Information flow-based integrity protection model

被引:0
|
作者
Qiu, Gang [1 ]
Wang, Yulei [2 ]
Zhang, Xingang [3 ]
Deng, Miaolei [4 ]
机构
[1] The CNIS Key Laboratory of the Education Ministry, Xidian University, Xi'an 710071, China
[2] Network Information Center, Nanyang Institute of Technology, Nanyang 473004, Henan, China
[3] College of Computer and Information Technology, Nanyang Normal Universuity, Nanyang 473061, Henan, China
[4] Institute of Science, PLA Information Engineering University, Zhengzhou 450001, China
来源
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition) | 2010年 / 38卷 / 12期
关键词
721.1 Computer Theory; Includes Formal Logic; Automata Theory; Switching Theory; Programming Theory - 723 Computer Software; Data Handling and Applications - 723.2 Data Processing and Image Processing;
D O I
暂无
中图分类号
学科分类号
摘要
10
引用
收藏
页码:69 / 72
相关论文
共 50 条
  • [1] A flow-based corporate credit model
    Chen T.-K.
    Liao H.-H.
    Lu C.-W.
    Review of Quantitative Finance and Accounting, 2011, 36 (4) : 517 - 532
  • [2] INVESTIGATION OF THE FLOW-BASED FAST REROUTE MODEL WITH IMPLEMENTATION OF A MULTIMEDIA QUALITY PROTECTION SCHEME
    Lemeshko, O.
    Yevdokymenko, M.
    Yeremenko, O.
    Kunicina, N.
    Ziravecka, A.
    LATVIAN JOURNAL OF PHYSICS AND TECHNICAL SCIENCES, 2021, 58 (06) : 46 - 60
  • [3] Flow-based Model of Hierarchical Multicast Routing
    Nevzorova, Olena
    Arous, Kinan
    Hailan, Ahmad
    2015 SECOND INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T 2015), 2015, : 50 - 53
  • [4] A flow-based model for Internet backbone traffic
    Barakat, C
    Thiran, P
    Iannaccone, G
    Diot, C
    Owezarski, P
    IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, 2002, : 35 - 47
  • [5] Hybrid Control Model for Flow-based Networks
    Othman, Othman M. M.
    Okamura, Koji
    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 765 - 770
  • [6] Flow-based model of computer hackers' motivation
    Voiskounsky, AE
    Smyslova, OV
    CYBERPSYCHOLOGY & BEHAVIOR, 2003, 6 (02): : 171 - 180
  • [7] Information essential for characterizing a flow-based analytical system.
    Arruda, MAZ
    Collins, CH
    QUIMICA NOVA, 2005, 28 (04): : 739 - 742
  • [8] Information flow-based fuzzy cognitive maps with enhanced interpretability
    Marios Tyrovolas
    X. San Liang
    Chrysostomos Stylios
    Granular Computing, 2023, 8 : 2021 - 2038
  • [9] FIGCI: Flow-Based Information-Geometric Causal Inference
    Zhang, Shengyuan
    Wu, Jingyu
    Li, Zejian
    Liu, Li
    Liao, Jun
    Sun, Lingyun
    ARTIFICIAL INTELLIGENCE, CICAI 2022, PT II, 2022, 13605 : 520 - 531
  • [10] Information flow-based fuzzy cognitive maps with enhanced interpretability
    Tyrovolas, Marios
    Liang, X. San
    Stylios, Chrysostomos
    GRANULAR COMPUTING, 2023, 8 (06) : 2021 - 2038