中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [8]
信息安全国家重点实验... [7]
计算机科学国家重点实... [2]
基础软件国家工程研究... [2]
综合信息系统技术国家... [1]
更多...
作者
Content Type
会议论文 [13]
期刊论文 [8]
Issued Date
Language
中文 [6]
英语 [6]
Source
lecture no... [9]
电子学报 [2]
hp laborat... [1]
internatio... [1]
lecture no... [1]
更多...
Project
Indexed
EI [15]
ISTP [2]
SCI [2]
CNKI,EI,CS... [1]
EI,WANFANG... [1]
更多...
Spnsorship
icst [1]
ieee relia... [1]
state key ... [1]
state key ... [1]
the nation... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 21)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
a novel security scheme for online banking based on virtual machine
[会议论文]
2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012, Gaithersburg, MD, United states, June 20, 2012 - June 22, 2012
Guan Bei
;
Wu Yanjun
;
Wang Yongji
cryptanalysis of a three-party password-based authenticated key exchange protocol using weil pairing
[期刊论文]
International Journal of Electronic Security and Digital Forensics, 2012-01-01, 卷号: 4, 期号: 4, 页码: 244-251
He Debiao
;
Chen Jianhua
基于动态污点分析的恶意代码通信协议逆向分析方法
[期刊论文]
电子学报, 2012-01-01, 卷号: 40, 期号: 4, 页码: 661-668
刘豫
;
王明华
;
苏璞睿
;
冯登国
  |  
analysis of telephone call detail records based on fuzzy decision tree
[会议论文]
3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, Shanghai, China, November 1
Ding Liping
;
Gu Jian
;
Wang Yongji
;
Wu Jingzheng
depsim: a dependency-based malware similarity comparison system
[会议论文]
6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Shanghai, China, 20-Oct
Yi Yang
;
Lingyun Ying
;
Rui Wang
;
Purui Su
;
Dengguo Feng
  |  
gateway-oriented password-authenticated key exchange protocol with stronger security
[会议论文]
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Wei Fushan
;
Ma Chuangui
;
Zhang Zhenfeng
  |  
面向服务的舰船导弹防御及服务扰动建模
[期刊论文]
系统工程与电子技术, 2010-01-01, 卷号: 32, 期号: 4, 页码: 791-794,811
邓勇
;
胡晓惠
;
张中兆
  |  
基于复用计算的大纹理实时合成
[期刊论文]
计算机学报, 2010-01-01, 卷号: 33, 期号: 4, 页码: 768-775
陈昕
;
王文成
  |  
基于动态对等网层次结构的网络预警模型研究
[期刊论文]
计算机研究与发展, 2010-01-01, 卷号: 47, 期号: 9, 页码: 1574-1586
许佳
;
冯登国
;
苏璞睿
  |  
topic modeling for sequences of temporal activities
[会议论文]
topic modeling for sequences of temporal activities, 北京, 2010
Shen Zhi-Yong
;
Luo Ping
;
Xiong Yuhong
;
Sun Jun
;
Shen Yi-Dong
  |  
1
2
3
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace