×
验证码:
换一张
忘记密码?
记住我
×
登录
中文
|
English
学校主页
|
图书馆
登录
注册
首页
学术成果
学院
学者
数据分析
检索
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
原始文献类型
收录类别
出版者
状态
学院
理工科技学院
1
个人在本单位外知识产出
7
作者
王田
3
王庆国
1
吴盖宇
1
贾维嘉
1
孟天晖
1
文献类型
期刊论文
5
会议论文
2
著作章节
1
发表日期
2021
1
2020
1
2019
1
2018
2
2015
1
2013
1
更多...
语种
英语English
7
收录类别
SCIE
3
CPCI-S
1
资助机构
关键词
Security
2
9/11 attack, vulnerabilitie...
1
Application of internationa...
1
Attack detection
1
Attack model
1
Compromised information inj...
1
更多...
出处
Computer Journal
1
ISA Transactions
1
Jisuanji Yanjiu yu Fazhan/C...
1
Journal of Information and ...
1
Lecture Notes in Computer S...
1
Lecture Notes of the Instit...
1
更多...
资助项目
×
知识图谱
反馈留言
浏览/检索结果:共8条,第1-8条
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
作者升序
作者降序
期刊影响因子升序
期刊影响因子降序
题名升序
题名降序
提交时间升序
提交时间降序
WOS被引频次升序
WOS被引频次降序
A survey on attack detection, estimation and control of industrial cyber–physical systems
期刊论文
ISA Transactions,2021, 卷号: 116, 页码: 1-16
作者:
Zhang, Dan
;
Wang, Qingguo
;
Feng, Gang
;
Shi, Yang
;
Vasilakos, Athanasios V.
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2021/04/23
Attack detection
Cyber–physical systems
Deception attack
DoS attack
Secure control
Secure estimation
Security
Secure Computing Resource Allocation Framework for Open Fog Computing
期刊论文
Computer Journal,2020, 卷号: 63, 期号: 4, 页码: 567-592
作者:
Jiang, Jiafu
;
Tang, Linyu
;
Gu, Ke
;
Jia, WeiJia
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2021/05/10
attack
audit
cloud computing
computing resource allocation
fog computing
security requirement
Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid
会议论文
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Niagara Falls, U.S.A., JUL 11, 2018
作者:
Bhuiyan, Md Zakirul Alam
;
Zaman, Mdaliuz
;
Wang, Guojun
;
Wang, Tian
;
Rahman, Md Arafat
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2021/12/02
Compromised information injection
Demand response
Internet of Things (IoT)
Privacy
Security attack
Smart grid
A secure and cost-efficient offloading policy for Mobile Cloud Computing against timing attacks
期刊论文
Pervasive and Mobile Computing,2018, 卷号: 45, 页码: 4-18
作者:
Meng, Tianhui
;
Wolter, Katinka
;
Wu, Huaming
;
Wang, Qiushi
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2025/02/20
Computation offloading
Mobile Cloud Computing
Security
Side-channel attack
Investigation on unauthorized human activity watching through leveraging Wi-Fi signals
会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Melbourne, AUSTRALIA, DEC 11-13, 2018
作者:
Bhuiyan, Md Zakirul Alam
;
Islam, Md Monirul
;
Wang, Guojun
;
Wang, Tian
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2021/12/02
Risk
Signal compromise
Unauthorized human activity monitoring
Wi-Fi based security attack
Wi-Fi signals
A blind detection model for tracing back a single-packet from mixed traffic by determining parameters of features' windows
期刊论文
Journal of Information and Computational Science,2015, 卷号: 12, 期号: 16, 页码: 6209-6218
作者:
Chen, Xin
;
Chen, Yonghong
;
Tian, Hui
;
Wang, Tian
;
Cai, Yiqiao
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2021/12/02
DDoS attack
Mixed traffic
Network security
Single-packet IP traceback
Analysis and design of distance-bounding protocols for RFID
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2013, 卷号: 50, 期号: 11, 页码: 2358-2366
作者:
Xin,Wei
;
Sun,Huiping
;
Chen,Zhong
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2025/08/05
Attack model
Distance bounding protocol
Relay attack
RFID
Security and privacy
Port Security: The ISPS Code
著作章节
出自: The Blackwell Companion to Maritime Economics, UK:Wiley-Blackwell, 2012, 页码: 674-700
作者:
Ng, Adolf K.Y.
;
Vaggelas, George K.
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2021/05/27
9/11 attack, vulnerabilities in transportation
Application of international guidelines locally, lacking
Global trade system, disruption
ISPS code and obligations of ports
New " securitized port environment"
Port of hong kong, three-tiered security levels
Port security
Port security, and counter-terrorism
Ports, intermodal logistical supply