×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
华南理工大学 [115]
清华大学 [110]
软件研究所 [65]
上海电子信息职业技... [64]
北京航空航天大学 [61]
湖南大学 [55]
更多...
内容类型
期刊论文 [470]
会议论文 [358]
学位论文 [54]
其他 [27]
会议 [10]
EI期刊论文 [3]
更多...
发表日期
2022 [4]
2021 [3]
2020 [10]
2019 [48]
2018 [74]
2017 [44]
更多...
学科主题
Computer S... [4]
computer s... [4]
Telecommun... [3]
Computer S... [2]
Computer S... [2]
computer s... [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共923条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Detecting Vulnerability on IoT Device Firmware: A Survey
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 1, 页码: 25-41
作者:
Xiaotao Feng
;
Xiaogang Zhu
;
Qing-Long Han
;
Wei Zhou
;
Sheng Wen
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2023/01/03
Firmware emulation
internet of things (IoT) firmware
network fuzzing
security
static analysis
Survey of Industrial Control Systems Security
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 卷号: 59, 期号: 5, 页码: 1035-1053
作者:
Yang, Ting
;
Zhang, Jiayuan
;
Huang, Zaiqi
;
Chen, Yujie
;
Huang, Chenglong
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2022/08/09
Computer architecture
Control systems
Digital devices
Firmware
Industrial research
Industrial water treatment
Internet of things
Network architecture
Network security
Attack
Communications security
Control system security
Countermeasure
Digital technologies
Energy
Industrial control system security
Industrial control systems
Manufacturing industries
Security research
Blockchain Data Privacy Protection and Sharing Scheme Based on Zero-Knowledge Proof
期刊论文
Wireless Communications and Mobile Computing, 2022, 卷号: 2022
作者:
Feng, Tao
;
Yang, Pu
;
Liu, Chunyan
;
Fang, Junli
;
Ma, Rong
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/04/21
Cloud security
Data privacy
Industrial research
Network security
Block-chain
Cloud service providers
Data availability
Data privacy protections
Data Sharing
Privacy protection
Protection schemes
Semitrusted
Sharing schemes
Zero-knowledge proofs
Research on co-design of dual security control and communication for nonlinear CPS with actuator fault and FDI attacks
期刊论文
Measurement and Control (United Kingdom), 2022
作者:
Zhao, Li
;
Li, Wei
;
Li, YaJie
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2022/09/22
Actuators
Cyber Physical System
Cybersecurity
Delay control systems
Design
Embedded systems
Network security
Active fault
Active fault-tolerance
Active-passive attack-tolerance
Active/passive
Attack tolerances
Co-designs
Cybe-physical systems
Cyber-physical systems
Dual security control
False data injection attacks
Nonlinear cybe-physical system
Passive attacks
Security controls
Energy-food nexus scarcity risk and the synergic impact of climate policy: A global production network perspective
期刊论文
ENVIRONMENTAL SCIENCE & POLICY, 2022, 卷号: 135, 页码: 26
作者:
Xia, Yan
;
Yan, Bingqian
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2023/05/30
Energy and food security
Energy-food scarcity nexus
Multi-regional input-output (MRIO) analysis
Network control analysis (NCA)
Climate policy
A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G
期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 卷号: 70, 期号: 6, 页码: 5234-5243
作者:
Zhang, Zhixia
;
Cao, Yang
;
Cui, Zhihua
;
Zhang, Wensheng
;
Chen, Jinjun
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2021/08/15
Intrusion detection
Security
6G mobile communication
Data models
Protocols
Optimization
Encryption
Controller area network (CAN)
intrusion detection
machine learning (ML)
many-objective optimization
vehicular networks security
Integrated security control method for industrial cyber-physical system with attack and fault
期刊论文
Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2021, 卷号: 55, 期号: 6, 页码: 1185-1198
作者:
Li, Wei
;
Zhang, Jian-Jun
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2022/02/17
Actuators
Computation theory
Cyber Physical System
Design
Embedded systems
Fault tolerance
Network security
Numerical methods
Communication resources
Communication schemes
Computing resource
Conservative technologies
Estimation results
False data injection
Integrated security control
Lyapunov stability theory
Tele-connection of global crude oil network: Comparisons between direct trade and embodied flows
期刊论文
ENERGY, 2021, 卷号: 217, 页码: 13
作者:
Song, Zhouying
;
Zhu, Qiaoling
;
Han, Mengyao
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2021/04/25
Crude oil
Embodied energy
Input-output analysis
Complex network
Energy security
Security risk and response analysis of typical application architecture of information and communication blockchain
期刊论文
NEURAL COMPUTING & APPLICATIONS, 2020, 页码: 11
作者:
Zhao, Hongwei
;
Zhang, Moli
;
Wang, Shi
;
Li, Entang
;
Guo, Zhenhua
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2021/12/01
Information and communication blockchain
Network security risks
Homomorphic verifiable secret sharing
Risk response
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption
期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:
Cai, Yi
;
Chen, Xiaoming
;
Tian, Lu
;
Wang, Yu
;
Yang, Huazhong
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2020/12/10
Artificial neural networks
Nonvolatile memory
Encryption
Computational modeling
Hardware
Non-volatile memory (NVM)
compute-in-memory (CIM)
neural network
security
encryption
©版权所有 ©2017 CSpace - Powered by
CSpace