咨询与建议

限定检索结果

文献类型

  • 1,274 篇 会议
  • 51 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 1,335 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 871 篇 工学
    • 750 篇 计算机科学与技术...
    • 573 篇 软件工程
    • 237 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 70 篇 生物工程
    • 60 篇 安全科学与工程
    • 53 篇 电气工程
    • 46 篇 生物医学工程(可授...
    • 42 篇 电子科学与技术(可...
    • 41 篇 网络空间安全
    • 39 篇 机械工程
    • 38 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 21 篇 光学工程
    • 18 篇 建筑学
  • 213 篇 理学
    • 96 篇 数学
    • 75 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 29 篇 物理学
    • 27 篇 系统科学
  • 160 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 78 篇 法学
    • 50 篇 社会学
    • 29 篇 法学
  • 42 篇 医学
    • 42 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 24 篇 教育学
    • 22 篇 教育学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 18 篇 军事学
  • 13 篇 农学
  • 3 篇 艺术学

主题

  • 112 篇 security
  • 53 篇 authentication
  • 43 篇 cryptography
  • 41 篇 internet of thin...
  • 40 篇 computer communi...
  • 35 篇 blockchain
  • 34 篇 network security
  • 24 篇 systems and data...
  • 22 篇 wireless communi...
  • 22 篇 protocols
  • 19 篇 intrusion detect...
  • 19 篇 machine learning
  • 19 篇 privacy
  • 18 篇 computer archite...
  • 18 篇 computer securit...
  • 17 篇 access control
  • 17 篇 information syst...
  • 17 篇 software enginee...
  • 17 篇 algorithm analys...
  • 17 篇 training

机构

  • 7 篇 department of el...
  • 7 篇 college of compu...
  • 6 篇 department of in...
  • 6 篇 department of pr...
  • 6 篇 university of mi...
  • 6 篇 dicar polytecnic...
  • 6 篇 department of co...
  • 6 篇 monash universit...
  • 6 篇 school of engine...
  • 6 篇 department of ma...
  • 5 篇 department of ma...
  • 5 篇 de la salle univ...
  • 4 篇 institute of inf...
  • 4 篇 school of inform...
  • 4 篇 chitkara univers...
  • 4 篇 college of compu...
  • 4 篇 academy of cyber
  • 4 篇 de la salle univ...
  • 4 篇 tech univ chemni...
  • 4 篇 school of comput...

作者

  • 6 篇 bernady o. apduh...
  • 6 篇 maria irene falc...
  • 6 篇 jorge gustavo ro...
  • 6 篇 osvaldo gervasi
  • 6 篇 ana maria a. c. ...
  • 6 篇 beniamino murgan...
  • 6 篇 sanjay misra
  • 6 篇 carmelo torre
  • 6 篇 david taniar
  • 5 篇 peng jin
  • 5 篇 senthil kumar th...
  • 5 篇 sulakshan vajipa...
  • 5 篇 thangavel senthi...
  • 5 篇 vajipayajula sul...
  • 4 篇 sudeep tanwar
  • 4 篇 narayan d.g.
  • 4 篇 gaedke martin
  • 4 篇 jian su
  • 4 篇 yangzhao yang
  • 4 篇 xiaodong liu

语言

  • 1,256 篇 英文
  • 64 篇 其他
  • 16 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Conference on Computer and Communication Security"
1335 条 记 录,以下是1-10 订阅
排序:
Real-Time Secure Video Streaming System Based on FPGA and CUDA Technology  24
Real-Time Secure Video Streaming System Based on FPGA and CU...
收藏 引用
14th International conference on communication and Network security, ICCNS 2024
作者: Liu, Ziyang Wang, Zongxia Tu, Shanshan Wang, Haoran Fan, Jingxuan Ren, Chang College of Computer Science Beijing University of Technology Beijing China The 6th Research Institute of China Electronics Corporation China Electronics Corporation Bejing China
In recent years, with the growing demand for real-time video transmission, ensuring the security of video stream data has become critical. this paper addresses the secure transmission of real-time video streams by usi... 详细信息
来源: 评论
Intrusion Detection in IIoT: A Federated Approach Using TCN-GRU and Lookahead Optimization  24
Intrusion Detection in IIoT: A Federated Approach Using TCN-...
收藏 引用
14th International conference on communication and Network security, ICCNS 2024
作者: Wang, Haoran Tu, Shanshan Fan, Jingxuan Liu, Ziyang College of Computer Science Beijing University of Technology Beijing China
this paper proposes a federated learning-based intrusion detection framework that incorporates the TCN-GRU model for security monitoring in industrial control systems. the TCN module effectively extracts long-term dep... 详细信息
来源: 评论
Privacy Protection in Mobile Crowdsensing Based on Local Differential Privacy  24
Privacy Protection in Mobile Crowdsensing Based on Local Dif...
收藏 引用
14th International conference on communication and Network security, ICCNS 2024
作者: Cui, Xinyue Sun, Pengxuan Guo, Ningning School of Computer Science Beijing University of Technology Beijing China
We designed a system perception model under edge computing that supports Local Differential Privacy(LDP). To address the privacy protection challenges during the data submission phase in Mobile Crowdsensing(MCS) and t... 详细信息
来源: 评论
Trust-Based Identity Privacy for Edge Computing  24
Trust-Based Identity Privacy for Edge Computing
收藏 引用
14th International conference on communication and Network security, ICCNS 2024
作者: Dong, Jie Wen Kang, Xi Nai Peng, Jin Jiang, Xuan Ming Zhu, Tao Jun Information Technology Department National Key Laboratory of Seience and Technology on Aerospace Intelligence Control Beijing Aerospace Automatic Control Institute BeiJing China School of Computer Science Beijing University of Technology BeiJing China
College of computer Science Beijing University of Technology, Beijing 100124, China, 1374622525@*** this paper proposes a trust collaboration technology for edge computing, addressing trust isolation and security issu... 详细信息
来源: 评论
A Lightweight and Trustworthy Authentication Protocol for UAV Networks Based on PUF  24
A Lightweight and Trustworthy Authentication Protocol for UA...
收藏 引用
14th International conference on communication and Network security, ICCNS 2024
作者: Zhu, Juntao Peng, Jin Wang, Long College of Computer Science Beijing University of Technology Beijing China The 6th Research Institute of China Electronics Corporation Beijing China
With the continuous development of drone remote sensing technology, drone networks have garnered widespread attention. the application of drones has expanded from military uses to industrial and civilian sectors, faci... 详细信息
来源: 评论
A Lightweight PUF-Based Authentication Protocol for M2M communications in Industrial IoT  24
A Lightweight PUF-Based Authentication Protocol for M2M Comm...
收藏 引用
14th International conference on communication and Network security, ICCNS 2024
作者: Fan, Jingxuan Tu, Shanshan Wang, Haoran Liu, Ziyang College of Computer Science Beijing University of Technology Beijing China
In the Industrial Internet of things (IIoT) landscape, machine-to-machine (M2M) communication is extensively employed, allowing IoT devices to interact autonomously without human intervention. Despite its benefits, M2... 详细信息
来源: 评论
Meta GPT-Based Agent for Enhanced Phishing Email Detection  24
Meta GPT-Based Agent for Enhanced Phishing Email Detection
收藏 引用
14th International conference on communication and Network security, ICCNS 2024
作者: Ling, Feng Yang, Hao Xiao, Yongcai Hu, Lei Schoolof Computer and Information Engineering Jiangxi Normal University Jiangxi Nanchang China Electric Power Research Institute State Grid Jiangxi Electric Power Co. Ltd. Jiangxi Nanchang China
Phishing emails are a common means of phishing and their detection is an important aspect of email security. In this study, Meta Phishing Detector Agent system is designed, which is constructed based on Meta GPT frame... 详细信息
来源: 评论
Multi-Scene Fire Smoke Detection Algorithm Based on YOLO v8  24
Multi-Scene Fire Smoke Detection Algorithm Based on YOLO v8
收藏 引用
14th International conference on communication and Network security, ICCNS 2024
作者: Li, Aiguo Song, Xiaowan School of Computer Science and Technology Xi'an University of Science and Technology Shaanxi Xi'an China
Aiming at the problems of semi-transparent smoke misdetection and fire missing detection in multi-scene fire smoke detection, a multi-scene fire smoke detection algorithm based on YOLOv8 is proposed. Firstly, deformab... 详细信息
来源: 评论
RanCF: Optimizing Ransomware Classification in IIoT Environments with Random Forest  24
RanCF: Optimizing Ransomware Classification in IIoT Environm...
收藏 引用
14th International conference on communication and Network security, ICCNS 2024
作者: Gong, Mowei Lu, Xuepeng Peng, Tianqi Zheng, Guiping Zhu, Haotian Cui, Xinyue College of Computer Science Beijing University of Technology Beijing China Department of Technical Support Beijing Luo'an Technology Co. Ltd. Beijing China
the advent of Industry 4.0 has established the Industrial Internet of things (IIoT) as the technological bedrock for achieving intelligent industrial production across key sectors, including smart manufacturing, power... 详细信息
来源: 评论
Trust Collaboration for Edge Computing  24
Trust Collaboration for Edge Computing
收藏 引用
14th International conference on communication and Network security, ICCNS 2024
作者: Dong, Jie Wen Kang, Xi Nai Peng, Jin Jiang, Xuan Ming Zhu, Tao Jun Information Technology Department National Key Laboratory of Seience and Technology on Aerospace Intelligence Control Beijing Aerospace Automatic Control Institute BeiJing China School of Computer Science Beijing University of Technology BeiJing China
As edge computing becomes an increasingly important computing model, trust management and security issues are becoming more severe. Problems such as malicious node attacks and trust isolation pose threats to the secur... 详细信息
来源: 评论