全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Daniel G. Arce
来源:[J].Computers & Security(IF 1.158), 2020, Vol.93
摘要:Abstract(#br)Cloud computing services are examples of platforms in the classic sense of the economics of two-sided markets. In particular, indirect externalities arise in the cloud from connecting users with developers of complementary products or services. The premise investigat...
作者:Addie Cormier , Christopher Ng
来源:[J].Journal of Loss Prevention in the Process Industries(IF 1.15), 2020, Vol.64
摘要:Abstract(#br)As operational and information technologies converge to allow for remote and real-time access to plant operating data and control functions, the process industry could become increasingly susceptible to cyber-attacks. Traditional hazard and risk analysis methods appe...
作者:Siyang Xu , Xin Song , Zhigang Xie ...
来源:[J].Physical Communication, 2020, Vol.40
摘要:Abstract(#br)In this paper, we investigate the physical layer security (PLS) of an energy harvesting (EH) cooperative network with the destination self-protection mechanism. More specifically, we consider a cooperative transmission scenario in which a source communicates with a d...
作者:Jin Zhang , Jingyue Li
来源:[J].Information and Software Technology(IF 1.522), 2020, Vol.123
摘要:Abstract(#br)Context: Neural Network (NN) algorithms have been successfully adopted in a number of Safety-Critical Cyber-Physical Systems (SCCPSs). Testing and Verification (T&V) of NN-based control software in safety-critical domains are gaining interest and attention from both ...
作者:Frank Luh , Yun Yen
来源:[J].Trends in Biotechnology(IF 9.66), 2020
摘要:Technology offers opportunities to revolutionize medicine and research but can threaten privacy and patient confidentiality. As the scale of patient data explodes, the safety and integrity of medical information are increasingly at stake. We highlight security and privacy issues ...
作者:Angsheng Li , Qifu Hu , Jun Liu ...
来源:[J].Scientific Reports(IF 2.927), 2016, Vol.6 (1), pp.412-413
摘要:Abstract(#br)Recently, Li and Pan defined the metric of the K -dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K -dimensional structure [inline-graphic not available: see fulltext] of G that is evolved by the ...
作者:Santiago Gil , Alexander Kott , Albert-László Barabási
来源:[J].Scientific Reports(IF 2.927), 2014, Vol.4 (1), pp.719-731
摘要:Abstract(#br)While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data i...
作者:Wang Hong , Li Jianhua , Lai Chengzhe ...
来源:[J].Peer-to-Peer Networking and Applications(IF 0.365), 2020, Vol.13 (2), pp.53-63
摘要:Abstract(#br)Providing integrity, non-repudiation and validity for transmitted data is always very attractive in unmanned aerial vehicle cluster networks (UAVCN). Currently, “one by one” data authentication schemes with expensive computations can hardly be applied to a fast ...
作者:D. Praveena , P. Rangarajan
来源:[J].Multimedia Tools and Applications: An International Journal(IF 1.014), 2020, Vol.79 (12), pp.5161-5173
摘要:Abstract(#br)Cloud computing facilitates the enormous support of the public, business and emerging applications such as healthcare and nature disasters. Based on their services and characteristics, it can be classified as private cloud and public cloud. In this scenario, we need ...
作者:Khuong Ho-Van , Thiem Do-Dac
来源:[J].Wireless Personal Communications: An International Journal(IF 0.428), 2020, Vol.110 (12), pp.829-846
摘要:Abstract(#br)An unlicensed relay is located between an unlicensed sender and an unlicensed recipient for securing the sender’s message against a wire-tapper in underlay cognitive networks when the sender–recipient channel is inaccessible. The energy in the sender’s sign...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×