咨询与建议

限定检索结果

文献类型

  • 4,788 篇 会议
  • 146 册 图书

馆藏范围

  • 4,934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,239 篇 工学
    • 1,743 篇 计算机科学与技术...
    • 1,549 篇 信息与通信工程
    • 941 篇 电气工程
    • 14 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 仪器科学与技术
    • 4 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 2 篇 动力工程及工程热...
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 环境科学与工程(可...
  • 92 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 9 篇 理学
    • 9 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
  • 3 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学

主题

  • 479 篇 bandwidth
  • 396 篇 delay
  • 384 篇 computer science
  • 367 篇 routing
  • 337 篇 throughput
  • 334 篇 quality of servi...
  • 315 篇 protocols
  • 302 篇 telecommunicatio...
  • 278 篇 internet
  • 268 篇 wireless sensor ...
  • 260 篇 traffic control
  • 234 篇 network topology
  • 225 篇 ip networks
  • 222 篇 routing protocol...
  • 205 篇 intelligent netw...
  • 199 篇 computer network...
  • 188 篇 ad hoc networks
  • 181 篇 costs
  • 171 篇 switches
  • 145 篇 performance anal...

机构

  • 19 篇 department of co...
  • 15 篇 chinese acad sci...
  • 14 篇 temple univ dept...
  • 13 篇 univ calif santa...
  • 13 篇 tsinghua univ de...
  • 12 篇 palo alto resear...
  • 11 篇 univ texas dept ...
  • 10 篇 nanjing univ sta...
  • 10 篇 computer enginee...
  • 10 篇 department of el...
  • 10 篇 department of el...
  • 10 篇 department of co...
  • 10 篇 univ massachuset...
  • 9 篇 iowa state univ ...
  • 9 篇 univ notre dame ...
  • 9 篇 penn state univ ...
  • 8 篇 georgia state un...
  • 8 篇 univ chinese aca...
  • 8 篇 department of co...
  • 8 篇 school of comput...

作者

  • 19 篇 wu jie
  • 19 篇 shen haiying
  • 16 篇 j.j. garcia-luna...
  • 14 篇 zaigham mahmood
  • 11 篇 haiying shen
  • 11 篇 garcia-luna-acev...
  • 10 篇 jie wu
  • 10 篇 garcia-luna-acev...
  • 10 篇 dharm singh jat
  • 10 篇 wolf tilman
  • 10 篇 tilman wolf
  • 9 篇 jianping wu
  • 9 篇 j. j. garcia-lun...
  • 9 篇 k. makki
  • 8 篇 m. gerla
  • 8 篇 chunming qiao
  • 8 篇 j. harms
  • 8 篇 yu wei
  • 8 篇 choi baek-young
  • 8 篇 yang yy

语言

  • 4,903 篇 英文
  • 30 篇 中文
  • 1 篇 其他
检索条件"丛书名=Computer Communications and Networks"
4934 条 记 录,以下是121-130 订阅
排序:
Socially-aware Collaborative Defense System against Bit-Flip Attack in Social Internet of Things and Its Online Assignment Optimization  31
Socially-aware Collaborative Defense System against Bit-Flip...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Yang, Li-Hsing Huang, Shin-Shan Cheng, Tsai-Ling Kuo, Yi-Ching Kuo, Jian-Jhih Natl Chung Cheng Univ Dept Comp Sci & Informat Engn Chiayi Taiwan
A powerful Bit-Flip Attack (BFA), based on Row Hammer Attack (RHA), can precisely flip the most vulnerable bits in the memory system (i.e., DRAM) to crash Convolutional Neural networks (CNNs) run on Internet-of-Things... 详细信息
来源: 评论
VeriBlock: A Blockchain-Based Verifiable Trust Management Architecture with Provable Interactions  31
VeriBlock: A Blockchain-Based Verifiable Trust Management Ar...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Pal, Shantanu Hill, Ambrose Rabehaj, Tahiry Hitchens, Michael Queensland Univ Technol Sch Comp Sci Brisbane Qld 4000 Australia Meadow Labs Brisbane Qld 4000 Australia Risk Frontiers Sydney NSW 2065 Australia Macquarie Univ Sch Comp Sydney NSW 2109 Australia
There has been considerable advancement in the use of blockchain for trust management in large-scale dynamic systems. In such systems, blockchain is mainly used to store the trust score or trust-related information of... 详细信息
来源: 评论
Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems  31
Security of Machine Learning-Based Anomaly Detection in Cybe...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Jadidi, Zahra Pal, Shantanu Nayak, Nithesh K. Selvakkumar, Arawinkumaar Chang, Chih-Chia Beheshti, Maedeh Jolfaei, Alireza Queensland Univ Technol Sch Comp Sci Brisbane Qld 4000 Australia Crit Path Inst Tucson AZ 85718 USA Macquarie Univ Sch Comp Sci Sydney NSW 2109 Australia
With the emergence of the Internet of Things (IoT) and Artificial Intelligence (AI) services and applications in the Cyber Physical Systems (CPS), the methods of protecting CPS against cyber threats is becoming more a... 详细信息
来源: 评论
Graph Representation of computer Network Resources for Precise Allocations  31
Graph Representation of Computer Network Resources for Preci...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Baxley, Stuart Gurkan, Deniz Validi, Hamidreza Hicks, Illya Univ Houston Dept Comp Sci Houston TX 77004 USA Univ Houston Dept Engn Technol Houston TX 77004 USA Rice Univ Dept Computat & Appl Math Houston TX USA
Distributed networked systems form an essential resource for computation and applications ranging from commercial, military, scientific, and research communities. Allocation of resources on a given infrastructure is r... 详细信息
来源: 评论
Mobility-aware Software-Defined Service-Centric Networking  31
Mobility-aware Software-Defined Service-Centric Networking
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Rodrigues, Diego O. Braun, Torsten Maia, Guilherme Villas, Leandro Univ Estadual Campinas Inst Comp Campinas SP Brazil Univ Bern Inst Comp Sci Bern Switzerland Univ Fed Minas Gerais Dept Comp Sci Belo Horizonte MG Brazil
Future Internet applications, such as the vehicular use cases, impose requirements that challenge current networking paradigms. Hence, other networking paradigms have been proposed, such as Software-Defined Networking... 详细信息
来源: 评论
Evolved IoT Malware Detection using Opcode Category Sequence through Machine Learning  31
Evolved IoT Malware Detection using Opcode Category Sequence...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Moon, Sunghyun Kim, Youngho Lee, Hyunjong Kim, Donghoon Hwang, Doosung Dankook Univ Yongin South Korea GI VITA Seoul South Korea KSign Seoul South Korea Arkansas State Univ Jonesboro AR USA
IoT devices are being exploited as entry points for cyberattacks due to security weaknesses. IoT malware variants have evolved as a result of vulnerabilities in IoT devices. This study investigates whether IoT malware... 详细信息
来源: 评论
ADIperf: A Framework for Application-driven IoT Network Performance Evaluation  31
ADIperf: A Framework for Application-driven IoT Network Perf...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Si-Mohammed, Samir Begin, Thomas Lassous, Isabelle Guerin Vicat-Blanc, Pascale Univ Lyon CNRS ENSL UCBLInriaLIP F-69342 Lyon 07 France Stackeo Lyon France
The Internet of Things (IoT) is the convergence of the physical and the digital worlds. It enables a large spectrum of applications such as smart building, smart tracking, smart metering, predictive maintenance, remot... 详细信息
来源: 评论
Inferring User Activities from IoT Device Events in Smart Homes: Challenges and Opportunities  31
Inferring User Activities from IoT Device Events in Smart Ho...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Lin, Xuanli Wan, Yinxin Xu, Kuai Wang, Feng Xue, Guoliang Arizona State University
The ubiquitous deployment of IoT devices in smart homes has led to growing research interests in studying the home network traffic for various applications such as network measurements, device profiling, and IoT devic... 详细信息
来源: 评论
Achieving High End-to-End Availability in VNF networks  31
Achieving High End-to-End Availability in VNF Networks
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Rodicio, Enrique Pan, Deng Liu, Jason Tang, Bin Florida Int Univ Sch Comp & Informat Sci Miami FL 33199 USA Calif State Univ Dominguez Hills Dept Comp Sci Carson CA 90747 USA
As software programs, Virtual Network Functions (VNFs) introduce new challenges to network availability due to their potential software failures. Existing models on the availability of VNF networks did not consider al... 详细信息
来源: 评论
Predictive Cyber Defense Remediation against Advanced Persistent Threat in Cyber-Physical Systems  31
Predictive Cyber Defense Remediation against Advanced Persis...
收藏 引用
31st International Conference on computer communications and networks (ICCCN)
作者: Hasanl, Kamrul Shetty, Sachin Islam, Tariqul Ahmed, Imtiaz Tennessee State Univ Nashville TN 37203 USA Old Dominion Univ Norfolk VA USA Syracuse Univ Syracuse NY USA Howard Univ Washington DC USA
Advanced Persistent Threat (APT) has dramatically changed the landscape of cybersecurity. APT is carried out by stealthy, continuous, sophisticated, and well-funded attack processes for long-term malicious gain thwart... 详细信息
来源: 评论