×
验证码:
换一张
忘记密码?
记住我
×
登录
中文
|
English
学校主页
|
图书馆
登录
注册
首页
学术成果
学院
学者
数据分析
检索
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
原始文献类型
收录类别
出版者
状态
学院
个人在本单位外知识产出
14
作者
周荫强
3
贾维嘉
2
王田
2
骆宗伟
1
文献类型
期刊论文
11
专著
2
会议论文
1
发表日期
2021
1
2019
2
2017
2
2015
1
2014
3
2013
1
更多...
语种
英语English
14
收录类别
SCIE
2
SSCI
2
EI
1
中文核心期刊要目总览
1
资助机构
关键词
Information security
5
Deviant behavior
2
big data
2
cloud computing
2
deep web
2
linked data
2
更多...
出处
Information Sciences
2
Beijing Daxue Xuebao (Ziran...
1
Communications of the Assoc...
1
Decision Support Systems
1
Dianzi Keji Daxue Xuebao/Jo...
1
Information Technology and ...
1
更多...
资助项目
×
知识图谱
反馈留言
浏览/检索结果:共14条,第1-10条
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
发表日期升序
发表日期降序
期刊影响因子升序
期刊影响因子降序
提交时间升序
提交时间降序
A trustworthiness-based vehicular recruitment scheme for information collections in Distributed Networked Systems
期刊论文
Information Sciences,2021, 卷号: 545, 页码: 65-81
作者:
Li, Ting
;
Liu, Anfeng
;
Xiong, Neal N.
;
Zhang, Shaobo
;
Wang, Tian
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/12/02
Coverage
Distributed Networked Systems
Information quality
Security
Trustworthiness
Vehicle recruitment
The effects of moral disengagement and organizational ethical climate on insiders’ information security policy violation behavior
期刊论文
Information Technology and People,2019, 卷号: 32, 期号: 4, 页码: 973-992
作者:
Chen, Hao
;
Chau, Patrick Y. K.
;
Li, Wenli
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2023/05/19
Information security behaviour
Information security policy violation
Moral disengagement
Organizational ethical climate
Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid
会议论文
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Niagara Falls, U.S.A., JUL 11, 2018
作者:
Bhuiyan, Md Zakirul Alam
;
Zaman, Mdaliuz
;
Wang, Guojun
;
Wang, Tian
;
Rahman, Md Arafat
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2021/12/02
Compromised information injection
Demand response
Internet of Things (IoT)
Privacy
Security attack
Smart grid
Web Information Systems Engineering – WISE 2017 – 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part II
专著
United States:Springer, 2017
作者:
Bouguettaya, Athman
;
Gao, Yunjun
;
Klimenko, Andrey
;
Chen, Lu
;
Zhang, Xiangliang
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2021/09/30
web mining
deep web
semantic web
big data
cloud computing
mobile web
social network
web intelligence
web data models
web engineering
web information retrieval
web privacy
web security
web search
web tools and languages
linked data
web integration
Web Information Systems Engineering – WISE 2017 – 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part I
专著
United States:Springer, 2017
作者:
Bouguettaya, Athman
;
Gao, Yunjun
;
Klimenko, Andrey
;
Chen, Lu
;
Zhang, Xiangliang
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/09/30
web mining
deep web
semantic web
big data
cloud computing
mobile web
social network
web intelligence
web data models
web engineering
web information retrieval
web privacy
web security
web search
web tools and languages
linked data
web integration
Developing a typological theory using a quantitative approach: A case of information security deviant behavior
期刊论文
Communications of the Association for Information Systems,2015, 卷号: 37, 页码: 510-535
作者:
Chu, Amanda M. Y.
;
Chau, Patrick Y. K.
;
So, Mike K. P.
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2023/05/19
Deviant behavior
Information security
Multidimensional scaling
Theory building
Typological theory
Automated enforcement for relaxed information release with reference points
期刊论文
Science China Information Sciences,2014, 卷号: 57, 期号: 11, 页码: 1-19
作者:
Sun,Cong
;
Xi,Ning
;
Gao,Sheng
;
Chen,Zhong
;
Ma,Jian Feng
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2025/08/05
declassification
information flow
noninterference
program analysis
pushdown system
security policy
Certificate-free ad hoc anonymous authentication
期刊论文
Information Sciences,2014, 卷号: 268, 页码: 447-457
作者:
Qin,Zhiguang
;
Xiong,Hu
;
Zhu,Guobin
;
Chen,Zhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2025/08/05
Anonymous authentication
Certificateless cryptography
Information security
Ring signature
Development and validation of instruments of information security deviant behavior
期刊论文
Decision Support Systems,2014, 卷号: 66, 页码: 93-101
作者:
Chu, Amanda M. Y.
;
Chau, Patrick Y. K.
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2023/05/19
Deviant behavior
Information security
Instrument development
Measurement
Reliability
Validity
New identity-based three-party authenticated key agreement protocol with provable security
期刊论文
Journal of Network and Computer Applications,2013, 卷号: 36, 期号: 2, 页码: 927-932
作者:
Xiong,Hu
;
Chen,Zhong
;
Li,Fagen
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2025/08/05
Authentication
Identity-based
Information security
Key agreement
Provable security
Three-party