您好,欢迎访问北京理工大学机构知识库!
所在位置: 首页 - 院系导航 - 软件学院
相关导航
按重要数据库分组
  • 任何
  • 42 SCIE
  • 314 EI工程索引(美)
  • 115 CA化学文摘(美)
  • 179 美国剑桥科学文摘
  • 10 CSSCI中文社科引文索引
  • 更多
按语种分组
  • 任何
  • 843 中文
  • 427 外文
按类型分组
  • 任何
  • 661 期刊
  • 311 学位论文
  • 294 会议论文
  • 更多
年代
  • 任何
  • 3 2024
  • 10 2023
  • 4 2022
  • 6 2021
  • 9 2020
  • 32 2019
  • 71 2018
  • 93 2017
  • 172 2016
  • 152 2015
  • 152 2014
  • 62 2013
  • 44 2012
  • 44 2011
  • 85 2010
  • 323 2000-2009
优秀人才
  • 任何
  • 2 学术称号
    • 2 973首席科学家
    • 2 长江学者
    • 2 杰出青年基金学者
  • 2 学术职务
    • 2 理事长
按来源刊物分组
  • 任何
  • 47 北京理工大学学报
  • 39 Beijing Lig…
  • 28 Lecture Not…
  • 20 计算机工程
  • 更多
基金
  • 任何
    • 93 国家自然科学基金项目
      • 1 国家自然科学基金重…
      • 92 国家自然科学基金
    • 31 省市基金项目
      • 1 海南省自然科学基金
      • 1 山东省自然科学基金
      • 3 河北省自然科学基金
      • 1 天津市自然科学基金
      • 1 湖南省教育科学规划…
      • 1 湖北省教育厅科研基金
      • 1 重庆市自然科学基金
      • 2 江西省自然科学基金
      • 1 北京市重点学科建设…
      • 1 江西省教育厅科技基金
      • 1 河南省基础与前沿技…
      • 1 安徽省自然科学基金
      • 1 山西省自然科学基金
      • 1 广东省科技计划基金
      • 1 山东省教育厅基金
      • 5 北京市自然科学基金
      • 2 北京市教委科技发展…
      • 2 广东省自然科学基金
      • 2 北京市科技新星项目
      • 2 四川省教育厅基金
      ... 隐藏
    • 30 国家教育部基金
      • 4 霍英东教育基金
      • 1 教育部人文社会科学…
      • 1 中央高校基本科研业…
      • 1 教育部长江学者和创…
      • 2 国家教育部留学回国…
      • 20 高等学校博士学科点…
      • 1 教育部新世纪优秀人…
      ... 隐藏
    • 21 科技部国家科技计划项目
      • 9 国家高技术研究发展…
      • 4 国家重点基础研究发…
      • 1 科技部基础性工作专项
      • 5 国家科技支撑计划
      • 2 国家科技部博士后基金
    • 15 其他基金项目
      • 1 北京工业大学博士启…
      • 7 北京理工大学基础研…
      • 7 北京理工大学优秀青…
  • 更多
学院简介:成果数量:1270

[详细]

本院科研趋势: 发文数量 期刊收录
条数据
导出

作者: Ma, R.;Zhu, T.;Hu, C.;Shan, C.;Zhao, X. (Beijing Key Laboratory of Software Security Engineering Technology, School of Software, Beijing Institute of Technology, Beijing, China)

出处: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2017 Vol.10394 P359-372

关键词: Finite state machine;Fuzzer;Stateful network protocol;Vulnerability discovering

摘要: Fuzzing has become one of the most important technologies in the field of network security, and fuzzer also has become an important tool for discoveri ...

作者: Wang, Y (Wang, Yong)1;Jiang, CY (Jiang, Chenyang)1;Cheng, JB (Cheng, Jinbiao)1;Wang, XQ (Wang, Xiaoqun)2; (School of Software, Beijing Institute of Technology, Beijing;100081, China Institute of Biophysics, Chinese Academy of Sciences, Beijing;100101, China)

出处: Advances in Intelligent Systems and Computing 2017 Vol.455 P453-461

关键词: ASSOCIATIONS

摘要: Finding key genes associated with diseases is an essential problem of disease diagnosis and treatment, and drug design. Bioinformatics takes advantage ...

作者: Xie Tong1;Wu Lei2; (School of Software, Beijing Institute of Technology Software Quality Engineering Research Centre, The Fifth Electronic Research Institute of MIIT)

出处: MATEC Web of Conferences 2017 Vol.100 P2011

摘要: For decades, industry robotics have delivered on the promise of speed, efficiency and productivity. The last several years have seen a sharp resurgenc ...

作者: Ma, R.1;Chen, S.1;Ma, K.2;Hu, C.1;Wang, X.1; (1Beijing Key Laboratory of Software Security Engineering Technology, School of Software, Beijing Institute of Technology, Beijing, China;2Internet Center, Institute of Communication Standard Research, China Academy of Information and Communication Technology, Beijing, China)

出处: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2017 Vol.10394 P413-426

关键词: Defense;Monitoring neighbor node;Node location information;Wireless sensor networks;Wormhole attack

摘要: Based on analyzing the characteristics of wormhole attacks in the wireless sensor networks, this paper proposes two kinds of defense strategies, which ...

作者: LIU CHUANLU1,2;LV GUOHUA2;DONG XIANGJUN2; (d-xj@163.com);YUAN HANNING1; (yhn6@bit.edu.cn);DONG XUE3; (1Beijing Institute of Technology, School of Software, Beijing 100081, China. ;2Qilu University of Technology, School of Information, Jinan 250353, China. ;3Jinan University, Science of Information and Computing, Jinan 250353, China.)

出处: Journal of Residuals Science & Technology 2017 Vol.14 No.1 P407-419

摘要: Positive and negative sequential patterns (PNSP) play an informative role in various applications. In this paper, a new method is proposed to effectiv ...

作者: Xiao-lin ZHAO,Yi-man ZHANG,Hang YA,Xian-hua ZHANG,Yi-ning YANG (School of Software, Beijing Institute of Technology;Beijing Aerospace Control Center)

出处: 2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS2017) 中国北京 2017

会议录: Proceedings of 2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS2017)

摘要: Recently, network security is more and more important and the network security measure is the premise to build a robust and secure network. However, t ...

作者: Xiao-lin ZHAO,Quan-bao CHEN,Jia-tong GAO,Xian-hua ZHANG,Jian-yang DING (School of Software, Beijing Institute of Technology;Beijing Aerospace Control Center)

出处: 2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS2017) 中国北京 2017

会议录: Proceedings of 2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS2017)

摘要: Recently, the software has been developed increasingly. It is more and more difficult to find software vulnerabilities. Therefore, this paper proposes ...

[外文期刊] Robots-aided participatory crowdsourcing with limited task budget

作者: Zhang, Bo;Liu, Chi Harold;Zhang, Zheng;Ren, Ziyu;Ma, Jian;Wang, Wendong (State Key Lab of Networking and Switching Technology, Beijing University of Posts and Telecom, China School of Software, Beijing Institute of Technology, China School of Information Science and Technology, Tsinghua University, China)

出处: IEEE Vehicular Technology Conference 2017

摘要: Participatory Crowdsourcing System (PCS) is now an important source of information for big data applications. In PCS, required environmental parameter ...

作者: Wang, Y (Wang, Yong)1;Wei, LX (Wei, Longxing)1;Tong, XM (Tong, Xuemin)1;Zhao, XL (Zhao, Xiaolin)1;Li, M (Li, Ming)2; (School of Software, Beijing Institute of Technology, Beijing;100081, China MPS Information Classified Security Protection Evaluation Center, Third Research Institute of Ministry of Public Security, Shanghai;200031, China)

出处: Advances in Intelligent Systems and Computing 2017 Vol.455 P463-472

摘要: CP-ABE (Cipher-text Policy Attribute Based Encryption) can help providing reliable, fine-grained access control in untrusted cloud storage environment ...

作者: Ming Li,Zhikang Piao,Yong Wang (The Third Research Institute of the Ministry of Public Security;58 Corp;School of Software, Beijing Institute of Technology)

出处: 2017 3rd Workshop on Advanced Research and Technology in Industry Applications(WARTIA 2017) 中国广西桂林 2017

会议录: Proceedings of 2017 3rd Workshop on Advanced Research and Technology in Industry Applications(WARTIA 2017)

摘要: Nowadays, smart phones have converted the people’s life style; convenience of the application has a big impact on all aspects of necessities. Consider ...

软件学院简介