中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
数学与系统科学研究院 [3]
中国科学院大学 [2]
自动化研究所 [2]
软件研究所 [1]
昆明动物研究所 [1]
采集方式
OAI收割 [7]
iSwitch采集 [2]
内容类型
期刊论文 [8]
会议论文 [1]
发表日期
2023 [1]
2022 [1]
2018 [3]
2009 [2]
2007 [1]
2003 [1]
更多
学科主题
筛选
浏览/检索结果:
共9条,第1-9条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
发表日期升序
发表日期降序
Passive Attack Detection for a Class of Stealthy Intermittent Integrity Attacks
期刊论文
OAI收割
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 4, 页码: 898-915
作者:
Kangkang Zhang
;
Christodoulos Keliris
;
Thomas Parisini
;
Bin Jiang
;
Marios M. Polycarpou
  |  
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2023/03/22
Backward-in-time equivalent quantity
fixed-point smoother
intermittent integrity attacks
An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things
期刊论文
OAI收割
IEEE INTERNET OF THINGS JOURNAL, 2022, 卷号: 9, 期号: 9, 页码: 6790-6802
作者:
Li, Xiulan
;
Bi, Jingguo
;
Tian, Chengliang
;
Zhang, Hanlin
;
Yu, Jia
  |  
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2023/02/07
Outsourcing
Servers
Cryptography
Task analysis
Internet of Things
Cloud computing
Gold
Cloud computing
quadratic congruence equations
secure outsourcing
Information Security Protocol Based System Identification with Binary-Valued Observations
期刊论文
OAI收割
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2018, 卷号: 31, 期号: 4, 页码: 946-963
作者:
Xu, Changbao
;
Zhao, Yanlong
;
Zhang, Ji-Feng
  |  
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2018/07/30
Cryptography
identification algorithm
information security
passive attacks
security protocol
time complexity
informationsecurityprotocolbasedsystemidentificationwithbinaryvaluedobservations
期刊论文
OAI收割
journalofsystemsscienceandcomplexity, 2018, 卷号: 031, 期号: 004, 页码: 946
作者:
Xu Changbao
;
Zhao Yanlong
;
Zhang Jifeng
  |  
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/01/10
Resilient Control for Networked Control Systems Subject to Cyber/Physical Attacks
期刊论文
OAI收割
International Journal of Automation and Computing, 2018, 卷号: 15, 期号: 3, 页码: 345-354
作者:
Taouba Rhouma
;
Karim Chabir
;
Mohamed Naceur Abdelkrim
  |  
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2021/02/23
Networked control systems (NCSs)
cyber physical attacks
Kalman filtering
resilient control
anomaly detector.
Collision attacks with budget constraints on key management schemes for secure multimedia multicast
期刊论文
iSwitch采集
Ieee transactions on multimedia, 2009, 卷号: 11, 期号: 3, 页码: 556-561
作者:
Zhu, Wen Tao
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2019/05/10
Collision attack
Digital rights management
Key management
Multimedia multicast
Predation on giant flying squirrels (Petaurista philippensis) by black crested gibbons (Nomascus concolor jingdongensis) at Mt. Wuliang, Yunnan, China
期刊论文
OAI收割
PRIMATES, 2009, 卷号: 50, 期号: 1, 页码: 45-49
作者:
Fan PF
;
Jiang XL[*]
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2010/08/24
Food sharing
Meat eating
Nomascus concolor jingdongensis
Petaurista philippensis
Predation
Multi-agent cooperative intrusion response in mobile adhoc networks
期刊论文
iSwitch采集
Journal of systems engineering and electronics, 2007, 卷号: 18, 期号: 4, 页码: 785-794
作者:
Yi Ping
;
Zou Futai
;
Jiang Xinghao
;
Li Jianhua
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/05/10
Computer networks
Security
Mobile agent
Mobile adhoc networks
Intrusion detection
Intrusion response
making the key agreement protocol in mobile ad hoc network more efficient
会议论文
OAI收割
1st International Conference on Applied Cryptography and Network Security, KUNMING, PEOPLES R CHINA, OCT 16-19,
Yao G
;
Ren K
;
Bao F
;
Deng RH
;
Feng DG
  |  
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2011/07/29
mobile ad hoc networks
key agreement
hierarchical
security