×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [4]
山东大学 [4]
湖南大学 [3]
深圳先进技术研究院 [2]
计算技术研究所 [2]
中南大学 [2]
更多...
内容类型
期刊论文 [17]
会议论文 [6]
发表日期
2023 [1]
2021 [1]
2020 [2]
2019 [2]
2017 [1]
2016 [4]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共23条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Improving fraud detection via hierarchical attention-based Graph Neural Network
期刊论文
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 卷号: 72, 页码: 10
作者:
Liu, Yajing
;
Sun, Zhengya
;
Zhang, Wensheng
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2023/02/22
Graph Neural Networks
Fraud detection
Attention mechanism
The Trust Evaluation and Anomaly Detection Model of Industrial Control Equipment Based on Multiservice and Multi-attribute
会议论文
Chengdu, China, December 10-13, 2021
作者:
Chen X(陈鑫)
;
Liu XD(刘贤达)
;
Jiang YH(蒋一恒)
;
Wang C(王晨)
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2022/03/15
ICS
trust model
anomaly detection
multi-service
multi-attribute
support algorithm
vector similarity algorithm
Behavioral feature and correlative detection of multiple types of node in the internet of vehicles
期刊论文
Computers, Materials and Continua, 2020, 卷号: 64, 期号: 2, 页码: 1127-1137
作者:
Xie, Pengshou
;
Ma, Guoqiang
;
Feng, Tao
;
Yan, Yan
;
Han, Xueming
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2020/11/14
Network layers
Vehicle to vehicle communications
Vehicles
Behavioral features
Communication parameters
Detection accuracy
Detection features
Double layer structure
Energy sufficiency
Message forwarding
Topological conditions
Behavioral Feature and Correlative Detection of Multiple Types of Node in the Internet of Vehicles
期刊论文
CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 卷号: 64, 期号: 2, 页码: 1127-1137
作者:
Xie, Pengshou
;
Ma, Guoqiang
;
Feng, Tao
;
Yan, Yan
;
Han, Xueming
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/03/01
IoV
behavioral feature
double layer detection feature
correlation analysis
correlative detection model
MPR Based Secure Content Routing Scheme for NDN-MANET
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2019, 卷号: 20, 期号: 5, 页码: 1625-1636
作者:
Guo, Xian
;
Zhang, Ma-Jiang
;
Ngaboyindekwe, Aristide
;
Fang, Jun-Li
;
Wang, Jing
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/02/24
Named data networking
MANET
Merkle tree
Secure content routing
MPR based secure content routing scheme for NDN-MANET
期刊论文
Journal of Internet Technology, 2019, 卷号: 20, 期号: 5, 页码: 1625-1636
作者:
Guo, Xian
;
Zhang, Ma-Jiang
;
Ngaboyindekwe, Aristide
;
Fang, Jun-Li
;
Wang, Jing
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/11/14
Authentication
Floods
Forestry
Mobile ad hoc networks
Network security
Trees (mathematics)
Content routing
MANET
Merkle trees
Named data networkings
Security attributes
Security mechanism
Source authentication
Statistical detection
Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid
期刊论文
COMPUTER JOURNAL, 2017, 卷号: 60, 期号: 12, 页码: 1852-1870
作者:
Xiao Y(肖杨)
;
Zheng M(郑萌)
;
Xia XF(夏小芳)
;
Liang W(梁炜)
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2018/03/25
smart grid
smart meter
malicious meter
electricity theft
security
cyber-physical system
Black hole search in computer networks: State-of-the-art, challenges and future directions
期刊论文
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2016
作者:
Mengfei Peng
;
Wei Shi
;
Jean-Pierre Corriveau
;
Richard Pazzi
;
Yang Wang
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2017/01/15
MDMA: A multi-data and multi-ACK verified selective forwarding attack detection scheme in WSNs
期刊论文
IEICE Transactions on Information and Systems, 2016, 卷号: E99D, 期号: 8, 页码: 2010-2018
作者:
Liu, Anfeng
;
Liu, Xiao
;
Li, He
;
Long, Jun*
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/03
Wireless Sensor Networks
selective forwarding attack
multi-data and multi-ACK
identify malicious node
An outlier mining-based malicious node detection model for hybrid P2P networks
期刊论文
COMPUTER NETWORKS, 2016, 卷号: 108, 页码: 29-39
作者:
Meng, Xianfu
;
Ren, Shuang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/09
P2P network
Malicious node detection
Behavior pattern
Frequent behavior pattern
Outlier mining
©版权所有 ©2017 CSpace - Powered by
CSpace