×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [24]
内容类型
会议论文 [18]
期刊论文 [6]
发表日期
2019 [1]
2017 [3]
2016 [2]
2015 [4]
2014 [3]
2013 [6]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共24条,第1-10条
帮助
限定条件
专题:北京航空航天大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 卷号: 16, 页码: 142-155
作者:
Wang, Tianbo
;
Xia, Chunhe
;
Wen, Sheng
;
Xue, Hui
;
Xiang, Yang
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Network security
worm propagation
human mobility
modeling
On the satisfiability of authorization requirements in business process
期刊论文
FRONTIERS OF COMPUTER SCIENCE, 2017, 卷号: 11, 页码: 528-540
作者:
Bo, Yang
;
Xia, Chunhe
;
Zhang, Zhigang
;
Lu, Xinzheng
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
satisfiability
authorization requirements
separation of duty
binding of duty
business process
The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 卷号: 12, 页码: 2558-2573
作者:
Wang, Tianbo
;
Xia, Chunhe
;
Li, Zhong
;
Liu, Xiaochen
;
Xiang, Yang
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Network security
social worm
propagation behavior
simulation modeling
An Attack-oriented Task Execution Collaborative Defense Protocol
会议论文
12TH CHINESE CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (CHINESECSCW 2017), 2017-01-01
作者:
Lei, Shengwei
;
Yu, Yang
;
Li, Xiaojian
;
Li, Zhong
;
Xia, Chunhe
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/30
Collaborative defense
collaboration protocol
protocol message
protocol logic
An approach to evaluate network security risk based on attack graph
会议论文
4th International Conference on Electrical and Electronics Engineering and Computer Science (ICEEECS), Jinan, PEOPLES R CHINA
作者:
Hu, Xiaoyun
;
Yu, Yang
;
Xia, Chunhe
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
risk evaluation
attack graph
vulnerability analysis
An approach to evaluate network security risk based on attack graph
会议论文
PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016-01-01
作者:
Hu, Xiaoyun
;
Yu, Yang
;
Xia, Chunhe
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
risk evaluation
attack graph
vulnerability analysis
A Trust Bootstrapping Model for Defense Agents
会议论文
IEEE International Conference on Communication Software and Networks (ICCSN), Chengdu, PEOPLES R CHINA, 2015-01-01
作者:
Yu, Yang
;
Xia, Chunhe
;
Li, Zhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/01/06
Trust bootstrapping
trust type
trust utility
collaborative defense
Improvement and simulation of ZRP routing protocol based on Beidou Satellite
会议论文
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2015-01-01
作者:
Tang Qing
;
Bo Yang
;
Lv Liangshuang
;
Xia Chunhe
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/01/06
The Wireless Ad Hoc Network
ZRP Routing Protocol
Beidou Satellite
The Control Center
Modeling, conflict detection, and verification of a new virtualization role-based access control framework
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2015, 卷号: 8, 页码: 1904-1925
作者:
Luo, Yang
;
Xia, Chunhe
;
Lv, Liangshuang
;
Wei, Zhao
;
Li, Yazhuo
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/01/06
virtualization
RBAC
policy conflict
description logic
colored petri net
Trust Type Based Trust Bootstrapping Model of Computer Network Collaborative Defense
期刊论文
CHINA COMMUNICATIONS, 2015, 卷号: 12, 页码: 133-146
作者:
Yu Yang
;
Xia Chunhe
;
Li Shiying
;
Li Zhong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/01/06
trust bootstrapping
trust type
trust utility
collaborative defense
©版权所有 ©2017 CSpace - Powered by
CSpace