×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [17]
山东大学 [6]
厦门大学 [5]
兰州理工大学 [5]
北京大学 [4]
山东师范大学 [4]
更多...
内容类型
期刊论文 [41]
会议论文 [17]
其他 [8]
学位论文 [3]
发表日期
2023 [1]
2022 [1]
2020 [2]
2019 [3]
2018 [4]
2017 [4]
更多...
学科主题
Telecommun... [1]
entomology [1]
生物科学::动物学 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共69条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Direct numerical simulations of hypersonic boundary layer transition over a hypersonic transition research vehicle model lifting body at different angles of attack
期刊论文
PHYSICS OF FLUIDS, 4, 2023, 卷号: 35, 页码: 44111
作者:
Men, Hongyuan
;
Li XL(李新亮)
;
Liu HW(刘洪伟)
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2023/06/15
Numerical Simulation of Crevice Corrosion of Stainless Steel-Titanium in NaCl Solution
期刊论文
COATINGS, 2022, 卷号: 12, 期号: 5, 页码: 12
作者:
Ding, Jiawei
;
He, Weiping
;
Liu, Yuanhai
;
Zhang, Chenyu
;
Wang, Haitao
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/07/14
stainless steel
titanium
crevice corrosion
numerical simulation
multiphysics
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
Ddos attack detection based on one-class svm in sdn
会议论文
Hohhot, China, July 17-20, 2020
作者:
Zhao JM(赵剑明)
;
Zeng P(曾鹏)
;
Shang WL(尚文利)
;
Tong GY(佟国毓)
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/10/10
DDoS attack detection
One-class SVM
SDN
Feature vector
Simulating Spatio-Temporal Patterns of Terrorism Incidents on the Indochina Peninsula with GIS and the Random Forest Method
期刊论文
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2019, 卷号: 8, 期号: 3, 页码: 19
作者:
Hao, Mengmeng
;
Jiang, Dong
;
Ding, Fangyu
;
Fu, Jingying
;
Chen, Shuai
收藏
  |  
浏览/下载:58/0
  |  
提交时间:2019/05/22
terrorism incidents
spatio-temporal patterns
Geo-information system
RF Algorithm
Indochina Peninsula
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model
期刊论文
Future Generation Computer Systems, 2019, 卷号: 101, 页码: 169-179
作者:
Jie, Yingmo
;
Choo, Kim-Kwang Raymond
;
Li, Mingchu
;
Chen, Ling
;
Guo, Cheng
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2019/12/02
Artificial intelligence
Losses
Network security
Pareto principle, Cyber security
Effective approaches
Game-theoretic model
Man in the middle attacks
Man-In-The-Middle (MITM) Attack
Pareto theory
Pareto-optimal
Stackelberg Games, Game theory
A Trusted Network Connect Protocol for Resisting Man-in-the-Middle Attack
期刊论文
Jisuanji Xuebao/Chinese Journal of Computers, 2019, 卷号: 42, 期号: 5
作者:
Zhao, Bo
;
Xiang, Cheng
;
Zhang, Huan-Guo
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
期刊论文
Personal and Ubiquitous Computing, 2018, 卷号: Vol.22 No.1, 页码: 55-67
作者:
Da-Zhi Sun
;
Yi Mu
;
Willy Susilo
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/21
Bluetooth standard
Secure Simple Pairing
Passkey entry
Man
in
the
middle attack
Home network system
Cryptanalysis of the Round-Reduced Kupyna
期刊论文
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 卷号: 34, 页码: 733-748
作者:
Zou, Jian
;
Dong, Le
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/11/21
collision
pseudo-preimage
meet-in-the-middle
Kupyna
rebound attack
Improved Preimage Attacks on RIPEMD-160 and HAS-160
期刊论文
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 卷号: 12, 期号: 2, 页码: 727-746
作者:
Shen, Yanzhao
;
Wang, Gaoli
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/11
Cryptography
Preimage attack
RIPEMD-160
HAS-160
Differential
meet-in-the-middle
Hash function
©版权所有 ©2017 CSpace - Powered by
CSpace