×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
计算技术研究所 [3]
清华大学 [2]
北京大学 [2]
兰州理工大学 [2]
北京航空航天大学 [2]
厦门大学 [1]
更多...
内容类型
期刊论文 [10]
会议论文 [4]
学位论文 [2]
其他 [1]
发表日期
2021 [1]
2019 [2]
2018 [1]
2016 [2]
2014 [2]
2013 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共17条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A Stateful Bloom Filter for Per-Flow State Monitoring
期刊论文
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 卷号: 8, 期号: 2, 页码: 1399-1413
作者:
Xie, Kun
;
Pei, Shuyu
;
Wang, Xin
;
Shi, Wen
;
Xie, Gaogang
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2021/12/01
Monitoring
High-speed networks
Standards
IP networks
Indexes
Hash functions
Arrays
Bloom filter
per-flow state monitoring
Spreading Patterns of Malicious Information on Single-Lane Platooned Traffic in a Connected Environment
期刊论文
COMPUTER-AIDED CIVIL AND INFRASTRUCTURE ENGINEERING, 2019, 卷号: 34, 页码: 248-265
作者:
Wang, Pengcheng
;
Yu, Guizhen
;
Wu, Xinkai
;
Wang, Yunpeng
;
He, Xiaozheng
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/12/30
Information dissemination
Connected vehicles
Control strategies
Epidemic modeling
Information propagation
Information spreading
Numerical experiments
Traffic flow dynamics
Traffic flow patterns
Vehicle to vehicle communications
Beacon trust management system and fake data detection in vehicular ad-hoc networks
期刊论文
IET INTELLIGENT TRANSPORT SYSTEMS, 2019, 卷号: 13, 页码: 780-788
作者:
Arshad, Muhammad
;
Ullah, Zahid
;
Khalid, Muhammad
;
Ahmad, Naveed
;
Khalid, Waqar
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/12/30
vehicular ad hoc networks
computer network security
mobile radio
wireless sensor networks
mobile ad hoc networks
telecommunication traffic
vehicular ad-hoc network
malicious data detection scheme
host intrusion detection system schemes
light-weight intrusion detection technique
false safety event detection scheme
fake data detection scheme
trust-based data detection scheme
based detection scheme
local based detection schemes performance
false safety messages
false messag
Understanding the behaviors of BGP-based DDoS protection services
会议论文
作者:
Tung, Tony Miu
;
Wang, Chenxu
;
Wang, Jinhe
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/11/19
DDoS Attack
Ddos attack mitigations
Distributed denial of service attack
DPS behavior
Malicious traffic
Routing dynamics
Causality reasoning about network events for detecting stealthy malware activities
期刊论文
COMPUTERS & SECURITY, 2016, 卷号: 58, 页码: 180-198
作者:
Zhang, Hao
;
Yao, Danfeng (Daphne)
;
Rarnakrishnan, Naren
;
Zhang, Zhibin
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/13
Network security
Anomaly detection
Stealthy maiware
Traffic analysis
Dependence analysis
Machine learning classification
IA(2)P: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETs
期刊论文
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 卷号: 2016
作者:
Ding, Nan
;
Tan, Guozhen
;
Zhang, Wei
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/09
ModbusTCP深度解析与异常检测方法研究
学位论文
硕士: 中国科学院沈阳自动化研究所, 2014
张盛山
收藏
  |  
浏览/下载:233/0
  |  
提交时间:2014/07/18
ModbusTCP
Netfilter
支持向量机
粒子群算法
A new intrusion detection method based on machine learning in mobile Ad hoc NETwork
会议论文
Seoul, Korea, Republic of, April 10, 2014 - April 11, 2014
作者:
Cao, Lai Cheng
;
Han, Wei
;
Dong, Sheng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/15
Adaptive boosting
Artificial intelligence
Computer crime
Dynamic loads
Errors
Learning systems
Mobile ad hoc networks
Telecommunication networks
Anomaly intrusion detection
Area of interest
False alarm rate
False negative rate
False positive rates
Heavy traffic load
Intrusion detection method
Intrusion Detection Systems
Simple three-party password-based key exchange protocol with provable security
期刊论文
international journal of computers and applications, 2013
Xiong, Hu
;
Chen, Yanan
;
Chen, Zhong
;
Li, Fagen
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2015/11/13
Situational awareness for improving network resilience management
会议论文
Lanzhou, China, May 12, 2013 - May 14, 2013
作者:
Liu, Mixia
;
Feng, Tao
;
Smith, Paul
;
Hutchison, David
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/15
Game theory
Heterogeneous networks
Pattern matching
Petri nets
Risk assessment
Security systems
Stochastic models
Stochastic systems
Heterogeneous network environments
Network resilience
resilience
resilience situation
Situation awareness
Situational awareness
Stochastic game nets
Stochastic Petri Nets
©版权所有 ©2017 CSpace - Powered by
CSpace