咨询与建议

限定检索结果

文献类型

  • 7,983 篇 会议
  • 1,253 册 图书

馆藏范围

  • 9,236 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,720 篇 工学
    • 6,725 篇 计算机科学与技术...
    • 1,924 篇 软件工程
    • 1,465 篇 信息与通信工程
    • 1,007 篇 控制科学与工程
    • 577 篇 机械工程
    • 505 篇 生物工程
    • 360 篇 生物医学工程(可授...
    • 193 篇 网络空间安全
    • 168 篇 光学工程
    • 164 篇 电气工程
    • 152 篇 安全科学与工程
    • 151 篇 化学工程与技术
    • 137 篇 电子科学与技术(可...
    • 133 篇 交通运输工程
    • 132 篇 动力工程及工程热...
  • 1,526 篇 理学
    • 858 篇 数学
    • 530 篇 生物学
    • 264 篇 物理学
    • 253 篇 统计学(可授理学、...
    • 146 篇 系统科学
  • 907 篇 管理学
    • 577 篇 管理科学与工程(可...
    • 401 篇 工商管理
    • 314 篇 图书情报与档案管...
  • 676 篇 教育学
    • 676 篇 教育学
  • 321 篇 医学
    • 317 篇 临床医学
    • 315 篇 基础医学(可授医学...
    • 185 篇 药学(可授医学、理...
    • 156 篇 公共卫生与预防医...
  • 169 篇 法学
    • 134 篇 社会学
  • 135 篇 经济学
    • 135 篇 应用经济学
  • 114 篇 农学
  • 11 篇 军事学
  • 1 篇 文学

主题

  • 941 篇 computational in...
  • 788 篇 artificial intel...
  • 537 篇 machine learning
  • 351 篇 deep learning
  • 252 篇 communications e...
  • 213 篇 data engineering
  • 156 篇 cyber-physical s...
  • 145 篇 professional com...
  • 135 篇 internet of thin...
  • 106 篇 blockchain
  • 94 篇 big data
  • 88 篇 control, robotic...
  • 80 篇 iot
  • 78 篇 natural language...
  • 78 篇 signal, image an...
  • 76 篇 industry 4.0
  • 73 篇 covid-19
  • 68 篇 object detection
  • 63 篇 education
  • 63 篇 cnn

机构

  • 65 篇 global knowledge...
  • 33 篇 faculty of scien...
  • 22 篇 univ tecnol peru...
  • 21 篇 inesc tec porto
  • 21 篇 iseg universidad...
  • 18 篇 bauman moscow st...
  • 18 篇 univ esan lima p...
  • 18 篇 univ salerno dep...
  • 17 篇 saga university ...
  • 17 篇 moroccan society...
  • 17 篇 univ politecn sa...
  • 16 篇 cti global
  • 16 篇 middlesex univer...
  • 16 篇 department of in...
  • 14 篇 rabat morocco
  • 14 篇 reshetnev siberi...
  • 14 篇 siberian fed uni...
  • 13 篇 dct universidade...
  • 13 篇 kaliningrad stat...
  • 13 篇 aston univ sch c...

作者

  • 80 篇 amit joshi
  • 52 篇 kohei arai
  • 31 篇 janusz kacprzyk
  • 25 篇 álvaro rocha
  • 23 篇 rhalem wajih
  • 23 篇 ajith abraham
  • 22 篇 prajapat shaligr...
  • 22 篇 leonard barolli
  • 22 篇 valentina emilia...
  • 21 篇 xin-she yang
  • 20 篇 ticona wilfredo
  • 20 篇 kumar tarun
  • 20 篇 nilanjan dey
  • 19 篇 radek silhavy
  • 18 篇 michael e. auer
  • 16 篇 nugent chris
  • 16 篇 anu bajaj
  • 15 篇 abhishek swaroop
  • 15 篇 bahaaeddin alare...
  • 15 篇 qjidaa hassan

语言

  • 8,981 篇 英文
  • 237 篇 其他
  • 18 篇 中文
检索条件"丛书名=Lecture Notes in Networks and Systems"
9236 条 记 录,以下是151-160 订阅
排序:
Machine Learning-Envisioned Malware Attack Detection Mechanism for Edge Computing-Based networks  3rd
Machine Learning-Envisioned Malware Attack Detection Mechani...
收藏 引用
3rd International Conference on Network Security and Blockchain Technology
作者: Bhutani, Pearl Thapliyal, Siddhant Wazid, Mohammad Giri, Debasis Mishra, Amit Kumar Singh, Devesh Pratap Graph Era Deemed Univ Dept Comp Sci & Engn Dehra Dun 248002 Uttarakhand India Maulana Abul Kalam Azad Univ Technol Dept Informat Technol Nadia 741249 W Bengal India
The significance of cybersecurity resides in its ability to safeguard individuals and enterprises against cyberattacks, as well as the unauthorized acquisition or misplacement of confidential and classified data. Cybe... 详细信息
来源: 评论
Why a Bot is Undetectable? An Explainability-Based Study of Misclassified Automated Accounts in Social networks  20th
Why a Bot is Undetectable? An Explainability-Based Study of ...
收藏 引用
20th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based systems
作者: Lopez-Joya, Salvador Diaz-Garcia, Jose Angel Ruiz, Maria Dolores Martin-Bautista, Maria Jose Res Ctr Informat & Communicat Technol CITIC UGR Granada 18014 Spain Univ Granada Dept Comp Sci & Artificial Intelligence Granada 18014 Spain
Detecting bots on social media platforms is a major challenge, as these automated entities are constantly evolving to evade detection. In this study, we investigate the main features that contribute to the difficulty ... 详细信息
来源: 评论
Secure Sharing of CCTV Feed  3rd
Secure Sharing of CCTV Feed
收藏 引用
3rd International Conference on Network Security and Blockchain Technology
作者: Guntuboina, Venkata Sankirtana Balamurugan, Krithikha Gurrala, Mahitha Rengan, Nandhini K. S. Patel, Sankita J. Sardar Vallabhbhai Natl Inst Technol Dept Comp Sci & Engn Surat 395007 Gujarat India
Thanks to the rapid development of information technologies, the number of CCTV cameras has increased, which has decreased crime and violence rates. Regardless of its benefits, there are some drawbacks, such as the la... 详细信息
来源: 评论
A Gamified Multi Agent Robot System for Physical Stimulation  21st
A Gamified Multi Agent Robot System for Physical Stimulation
收藏 引用
21st International Symposium on Distributed Computing and Artificial Intelligence
作者: Garcia-Martinez, Jesus Carrasco-Martinez, Sara Alvarez-Arias, Sofia Arrojo, Guillermo A. Castillo, Jose C. Alonso-Martin, Fernando Castro-Gonzalez, Alvaro Carlos III Univ Madrid Dept Syst Engn & Automat Calle Butarque 15 Leganes 29811 Madrid Spain
Social robots have the potential to help people with mobility and coordination problems, especially in elderly people, in a fun and enjoyable way, as they can support physical stimulation exercises by enabling the gam... 详细信息
来源: 评论
Android Malware Detection: Leveraging Deep Learning with Process Control Block Information  21st
Android Malware Detection: Leveraging Deep Learning with Pro...
收藏 引用
21st International Symposium on Distributed Computing and Artificial Intelligence
作者: Alawneh, Heba Alkofahi, Hamza Umphress, David Jordan Univ Sci & Technol Irbid Jordan Auburn Univ Auburn AL 36849 USA
The security and privacy of Android device users are seriously threatened by the sophistication and endurance of malware. The risks associated with malware assaults on Android are larger than ever since mobile devices... 详细信息
来源: 评论
Preliminary Study on Assessing the Proportion of Individuals with Meaningful Connectivity in Rural Areas of Malaysia  9th
Preliminary Study on Assessing the Proportion of Individuals...
收藏 引用
9th International Congress on Information and Communication Technology (ICICT)
作者: Yih, Cheng Haw Zaman, Tariq Univ Technol Sarawak ASSET Sarawak 96000 Malaysia
Supported by the USP fund, Pusat Ekonomi Digital Keluarga Malaysia (PEDi), was commenced by Malaysian Communications and Multimedia Commission (MCMC), to support local entrepreneurs and businesses in adopting digital ... 详细信息
来源: 评论
Enhancing Healthcare IoT Security: A CCN-Based Approach for FIB Establishment and Content Delivery  3rd
Enhancing Healthcare IoT Security: A CCN-Based Approach for ...
收藏 引用
3rd International Conference on Network Security and Blockchain Technology
作者: Sarkar, Atanu Ray, Sangram Natl Inst Technol Sikkim Dept Comp Sci & Engn Ravangla 737139 Sikkim India
The rapid growth of the Internet of Things (IoT) has positioned it as a critical resource for remote healthcare monitoring, emphasizing the need for secure and efficient retrieval of medical data and driven by advance... 详细信息
来源: 评论
Nonlinearity in AES Subkey Scheduling-An Augmented Security  3rd
Nonlinearity in AES Subkey Scheduling-An Augmented Security
收藏 引用
3rd International Conference on Network Security and Blockchain Technology
作者: Howlader, Jaydeep Natl Inst Technol Durgapur Dept Comp Sci ad Engn Durgapur West Bengal India
Advanced Encryption Standard (AES) is a widely used symmetric encryption mechanism. The recent development of Composite Field Arithmetic (CFA) has significantly optimized the AES architecture. Moreover, subpipeline st... 详细信息
来源: 评论
Improvement of Anomaly Detection Through Enhanced Feature Extraction in TimesNet  21st
Improvement of Anomaly Detection Through Enhanced Feature Ex...
收藏 引用
21st International Symposium on Distributed Computing and Artificial Intelligence
作者: Nagahama, Hiroyoshi Yoshioka, Michifumi Inoue, Katsufumi Todorokihara, Masayoshi Omori, Keishi Osaka Metropolitan Univ Grad Sch Informat Osaka Japan Seiko Epson Corp Microdevices Operat Div Suwa Japan
Accurate detection and classification of machine anomalies are essential tasks for performing machine maintenance. Recently, deep learning methods have been widely utilized for anomaly detection to improve performance... 详细信息
来源: 评论
Predicting the Political Affiliation of Moroccan Parties Through Analysis of Electoral Programs  9th
Predicting the Political Affiliation of Moroccan Parties Thr...
收藏 引用
9th International Congress on Information and Communication Technology (ICICT)
作者: Karra, Rachid Lasfar, Abdelali Mohammed V Univ Rabat Mohammadia Sch Engineers LASTIMI Lab Rabat Morocco
Our study originates from the lack of scientific analysis in political life. Recent advancements in Natural Language Processing enable a comprehensive examination of political discourse and party programs. The initial... 详细信息
来源: 评论