您好,欢迎访问北京理工大学机构知识库!
所在位置: 首页 - 院系导航 - 软件学院
相关导航
按重要数据库分组
  • 任何
  • 42 SCIE
  • 314 EI工程索引(美)
  • 115 CA化学文摘(美)
  • 179 美国剑桥科学文摘
  • 10 CSSCI中文社科引文索引
  • 更多
按语种分组
  • 任何
  • 843 中文
  • 427 外文
按类型分组
  • 任何
  • 661 期刊
  • 311 学位论文
  • 294 会议论文
  • 更多
年代
  • 任何
  • 3 2024
  • 10 2023
  • 4 2022
  • 6 2021
  • 9 2020
  • 32 2019
  • 71 2018
  • 93 2017
  • 172 2016
  • 152 2015
  • 152 2014
  • 62 2013
  • 44 2012
  • 44 2011
  • 85 2010
  • 323 2000-2009
优秀人才
  • 任何
  • 2 学术称号
    • 2 973首席科学家
    • 2 长江学者
    • 2 杰出青年基金学者
  • 2 学术职务
    • 2 理事长
按来源刊物分组
  • 任何
  • 47 北京理工大学学报
  • 39 Beijing Lig…
  • 28 Lecture Not…
  • 20 计算机工程
  • 更多
基金
  • 任何
    • 93 国家自然科学基金项目
      • 1 国家自然科学基金重…
      • 92 国家自然科学基金
    • 31 省市基金项目
      • 1 海南省自然科学基金
      • 1 山东省自然科学基金
      • 3 河北省自然科学基金
      • 1 天津市自然科学基金
      • 1 湖南省教育科学规划…
      • 1 湖北省教育厅科研基金
      • 1 重庆市自然科学基金
      • 2 江西省自然科学基金
      • 1 北京市重点学科建设…
      • 1 江西省教育厅科技基金
      • 1 河南省基础与前沿技…
      • 1 安徽省自然科学基金
      • 1 山西省自然科学基金
      • 1 广东省科技计划基金
      • 1 山东省教育厅基金
      • 5 北京市自然科学基金
      • 2 北京市教委科技发展…
      • 2 广东省自然科学基金
      • 2 北京市科技新星项目
      • 2 四川省教育厅基金
      ... 隐藏
    • 30 国家教育部基金
      • 4 霍英东教育基金
      • 1 教育部人文社会科学…
      • 1 中央高校基本科研业…
      • 1 教育部长江学者和创…
      • 2 国家教育部留学回国…
      • 20 高等学校博士学科点…
      • 1 教育部新世纪优秀人…
      ... 隐藏
    • 21 科技部国家科技计划项目
      • 9 国家高技术研究发展…
      • 4 国家重点基础研究发…
      • 1 科技部基础性工作专项
      • 5 国家科技支撑计划
      • 2 国家科技部博士后基金
    • 15 其他基金项目
      • 1 北京工业大学博士启…
      • 7 北京理工大学基础研…
      • 7 北京理工大学优秀青…
  • 更多
学院简介:成果数量:1270

[详细]

本院科研趋势: 发文数量 期刊收录
条数据
导出

作者: Rui Ma,Shuaimin Ren,Ke Ma,Changzhen Hu,Jingfeng Xue (the Beijing Key Laboratory of Software Security Engineering Technology,School of Software,Beijing Institute of Technology;the Internet Center,Institute of Communication Standard Research,China Academy of Information and Communication Technology)

出处: Tsinghua Science and Technology 2017 第22卷 第5期 P458-468

关键词: 测试用例生成;网络协议;状态转换;模糊测试;扩展有限状态机;测试序列;有效算法;变异操作

摘要: Network protocols are divided into stateless and stateful.Stateful network protocols have complex communication interactions and state transitions.How ...

作者: Zheng, Y.;Lv, K.;Hu, C. (School of Software, Beijing Institute of Technology, Beijing, China)

出处: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2017 Vol.10394 P349-358

关键词: Attack graph;Network security;Risk judgement;Vulnerability

摘要: With the rapid development of network, network security issues become increasingly important. It is a tough challenge to evaluate the network security ...

作者: Dong, Y.;Liu, Z.;Yan, Y.;Wang, Y.;Peng, T.;Zhang, J. (School of Software, Beijing Institute of Technology, Beijing, China)

出处: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2017 Vol.10394 P386-398

关键词: Analyzing malware;Association analysis;Classification;Clustering;Machine learning

摘要: The Internet has become an indispensable part of people’s work and life. It provides favorable communication conditions for malwares. Therefore, malwa ...

作者: XiaoLin Zhao1;Quanbao Chen1;Chun Shan1;Ting Wang1;Yiman Zhang1; (School of Software, Beijing Institute of Technology, Beijing 100081, China;School of Software, Beijing Institute of Technology, Beijing 100081, China;School of Software, Beijing Institute of Technology, Beijing 100081, China;School of Software, Beijing Institute of Technology, Beijing 100081, China;School of Software, Beijing Institute of Technology, Beijing 100081, China)

出处: Journal of Physics: Conference Series 2017 Vol.887 Conference 1 P012071

摘要: It is extremely important for the study of software behavior modeling for software security research. This article determines whether the security of ...

作者: Zhao, Xiaolin1;Xue, Jingfeng1;Zhang, Yiman1;Zhang, Qi1; (1School of Software, Beijing Institute of Technology, Beijing, 100081, China)

出处: Frontiers in Artificial Intelligence and Applications 2017 Vol.299 P494-510

关键词: Collaborative;Complex network;Network security;Software metrics

摘要: The traditional and mainstream method to study the software system with the complex network is building a collaborative network of the software system ...

作者: Yang, Shucheng;Yang, Yichuan;Miao, Xinyu (School of Software, Beijing Institute of Technology, Beijing;100081, China)

出处: ACM International Conference Proceeding Series 2017 P38-43

摘要: Restaurant recommended software has been a lot, but for many people have not yet dinner, more than dinner to consider not only everyone\'s preferences ...

作者: Chen, Y.1;Lv, K.2;Hu, C.2; (1School of Computer and Information Engineering, Henan University, Kaifeng, China;2School of Software, Beijing Institute of Technology, Beijing, China)

出处: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2017 Vol.10394 P399-412

关键词: Attack graph;Optimal attack path;Supervised Kohonen neural network

摘要: Attack graph is a general paradigm to model the weakness of an information system network and all possible attack sequences that attackers can obtain ...

作者: Jiehao Chen,Ziqian Zhao,Jiyun Shi,Chong Zhao (School of Software, Beijing Institute of Technology)

出处: 2017 IEEE 第2届先进信息技术,电子与自动化控制国际会议(IAEAC 2017) 中国重庆 2017

会议录: Proceedings of 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC 2017)

关键词: Top-N;Recommendation;Timeliness;recent;Feedback;Learning;to;Rank;Online;Learning

摘要: Currently, the research on recommend system has drawn intensive attention from many researchers. However, it is still a concerned focus to make accura ...

作者: Peng Li (School of Software Beijing Institute of Technology)

出处: 2017 IEEE 8th International Conference on Software Engineering and Service Science 中国北京 2017

会议录: Proceedings of 2017 IEEE 8th International Conference on Software Engineering and Service Science

摘要: Object-Relational Mapping(ORM) is often used between tiers in a Web-based system to automate the persistence of data to secondary storage. ORMs work b ...

作者: Xiao-Jun Xu,Jin-Song Bao,Bin Yao,Member CCF ACM IEEE Jing-Yu Zhou,Fei-Long Tang,Member CCF ACM IEEE Min-Yi Guo,Senior Member IEEE Member CCF ACM Jian-Qiu Xu (School of Software, Beijing Institute of Technology, Beijing 100081, China;College of Mechanical Engineering, Donghua University, Shanghai 200051, China;Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, Shanghai 200240, China;College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China)

出处: 计算机科学技术学报(英文版) 2017 第32卷 第1期 P155-167

关键词: reverse;furthest;neighbor;road;network;landmark;hierarchical;partition

摘要: Given a road network G=(V, E), where V (E) denotes the set of vertices(edges) in G, a set of points of interest P and a query point q residing in G, t ...

软件学院简介