-based malicious node detection model for hybrid P2P networks
期刊论文
COMPUTER NETWORKS, 2016, 卷号: 108, 页码: 29-39
作者:
Meng, Xianfu
;
Ren, Shuang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/09
P2P network
Malicious node detection
Behavior pattern
Frequent behavior pattern
Outlier mining
AppSpear: Bytecode decrypting and DEX reassembling for packed android malware
会议论文
作者:
Yang, Wenbo
;
Zhang, Yuanyuan
;
Li, Juanru
;
Shu, Junliang
;
Li, Bodong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/02
Android malware
Code protections
DEX reassembling
Experimental evaluation
Malicious behavior
Malware detection
Program analysis
Systematic study
Light-weight trust-based on-demand multipath routing protocol for mobile Ad Hoc networks
期刊论文
Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, 2013, 页码: 42-49
作者:
Qu, Chuanhao
;
Ju, Lei
;
Jia, Zhiping
;
Xu, Huaqiang
;
Zheng, Longpeng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/23
malicious behavior
mobile ad hoc networks
multipath
on-demand
packet delivery ratio
path error
trust
Light-weight Trust-based On-demand Multipath Routing Protocol for Mobile Ad Hoc Networks
会议论文
12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), JUL 16-18, 2013
作者:
Qu, Chuanhao
;
Ju, Lei
;
Jia, Zhiping
;
Xu, Huaqiang
;
Zheng, Longpeng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/31
mobile ad hoc networks
trust
multipath
malicious behavior
packet
delivery ratio
on-demand
path error
©版权所有 ©2017 CSpace - Powered by
CSpace