×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [59]
内容类型
会议论文 [32]
期刊论文 [26]
图书章节 [1]
发表日期
2019 [2]
2018 [10]
2017 [11]
2016 [5]
2015 [4]
2014 [4]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共59条,第1-10条
帮助
限定条件
专题:西安交通大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
PUFPass: A password management mechanism based on software/hardware codesign
期刊论文
Integration, 2019, 卷号: 64, 页码: 173-183
作者:
Guo, Qingli
;
Ye, Jing
;
Li, Bing
;
Hu, Yu
;
Li, Xiaowei
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/19
Password
Password management
Physical disorders
Physical unclonable functions (PUF)
Security
Shoulder-surfing attacks
Software/hardware co designs
Usability
Protecting internet infrastructure against link flooding attacks: A techno-economic perspective
期刊论文
Information Sciences, 2019, 卷号: 479, 页码: 486-502
作者:
Ma, Xiaobo
;
Li, Jianfeng
;
Tang, Yajuan
;
An, Bo
;
Guan, Xiaohong
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2019/11/19
Autonomous systems
Collateral damage
End-to-End communication
Flooding attacks
Incentive design
Internet infrastructure
Internet infrastructure security
Nash bargaining
Shoot at a pigeon and kill a crow: On strike precision of link flooding attacks
会议论文
作者:
Peng, Jiahao
;
Ma, Xiaobo
;
Li, Jianfeng
;
Xue, Lei
;
Hu, Wenjun
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/11/19
Attack traffic
Critical links
Crossfire
DDoS Attack
Distributed denial of service attack
Flooding attacks
Routing infrastructure
Strike precision
Detecting False Data Injection Attacks Against Power System State Estimation with Fast Go- Decomposition (GoDec) Approach
期刊论文
IEEE Transactions on Industrial Informatics, 2018
作者:
Li, Boda
;
Ding, Tao
;
Huang, Can
;
Zhao, Junbo
;
Yang, Yongheng
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/11/19
Bad data detections
Cyber security
Energy management systems (EMS)
False data injection attacks
Large-scale attacks
Matrix separation
Power system state estimation
Smart grid
Towards a User-Friendly and Secure Hand Shaking Authentication for Smartphones
会议论文
作者:
Yan, Jinpei
;
Qi, Yong
;
Rao, Qifan
;
Qi, Saiyu
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/11/19
Authentication methods
Cold start
Efficient authentication
Ensemble learning
Machine learning models
Mobile authentication
Shoulder-surfing attacks
User experience
Revisiting website fingerprinting attacks in real-world scenarios: A case study of shadowsocks
会议论文
作者:
Zhao, Yankang
;
Ma, Xiaobo
;
Li, Jianfeng
;
Yu, Shui
;
Li, Wei
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/11/26
Anonymity networks
Encrypted traffic
Fingerprinting techniques
Internet censorship
Machine learning techniques
Real-world scenario
State of the art
Traffic analysis attacks
Preventing state-led cyberattacks using the bright internet and internet peace principles
期刊论文
Journal of the Association of Information Systems, 2018, 卷号: 19, 页码: 152-181
作者:
Shin, Young Yung
;
Lee, Jae Kyu
;
Kim, Myungchul
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/11/26
Cyber security
Cyber-attacks
Cyberspaces
Member countries
Non-proliferation of nuclear weapons
United Nations
A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 卷号: 78, 页码: 1005-1019
作者:
Amin, Ruhul
;
Kumar, Neeraj
;
Biswas, G. P.
;
Iqbal, R.
;
Chang, Victor
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/11/26
Distributed Cloud environment
Authentication
BAN logic
AVISPA tool
Security attacks
Mitigating stealthy false data injection attacks against state estimation in smart grid
会议论文
作者:
Fan, Jingyao
;
Khazbak, Youssef
;
Tian, Jue
;
Liu, Ting
;
Cao, Guohong
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/11/26
Estimation process
Evaluation results
False data injection
False data injection attacks
NP Complete
Operating state
Power System
Vulnerability index
SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 页码: 559-573
作者:
Wang, Chenxu
;
Miu, Tony T. N.
;
Luo, Xiapu
;
Wang, Jinhe
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/11/26
Application layer DDoS attacks
intrusion prevention system
sketch data structure
©版权所有 ©2017 CSpace - Powered by
CSpace