咨询与建议

限定检索结果

文献类型

  • 1,276 篇 会议
  • 51 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 1,337 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 873 篇 工学
    • 751 篇 计算机科学与技术...
    • 575 篇 软件工程
    • 237 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 70 篇 生物工程
    • 60 篇 安全科学与工程
    • 53 篇 电气工程
    • 46 篇 生物医学工程(可授...
    • 42 篇 电子科学与技术(可...
    • 40 篇 网络空间安全
    • 39 篇 机械工程
    • 38 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 21 篇 光学工程
    • 18 篇 建筑学
  • 213 篇 理学
    • 96 篇 数学
    • 75 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 29 篇 物理学
    • 27 篇 系统科学
  • 160 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 78 篇 法学
    • 50 篇 社会学
    • 29 篇 法学
  • 42 篇 医学
    • 42 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 24 篇 教育学
    • 22 篇 教育学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 18 篇 军事学
  • 13 篇 农学
  • 3 篇 艺术学

主题

  • 112 篇 security
  • 53 篇 authentication
  • 43 篇 cryptography
  • 41 篇 internet of thin...
  • 40 篇 computer communi...
  • 35 篇 blockchain
  • 34 篇 network security
  • 24 篇 systems and data...
  • 22 篇 wireless communi...
  • 22 篇 protocols
  • 19 篇 intrusion detect...
  • 19 篇 machine learning
  • 19 篇 privacy
  • 18 篇 computer archite...
  • 18 篇 computer securit...
  • 17 篇 access control
  • 17 篇 information syst...
  • 17 篇 software enginee...
  • 17 篇 algorithm analys...
  • 17 篇 training

机构

  • 7 篇 department of el...
  • 7 篇 college of compu...
  • 6 篇 department of in...
  • 6 篇 department of pr...
  • 6 篇 university of mi...
  • 6 篇 dicar polytecnic...
  • 6 篇 department of co...
  • 6 篇 monash universit...
  • 6 篇 school of engine...
  • 6 篇 department of ma...
  • 5 篇 department of ma...
  • 5 篇 de la salle univ...
  • 4 篇 institute of inf...
  • 4 篇 school of inform...
  • 4 篇 chitkara univers...
  • 4 篇 college of compu...
  • 4 篇 academy of cyber
  • 4 篇 de la salle univ...
  • 4 篇 tech univ chemni...
  • 4 篇 school of comput...

作者

  • 6 篇 bernady o. apduh...
  • 6 篇 maria irene falc...
  • 6 篇 jorge gustavo ro...
  • 6 篇 osvaldo gervasi
  • 6 篇 ana maria a. c. ...
  • 6 篇 beniamino murgan...
  • 6 篇 sanjay misra
  • 6 篇 carmelo torre
  • 6 篇 david taniar
  • 5 篇 peng jin
  • 5 篇 senthil kumar th...
  • 5 篇 sulakshan vajipa...
  • 5 篇 thangavel senthi...
  • 5 篇 vajipayajula sul...
  • 4 篇 sudeep tanwar
  • 4 篇 narayan d.g.
  • 4 篇 gaedke martin
  • 4 篇 jian su
  • 4 篇 yangzhao yang
  • 4 篇 xiaodong liu

语言

  • 1,253 篇 英文
  • 69 篇 其他
  • 16 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Conference on Computer and Communication Security"
1337 条 记 录,以下是91-100 订阅
排序:
ACPPS: Autonomic Computing based Phishing Protection System  14
ACPPS: Autonomic Computing based Phishing Protection System
收藏 引用
2024 IEEE 14th Annual Computing and communication Workshop and conference, CCWC 2024
作者: Mazur, Jordan Rouff, Christopher Tekeoglu, Ali Johns Hopkins University Whiting School of Engineering Computer Science Department United States Johns Hopkins University Applied Physics Laboratory & Jhu Whiting School of Engineering United States Leidos Innovations Center Johns Hopkins University Whiting School of Engineering United States
Phishing attacks are one of the most common initial access vectors malicious actors utilize to get into personal and corporate systems. the weakest component of a system in terms of security is the human user, which i... 详细信息
来源: 评论
A Critical Study of Challenges and Risk in Healthcare sector based on Cloud Computing  14
A Critical Study of Challenges and Risk in Healthcare sector...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Srivastava, Somesh Soni, Manish Kumar Pratap, Ajay Bansal Inst of Eng. & Technology Dept. of Computer Sci. & Engineering Lucknow India Amity University Uttar Pradesh Amity Institute of Info Technology Lucknow India
Cloud computing has been critical to the world's modern technological growth. Cloud computing is one of the most advantageous solutions to digital challenges. security is a major concern in cloud computing technol... 详细信息
来源: 评论
MRL-PoS: A Multi-agent Reinforcement Learning based Proof of Stake Consensus Algorithm for Blockchain  14
MRL-PoS: A Multi-agent Reinforcement Learning based Proof of...
收藏 引用
2024 IEEE 14th Annual Computing and communication Workshop and conference, CCWC 2024
作者: Islam, Tariqul Bappy, Faisal Haque Shaila Zaman, Tarannum Islam Sajid, Md Sajidul Mehedi Ahsan Pritom, Mir SyracuseNY United States Suny Polytechnic Institute Computer and Information Science NY United States Towson University Computer and Information Sciences TowsonMD United States Tennessee Tech University Computer Science CookevilleTN United States
the core of a blockchain network is its consensus algorithm. Starting with the Proof-of-Work, there have been various versions of consensus algorithms, such as Proof-of-Stake (PoS), Proof-of-Authority (PoA), and Pract... 详细信息
来源: 评论
the Impact of CyRIS in Ascertaining Accurate Implementation of Projects  14
The Impact of CyRIS in Ascertaining Accurate Implementation ...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Sharifi, Ahma Zia Walid, Md. Abul Ala Zia, Ghezal Ahmad Jan Salehin, Md. Nazmus Safi, Ihsan Ul Haq Al Islam, Iqbal Faculty of Computer Science Nangarhar Univeristy Department of Networking and Communication Afghanistan Department of Computer Science and Engineering Khulna9203 Bangladesh Berlin Germany Department of Computer Science and Engineering Natore Bangladesh Nangarhar University Department of Networking and Communication Faculty of Computer Science Afghanistan Department of Computer Science & Engineering Savar Dhaka Bangladesh
this systematic review seeks to evaluate the impact of CyRIS in ascertaining accurate implementation of projects with a primary focus on the merits of its functionalities. Core to the study is the view that CyRIS-driv... 详细信息
来源: 评论
Optimization of Green Computing in Data Privacy in Healthcare BCT Framework  14
Optimization of Green Computing in Data Privacy in Healthcar...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: thomas, David Mathew Beena, B.M. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Bangalore India
A central element of blockchain networks is immutability, which enables each participant to have a precise global record of all transactions. In permissioned blockchain networks, where validators are selected from a t... 详细信息
来源: 评论
Botnet-based IoT Network Attacks Identification using LSTM  14
Botnet-based IoT Network Attacks Identification using LSTM
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Clinton, Urikhimbam Boby Hoque, Nazrul Singh, Kh Robindro Manipur University Department of Computer Science Imphal India
Internet of things (IoT) networks are growing significantly as a modern communication technology that changes the world tremendously, and the vulnerabilities of IoT have brought many cyber attacks. Botnet attacks are ... 详细信息
来源: 评论
SecVanet: Provably secure authentication protocol for sending emergency events in VANET  14
SecVanet: Provably secure authentication protocol for sendin...
收藏 引用
14th International conference on Information and Knowledge Technology, IKT 2023
作者: Mousavi, Seyed Amir Sirjani, Mohammad Sadegh Razavi, Seyyed Javad Bozorg Zadeh Nikooghadam, Morteza Ferdowsi University of Mashhad Department of Computer Mashhad Iran Imam Reza International University Department of Computer Engineering Mashhad Iran
Recently, the number of accidents resulting in irreparable damages like death has risen due to the increased number of vehicles worldwide. Vehicular ad hoc network (VANET) is a new technology for enhancing road safety... 详细信息
来源: 评论
security Provisioning as Integrity in wireless sensor networks (WSN): A Survey  14
Security Provisioning as Integrity in wireless sensor networ...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Venkateswari, P. Shanmugasundaram, N. Avs College of Technology Department of Computer Science and Engineering Tamil Nadu Salem636106 India Sri Eshwar College of Engineering Department of Electronics and Communication Engineering Tamil Nadu Coimbatore641202 India
Wireless sensor networks (WSNs) are composed of small sensory nodes with limited energy that are deployed in large numbers in order to monitor a physical event in the area to be watched. these nodes have been built to... 详细信息
来源: 评论
De-Fence: LoRa based Hop-to-Hop communication  2022
De-Fence: LoRa based Hop-to-Hop Communication
收藏 引用
14th International conference on Contemporary Computing, IC3 2022
作者: Chaudhary, Anav Talwar, Maanas Goel, Avil Singal, Gaurav Kushwaha, Riti Department of Computer Science Engineering Netaji Subhas University of Technology Delhi India Department of Computer Science Engineering Bennett University Greater Noida India
the need for a low-power reliable form of communication is ever-present in a multitude of fields. Our paper aims to develop and explore a security-oriented application of LoRa-based hop-to-hop communication, which pro... 详细信息
来源: 评论
Blockchain Based Peer to Peer Botnet Detection Using Louvain Algorithm  14
Blockchain Based Peer to Peer Botnet Detection Using Louvain...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Sandra, Ann theresa Ashok, Aruna Nair, Remya T School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and It Kerala Kochi India
Peer-to-peer botnets have evolved to be one of the biggest threats to network security due to their use as the foundation for several cybercrimes. the problem of detecting P2P botnets entails extra difficulties, even ... 详细信息
来源: 评论