HACKING

作品数:42被引量:42H指数:4
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:王千田庆锋郑辉梁雪松徐君锋更多>>
相关机构:黄淮学院郑州大学西北工业大学清华大学更多>>
相关期刊:《Engineering》《Journal of Quantum Information Science》《创业邦》《Journal of Information Security》更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划教育部人文社会科学研究基金国家社会科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
A Fast Federated Learning-based Crypto-aggregation Scheme and Its Simulation Analysis
《系统仿真学报》2024年第12期2850-2870,共21页LüBoshen Song Xiao 
Beijing Natural Science Foundation (L233005);National Key Research and Development Program of China (2023YFB3308200)。
To solve the problem of increased computation and communication costs caused by using homomorphic encryption(HE) to protect all gradients in traditional cryptographic aggregation(cryptoaggregation) schemes,a fast cryp...
关键词:federated learning differential privacy homomorphic encryption inference attack hacking simulation 
Cyberattacks on the Maritime Sector:A Literature Review
《哈尔滨工程大学学报(英文版)》2024年第4期689-706,共18页Steve Symes Eddie Blanco-Davis Tony Graham Jin Wang Edward Shaw 
This study is an investigation into cyberattacks on autonomous vessels,focusing on previous“real-world”cyberattacks and their consequences.The future of commercial and noncommercial shipping is moving toward autonom...
关键词:Autonomous vessels CYBERSECURITY SURVIVABILITY Artificial intelligence HACKING 
A Review of Cybersecurity Challenges in Small Business: The Imperative for a Future Governance Framework
《Journal of Information Security》2024年第1期24-39,共16页Binita Saha Zahid Anwar 
Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, ...
关键词:ENTREPRENEURSHIP CYBERSECURITY Small and Medium Businesses Data Breach HACKING Security 
Mitigating cybersecurity risks in radiology-is it time to unmask vulnerabilities and fortify cyber defenses with ethical hacking?
《iRADIOLOGY》2024年第2期216-219,共4页Reuben Schmidt Lincoln J.Lim 
1.INTRODUCTION.The integration of technology in medicine,particularly in the field of radiology,has led to significant advancements in patient care and diagnosis.While this digital transformation of healthcare has bro...
关键词:computational science cybersecurity RADIOLOGY risks VULNERABILITIES 
Robust monitoring machine:a machine learning solution for out‑of‑sample R_(2)‑hacking in return predictability monitoring
《Financial Innovation》2023年第1期2701-2728,共28页James Yae Yang Luo 
The out-of-sample R^(2) is designed to measure forecasting performance without look-ahead bias.However,researchers can hack this performance metric even without multiple tests by constructing a prediction model using ...
关键词:Machine learning Out-of-sample R^(2)-hacking Return predictability MONITORING 
美国国防科技创新型人才培养的新模式——基于美国“国防开拓”项目的分析被引量:4
《科技管理研究》2023年第18期36-43,共8页田庆锋 李瑶 
国家自然科学基金应急管理项目“需求视角下典型行业创新型人才培养模式与路径研究”(72041011)。
国防科技创新型人才是构建国家战略科技力量的重要资源,但国内关于这类人才的研究不足,同时也缺乏对国外关于这类人才培养成功模式的研究,而美国的“国防开拓”(H4D)项目为培养国防科技创新型人才提供了全新模式,因此,在梳理H4D项目背...
关键词:国防科技创新型人才 Hacking for Defense 美国经验 国防人才培养 
Navigating the Quantum Threat Landscape: Addressing Classical Cybersecurity Challenges
《Journal of Quantum Information Science》2023年第2期56-77,共22页Sabina Sokol 
This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are dis...
关键词:Quantum Computing Post-Quantum Cryptography (PQC) Quantum Hacking CYBERSECURITY Internet of Things (IoT) Shor’s Algorithm Quantum Random Number Generators (QRNGs) Pseudorandom Number Generators (RNGs) Quantum Key Distribution (QKD) Symmetric Key Cryp-tography Asymmetric Key Cryptography 
Phishing website prediction using base and ensemble classifier techniques with cross-validation被引量:1
《Cybersecurity》2023年第1期17-39,共23页Anjaneya Awasthi Noopur Goel 
Internet or public internetwork has become a vulnerable place nowadays as there are so many threats available for the novice or careless users because there exist many types of tools and techniques being used by notor...
关键词:PHISHING HACKING Data diddling Machine learning ENSEMBLE 
Hacking Contests Offer Big Payouts for Exposing Security Flaws
《Engineering》2022年第10期10-12,共3页Mitch Leslie 
Like any competitor,Yueqi Chen was anxious as he awaited the chance to demonstrate his skill in public.It was the afternoon of 19May 2022,and Chen,then a visiting fellow in computer science at Northwestern University ...
关键词:CANADA COMPUTER VANCOUVER 
An anti-drone device based on capture technology被引量:1
《Biomimetic Intelligence & Robotics》2022年第3期43-49,共7页Yingzi Chen Zhiqing Li Longchuan Li Shugen Ma Fuchun Zhang Chao Fan 
This work was supported by the National Natural Science Founda-tion of China(Grant No.51935005).
In this paper,we design a device based on capture technology to solve the problems caused by hacking drones.We introduce the design,simulation,control scheme,and implementation of a capture device.A protective cover i...
关键词:Hacking drone Anti-drone Nondestructive Capture technology 
检索报告 对象比较 聚类工具 使用帮助 返回顶部