CORC

浏览/检索结果: 共24条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 卷号: 16, 页码: 142-155
作者:  Wang, Tianbo;  Xia, Chunhe;  Wen, Sheng;  Xue, Hui;  Xiang, Yang
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
On the satisfiability of authorization requirements in business process 期刊论文
FRONTIERS OF COMPUTER SCIENCE, 2017, 卷号: 11, 页码: 528-540
作者:  Bo, Yang;  Xia, Chunhe;  Zhang, Zhigang;  Lu, Xinzheng
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/30
The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 卷号: 12, 页码: 2558-2573
作者:  Wang, Tianbo;  Xia, Chunhe;  Li, Zhong;  Liu, Xiaochen;  Xiang, Yang
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
An Attack-oriented Task Execution Collaborative Defense Protocol 会议论文
12TH CHINESE CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (CHINESECSCW 2017), 2017-01-01
作者:  Lei, Shengwei;  Yu, Yang;  Li, Xiaojian;  Li, Zhong;  Xia, Chunhe
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/30
An approach to evaluate network security risk based on attack graph 会议论文
4th International Conference on Electrical and Electronics Engineering and Computer Science (ICEEECS), Jinan, PEOPLES R CHINA
作者:  Hu, Xiaoyun;  Yu, Yang;  Xia, Chunhe
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
An approach to evaluate network security risk based on attack graph 会议论文
PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016-01-01
作者:  Hu, Xiaoyun;  Yu, Yang;  Xia, Chunhe
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/30
A Trust Bootstrapping Model for Defense Agents 会议论文
IEEE International Conference on Communication Software and Networks (ICCSN), Chengdu, PEOPLES R CHINA, 2015-01-01
作者:  Yu, Yang;  Xia, Chunhe;  Li, Zhong
收藏  |  浏览/下载:3/0  |  提交时间:2020/01/06
Improvement and simulation of ZRP routing protocol based on Beidou Satellite 会议论文
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2015-01-01
作者:  Tang Qing;  Bo Yang;  Lv Liangshuang;  Xia Chunhe
收藏  |  浏览/下载:2/0  |  提交时间:2020/01/06
Modeling, conflict detection, and verification of a new virtualization role-based access control framework 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2015, 卷号: 8, 页码: 1904-1925
作者:  Luo, Yang;  Xia, Chunhe;  Lv, Liangshuang;  Wei, Zhao;  Li, Yazhuo
收藏  |  浏览/下载:4/0  |  提交时间:2020/01/06
Trust Type Based Trust Bootstrapping Model of Computer Network Collaborative Defense 期刊论文
CHINA COMMUNICATIONS, 2015, 卷号: 12, 页码: 133-146
作者:  Yu Yang;  Xia Chunhe;  Li Shiying;  Li Zhong
收藏  |  浏览/下载:4/0  |  提交时间:2020/01/06


©版权所有 ©2017 CSpace - Powered by CSpace