中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-8 of 8)

Items/Page:    Sort:
covert channel identification founded on information flow analysis [会议论文]
International Conference on Computational Intelligence and Security, Xian, PEOPLES R CHINA, DEC 15-19,
Shen JJ; Qing SH; Shen QN; Li LP
  |  
 
a computational approach for belief change [会议论文]
International Conference on Computational Intelligence and Security, Xian, PEOPLES R CHINA, DEC 15-19,
Luan SM; Dai GZ
  |  
 
optimization design of controller periods using evolution strategy [会议论文]
International Conference on Computational Intelligence and Security, Xian, PEOPLES R CHINA, DEC 15-19,
Jin H; Wang H; Wang HG; Dai GZ
  |  
 
incremental fuzzy decision tree-based network forensic system [会议论文]
International Conference on Computational Intelligence and Security, Xian, PEOPLES R CHINA, DEC 15-19,
Liu ZQ; Feng DG
  |  
 
an event correlation approach based on the combination of ihu and codebook [会议论文]
International Conference on Computational Intelligence and Security, Xian, PEOPLES R CHINA, DEC 15-19,
Zheng QH; Qian YT
  |  
 
on anonymity of group signatures [会议论文]
International Conference on Computational Intelligence and Security, Xian, PEOPLES R CHINA, DEC 15-19,
Zhou SJ; Lin DD
  |  
 
universal designated-verifier proxy blind signatures for e-commerce [会议论文]
International Conference on Computational Intelligence and Security, Xian, PEOPLES R CHINA, DEC 15-19,
Cao TJ; Lin DD; Xue R
  |  
 
error oracle attacks on several modes of operation [会议论文]
International Conference on Computational Intelligence and Security, Xian, PEOPLES R CHINA, DEC 15-19,
Wen FT; Wu WL; Wen QY
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace