CSpace

浏览/检索结果: 共4条,第1-4条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Information Security Protocol Based System Identification with Binary-Valued Observations 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2018, 卷号: 31, 期号: 4, 页码: 946-963
作者:  Xu, Changbao;  Zhao, Yanlong;  Zhang, Ji-Feng
收藏  |  浏览/下载:146/0  |  提交时间:2018/07/30
Cryptography  identification algorithm  information security  passive attacks  security protocol  time complexity  
Complex Cyber-Physical Networks: From Cybersecurity to Security Control 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2017, 卷号: 30, 期号: 1, 页码: 46-67
作者:  Wen Guanghui;  Yu Wenwu;  Yu Xinghuo;  Lue Jinhu
收藏  |  浏览/下载:118/0  |  提交时间:2018/07/30
Communication topology  complex cyber-physical network  cybersecurity  Internet of Things  secure control  
On algebraic immunity of trace inverse functions on finite fields of characteristic two 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2016, 卷号: 29, 期号: 1, 页码: 272-288
作者:  Feng Xiutao;  Gong Guang
收藏  |  浏览/下载:124/0  |  提交时间:2018/07/30
Algebraic immunity  boolean functions  fast algebraic attacks  trace inverse functions  
A Comprehensive Dea Approach for the Resource Allocation Problem based on Scale Economies Classification 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2008, 卷号: 21, 期号: 4, 页码: 540-557
作者:  Li, Xiaoya;  Cui, Jinchuan
收藏  |  浏览/下载:120/0  |  提交时间:2018/07/30
Common weights analysis (CWA)  date envelopment analysis (DEA)  decision making unit (DMU)  efficiency score  inverse DEA model  multiple-objective linear programming (MOLP)  resource allocation problem  returns to scale (RTS)