×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [58]
内容类型
会议论文 [37]
期刊论文 [21]
发表日期
2019 [7]
2018 [13]
2017 [6]
2016 [5]
2015 [8]
2014 [10]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共58条,第1-10条
帮助
限定条件
专题:北京航空航天大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Dynamic data auditing scheme for big data storage
期刊论文
Frontiers of Computer Science, 2019, 卷号: 14, 页码: 219-229
作者:
Chen, X.
;
Shang, T.
;
Zhang, F.
;
Liu, J.
;
Guan, Z.
收藏
  |  
浏览/下载:53/0
  |  
提交时间:2019/12/30
Big data
File organization
Printing machinery
Security of data
Direct control
Dynamic update
Hadoop distributed file systems
Mapreduce frameworks
Outsourced datum
Privacy protection
Remote data
Replace attacks
Digital storage
CapFlow: A capability-based DIFC system
期刊论文
Advances in Intelligent Systems and Computing, 2019, 卷号: 752, 页码: 813-819
作者:
Sun, J.
;
Long, X.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Message passing
Security of data
Capability
Decentralized information flow control
DIFC
Information flow security
Real-world system
Secure messages
System calls
System communications
Intelligent computing
An Empirical Study of Open Source Flight Control Software Program Model Checking
会议论文
19th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2019, Sofia, Bulgaria, 2019-07-22
作者:
Cao, Zhiqin
;
Yin, Jinyu
;
Wang, Yichen
;
Li, Yu
;
Zhang, Jintao
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Security-aware Localized Topology Control Algorithm for Mobile Ad-hoc Networks
会议论文
2019 4th Annual International Conference on Information System and Artificial Intelligence, ISAI 2019, Changsha, Hunan, China, 2019-05-17
作者:
Wang, Wenjian
;
Feng, Renjian
;
Zhu, Min
;
Wu, Yinfeng
;
Liu, Yadong
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2019/12/30
A Research on Security of Information Propagation of CACC Vehicles Under Internet of Vehicles Environment [车联网环境下CACC车辆信息传播安全性研究]
期刊论文
Qiche Gongcheng/Automotive Engineering, 2019, 卷号: 41, 页码: 252-258
作者:
Wei, L.
;
Wang, Y.
;
Qin, H.
;
Yu, G.
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/30
Information dissemination
Probability
Security of data
Street traffic control
Vehicles
Viruses
Communication range
Cyber security
Information flows
Information propagation
Road environment
Spread of virus
Traffic densities
Virus propagation
Vehicle to vehicle communications
Blockchain based permission delegation and access control in Internet of Things (BACI)
期刊论文
COMPUTERS & SECURITY, 2019, 卷号: 86, 页码: 318-334
作者:
Ali, Gauhar
;
Ahmad, Naveed
;
Cao, Yue
;
Asif, Muhammad
;
Cruickshank, Haitham
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Blockchain
Internet of Things
Access control
Permission delegation
Platform verification
Network security situation: From awareness to awareness-control
期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 卷号: 139, 页码: 15-30
作者:
Liu, Xiaowu
;
Yu, Jiguo
;
Lv, Weifeng
;
Yu, Dongxiao
;
Wang, Yinglong
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/30
Network security situation awareness
Cognitive computing
Multi-source fusion
Threat gene
Reinforced learning
Cognitive control
An intrusion detection system based on machine learning for CAN-Bus
期刊论文
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 2018, 卷号: 221, 页码: 285-294
作者:
Tian, D.
;
Li, Y.
;
Wang, Y.
;
Duan, X.
;
Wang, C.
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/30
Adaptive boosting
Artificial intelligence
Computer crime
Control system synthesis
Data handling
Data mining
Decision trees
Entropy
Intelligent systems
Intrusion detection
Learning algorithms
Learning systems
Mercury (metal)
Metadata
Security of data
Trees (mathematics)
CAN bus
Detection performance
Feature construction
GBDT
Gradient boosting
Intrusion Detection Systems
True positive rates
Vehicle control system
Network security
An Iterative Budget Algorithm for Dynamic Virtual Machine Consolidation under Cloud Computing Environment (revised December 2017)
期刊论文
IEEE Transactions on Services Computing, 2018
作者:
Laili, Y.
;
Tao, F.
;
Wang, F.
;
Zhang, L.
;
Lin, T.
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
Budget control
Cost reduction
Distributed computer systems
Energy utilization
Green computing
Heuristic algorithms
Iterative methods
Natural resources management
Network security
Optimization
Resource allocation
Virtual machine
Algorithm design and analysis
Iterative algorithm
Iterative Optimization
Resource management
Virtual machine migrations
Virtual machining
Cloud computing
Differential Privacy With Bias-Control Limited Sources
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 页码: 1230-1241
作者:
Yao, Yanqing
;
Li, Zhoujun
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Differential privacy
realistic imperfect randomness
Santha-Vazirani sources
bias-control limited sources
consistent sampling
finite-precision mechanism
©版权所有 ©2017 CSpace - Powered by
CSpace