CORC

浏览/检索结果: 共69条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Direct numerical simulations of hypersonic boundary layer transition over a hypersonic transition research vehicle model lifting body at different angles of attack 期刊论文
PHYSICS OF FLUIDS, 4, 2023, 卷号: 35, 页码: 44111
作者:  Men, Hongyuan;  Li XL(李新亮);  Liu HW(刘洪伟)
收藏  |  浏览/下载:5/0  |  提交时间:2023/06/15
Numerical Simulation of Crevice Corrosion of Stainless Steel-Titanium in NaCl Solution 期刊论文
COATINGS, 2022, 卷号: 12, 期号: 5, 页码: 12
作者:  Ding, Jiawei;  He, Weiping;  Liu, Yuanhai;  Zhang, Chenyu;  Wang, Haitao
收藏  |  浏览/下载:21/0  |  提交时间:2022/07/14
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol 期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:  Feng, Tao;  Wang, Shuaishuai;  Gong, Xiang;  Fang, Junli
收藏  |  浏览/下载:12/0  |  提交时间:2020/12/18
Ddos attack detection based on one-class svm in sdn 会议论文
Hohhot, China, July 17-20, 2020
作者:  Zhao JM(赵剑明);  Zeng P(曾鹏);  Shang WL(尚文利);  Tong GY(佟国毓)
收藏  |  浏览/下载:9/0  |  提交时间:2020/10/10
Simulating Spatio-Temporal Patterns of Terrorism Incidents on the Indochina Peninsula with GIS and the Random Forest Method 期刊论文
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2019, 卷号: 8, 期号: 3, 页码: 19
作者:  Hao, Mengmeng;  Jiang, Dong;  Ding, Fangyu;  Fu, Jingying;  Chen, Shuai
收藏  |  浏览/下载:58/0  |  提交时间:2019/05/22
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model 期刊论文
Future Generation Computer Systems, 2019, 卷号: 101, 页码: 169-179
作者:  Jie, Yingmo;  Choo, Kim-Kwang Raymond;  Li, Mingchu;  Chen, Ling;  Guo, Cheng
收藏  |  浏览/下载:21/0  |  提交时间:2019/12/02
A Trusted Network Connect Protocol for Resisting Man-in-the-Middle Attack 期刊论文
Jisuanji Xuebao/Chinese Journal of Computers, 2019, 卷号: 42, 期号: 5
作者:  Zhao, Bo;  Xiang, Cheng;  Zhang, Huan-Guo
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure 期刊论文
Personal and Ubiquitous Computing, 2018, 卷号: Vol.22 No.1, 页码: 55-67
作者:  Da-Zhi Sun;  Yi Mu;  Willy Susilo
收藏  |  浏览/下载:3/0  |  提交时间:2019/11/21
Cryptanalysis of the Round-Reduced Kupyna 期刊论文
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 卷号: 34, 页码: 733-748
作者:  Zou, Jian;  Dong, Le
收藏  |  浏览/下载:2/0  |  提交时间:2019/11/21
Improved Preimage Attacks on RIPEMD-160 and HAS-160 期刊论文
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 卷号: 12, 期号: 2, 页码: 727-746
作者:  Shen, Yanzhao;  Wang, Gaoli
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/11


©版权所有 ©2017 CSpace - Powered by CSpace