浏览/检索结果:共3条,第1-3条

已选(0)清除 条数/页:   排序方式:
Information system security evaluation method based on FCME model 期刊论文
Jisuanji Gongcheng/Computer Engineering,2006, 卷号: 32, 期号: 2
作者:  Yan, Qiang;  Shu, Huaying;  Chen, Zhong;  Duan, Yunsuo
收藏  |  浏览/下载:28/0  |  提交时间:2025/08/05
A dynamic defense against denial of service in two-party security protocols 期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2005, 卷号: 42, 期号: 10, 页码: 1673-1678
作者:  Wei, Jianfan;  Duan, Yunsuo;  Tang, Liyong;  Chen, Zhong
收藏  |  浏览/下载:20/0  |  提交时间:2025/08/05
Analysis on combined security efficiency and vulnerability for information system security evaluation 期刊论文
Beijing Daxue Xuebao (Ziran Kexue Ban)/Acta Scientiarum Naturalium Universitatis Pekinensis,2005, 卷号: 41, 期号: 3, 页码: 484-490
作者:  Duan, Yunsuo;  Liu, Xin;  Chen, Zhong
收藏  |  浏览/下载:23/0  |  提交时间:2025/08/05