×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海电子信息职业技术... [5]
西安交通大学 [4]
北京航空航天大学 [4]
兰州理工大学 [3]
武汉大学 [3]
清华大学 [2]
更多...
内容类型
期刊论文 [15]
会议论文 [10]
其他 [2]
SCI/SSCI论文 [1]
发表日期
2024 [1]
2019 [2]
2018 [4]
2017 [7]
2016 [1]
2015 [1]
更多...
学科主题
Meteorolog... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共28条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and Challenges
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 1, 页码: 58-73
作者:
Qingsong Zhao
;
Lei Shu
;
Kailiang Li
;
Mohamed Amine Ferrag
;
Ximeng Liu
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2024/01/02
Challenges
Internet of Things (IoT)
privacy and security
security requirements
solar insecticidal lamps (SIL)
A linear classifier based approach for identifying security requirements in open source software development
期刊论文
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2019, 卷号: 14, 页码: 34-40
作者:
Wang, Wentao
;
Mahakala, Kavya Reddy
;
Gupta, Arushi
;
Hussein, Nesrin
;
Wang, Yinglin
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/08/22
00-01
99-00 Just-in-time requirements engineering
Security requirements identification
Linear classifier
Regression model
Research on secure routing technology based on NDN for VANET
会议论文
Hong Kong, Hong kong, June 1, 2019 - June 3, 2019
作者:
Gai, Xiaowei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/11/15
Cryptography
Distributed computer systems
Dynamics
Floods
Memory architecture
Mobile security
Mobile telecommunication systems
Network architecture
Network routing
Signal processing
Transmission control protocol
Vehicular ad hoc networks
Data network
Forward-secure
Identity based cryptography
Named data networkings
Network environments
Security requirements
Trust values
Wireless mobile networks
Traffic-driven intrusion detection for massive MTC towards 5G networks
会议论文
作者:
Lu, Nan
;
Du, Qinghe
;
Sun, Li
;
Ren, Pinyi
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/11/26
Authentication and key agreements
Detection probabilities
Intrusion detection scheme
Machinetype communication (MTC)
Security enhancements
Security requirements
Traffic characteristics
Ubiquitous information
Automatically Tracing Dependability Requirements via Term-Based Relevance Feedback
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 卷号: 14, 期号: 1, 页码: 342-349
作者:
Wang, Wentao
;
Gupta, Arushi
;
Niu, Nan
;
Da Xu, Li
;
Cheng, Jing-Ru C.
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2019/12/10
Dependability
dependability requirements
privacy
requirements tracing
relevance feedback (RF)
security
NEM: A NEW in-VM monitoring with high efficiency and strong isolation
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 10699 LNCS, 页码: 396-405
作者:
Qin, J.
;
Shi, B.
;
Li, B.
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
Efficiency
Network security
Semantics
Switching
Virtual reality
Virtualization
Application scenario
Context switching
Hardware virtualization
Security requirements
Virtual exception
Virtual machine monitors
Virtualization securities
VMFUNC
Virtual machine
Comprehensive security management system for Hadoop platforms
会议论文
2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
作者:
Shang, T.
;
Zhuang, H.
;
Liu, J.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Authentication
Big data
Cryptography
Data mining
Industrial management
Robotics
Authorization and access control
Big data platforms
Big data technologies
Management systems
Security management systems
Security protection
Security requirements
Security services
Network security
A Regression Model Based Approach for Identifying Security Requirements in Open Source Software Development
会议论文
作者:
Wang, Wentao
;
Hussein, Nesrin
;
Gupta, Arushi
;
Wang, Yinglin
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/08/22
Just-in-time requirements engineering
open source software
security requirements identification
Dynamic Active Set Algorithm for Real-Time Energy-Reserve Optimal Dispatch in Multi-Zonal Power System
期刊论文
Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2017, 卷号: 51, 页码: 45-52
作者:
Wang, Yanwei
;
Liu, Fan
;
Ding, Tao
;
Sun, Jibo
;
Bie, Zhaohong
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/26
Active-Set algorithms
End systems
Large-scale programming
N-1 security constraints
Network congestions
Real time
Real time dispatches
Reserve requirements
Day-ahead optimal dispatch for wind integrated power system considering zonal reserve requirements
期刊论文
APPLIED ENERGY, 2017, 卷号: 188, 页码: 399-408
作者:
Liu, Fan
;
Bie, Zhaohong
;
Liu, Shiyu
;
Ding, Tao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/26
Day-ahead optimal dispatch
Zonal reserve requirements
N-1 security constrains
Stochastic programming
Wind integrated power system
©版权所有 ©2017 CSpace - Powered by
CSpace