×
验证码:
换一张
忘记密码?
记住我
×
登录
中文
|
English
学校主页
|
图书馆
登录
注册
首页
学术成果
学院
学者
数据分析
检索
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
原始文献类型
收录类别
出版者
状态
学院
个人在本单位外知识产出
7
作者
贾维嘉
3
文献类型
期刊论文
5
会议论文
2
发表日期
2016
1
2010
1
2009
1
2005
2
2003
1
2001
1
更多...
语种
英语English
7
收录类别
CPCI-S
2
资助机构
关键词
Denial of service
2
Proof of work
2
network security
2
pattern matching
2
Authentication protocol
1
Broadcast Authentication Pr...
1
更多...
出处
2001 International Conferen...
1
International Journal of In...
1
Jisuanji Yanjiu yu Fazhan/C...
1
Journal of Computer Science...
1
Proceedings - International...
1
Ruan Jian Xue Bao/Journal o...
1
更多...
资助项目
×
知识图谱
反馈留言
浏览/检索结果:共7条,第1-7条
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
发表日期升序
发表日期降序
期刊影响因子升序
期刊影响因子降序
提交时间升序
提交时间降序
Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game
会议论文
Proceedings - International Conference on Distributed Computing Systems, Nara, Japan, 27-30 June 2016
作者:
Ruan, Na
;
Gao, Lei
;
Zhu, Haojin
;
Jia, Weijia
;
Li, Xiang
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2021/07/30
Broadcast Authentication Protocol
Denial of Service
Evolutionary Game
Lightweight Network
Timed Efficient Stream Loss-tolerant Authentication (TESLA)
Towards risk evaluation of denial-of-service vulnerabilities in security protocols
期刊论文
Journal of Computer Science and Technology,2010, 卷号: 25, 期号: 2, 页码: 375-387
作者:
Cao,Zhen
;
Guan,Zhi
;
Chen,Zhong
;
Hu,Jian Bin
;
Tang,Li Yong
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2025/08/05
Denial-of-Service (DoS)
Risk evaluation
Value-at-Risk (VaR)
Adaptive client puzzle scheme against denial-of-service attacks
期刊论文
Ruan Jian Xue Bao/Journal of Software,2009, 卷号: 20, 期号: 9, 页码: 2558-2573
作者:
Chen,Rui Chuan
;
Guo,Wen Jia
;
Tang,Li Yong
;
Chen,Zhong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2025/08/05
Client puzzle
Denial-of-service attack
Peer-to-peer network
Countermeasure for protecting authentication protocols against denial of service attack
期刊论文
Tien Tzu Hsueh Pao/Acta Electronica Sinica,2005, 卷号: 33, 期号: 2, 页码: 288-293
作者:
Wei,Jian Fan
;
Chen,Zhong
;
Duan,Yun Suo
;
Wang,Li Fu
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2025/08/05
Authentication protocol
Denial of service
Key establishment protocol
Proof of work
A dynamic defense against denial of service in two-party security protocols
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2005, 卷号: 42, 期号: 10, 页码: 1673-1678
作者:
Wei,Jianfan
;
Duan,Yunsuo
;
Tang,Liyong
;
Chen,Zhong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2025/08/05
Denial of service
Proof of work
Security protocol
Session identifier
Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks
期刊论文
International Journal of Information Technology & Decision Making,2003, 卷号: 2, 期号: 3, 页码: 397–405
作者:
Li, Ming
;
Chi, Chi-Hung
;
Jia, Weijia
;
Zhao, Wei
;
Zhou, Wanlei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2022/06/21
Statistical decision making
statistical detection
network security
distributed denial-of-service attacks
pattern matching
Decision analysis of network-based intrusion detection systems for denial-of-service attacks
会议论文
2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No.01EX479), BEIJING, PEOPLES R CHINA, OCT 29-NOV 01, 2001
作者:
Li, Ming
;
Jia, Weijia
;
Zhao, Wei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2021/07/30
denial-of-service attacks
Detection
network security
pattern matching
self-similar traffic