咨询与建议

限定检索结果

文献类型

  • 1,276 篇 会议
  • 51 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 1,337 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 873 篇 工学
    • 751 篇 计算机科学与技术...
    • 575 篇 软件工程
    • 237 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 70 篇 生物工程
    • 60 篇 安全科学与工程
    • 53 篇 电气工程
    • 46 篇 生物医学工程(可授...
    • 42 篇 电子科学与技术(可...
    • 40 篇 网络空间安全
    • 39 篇 机械工程
    • 38 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 21 篇 光学工程
    • 18 篇 建筑学
  • 213 篇 理学
    • 96 篇 数学
    • 75 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 29 篇 物理学
    • 27 篇 系统科学
  • 160 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 78 篇 法学
    • 50 篇 社会学
    • 29 篇 法学
  • 42 篇 医学
    • 42 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 24 篇 教育学
    • 22 篇 教育学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 18 篇 军事学
  • 13 篇 农学
  • 3 篇 艺术学

主题

  • 112 篇 security
  • 53 篇 authentication
  • 43 篇 cryptography
  • 41 篇 internet of thin...
  • 40 篇 computer communi...
  • 35 篇 blockchain
  • 34 篇 network security
  • 24 篇 systems and data...
  • 22 篇 wireless communi...
  • 22 篇 protocols
  • 19 篇 intrusion detect...
  • 19 篇 machine learning
  • 19 篇 privacy
  • 18 篇 computer archite...
  • 18 篇 computer securit...
  • 17 篇 access control
  • 17 篇 information syst...
  • 17 篇 software enginee...
  • 17 篇 algorithm analys...
  • 17 篇 training

机构

  • 7 篇 department of el...
  • 7 篇 college of compu...
  • 6 篇 department of in...
  • 6 篇 department of pr...
  • 6 篇 university of mi...
  • 6 篇 dicar polytecnic...
  • 6 篇 department of co...
  • 6 篇 monash universit...
  • 6 篇 school of engine...
  • 6 篇 department of ma...
  • 5 篇 department of ma...
  • 5 篇 de la salle univ...
  • 4 篇 institute of inf...
  • 4 篇 school of inform...
  • 4 篇 chitkara univers...
  • 4 篇 college of compu...
  • 4 篇 academy of cyber
  • 4 篇 de la salle univ...
  • 4 篇 tech univ chemni...
  • 4 篇 school of comput...

作者

  • 6 篇 bernady o. apduh...
  • 6 篇 maria irene falc...
  • 6 篇 jorge gustavo ro...
  • 6 篇 osvaldo gervasi
  • 6 篇 ana maria a. c. ...
  • 6 篇 beniamino murgan...
  • 6 篇 sanjay misra
  • 6 篇 carmelo torre
  • 6 篇 david taniar
  • 5 篇 peng jin
  • 5 篇 senthil kumar th...
  • 5 篇 sulakshan vajipa...
  • 5 篇 thangavel senthi...
  • 5 篇 vajipayajula sul...
  • 4 篇 sudeep tanwar
  • 4 篇 narayan d.g.
  • 4 篇 gaedke martin
  • 4 篇 jian su
  • 4 篇 yangzhao yang
  • 4 篇 xiaodong liu

语言

  • 1,253 篇 英文
  • 69 篇 其他
  • 16 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Conference on Computer and Communication Security"
1337 条 记 录,以下是111-120 订阅
排序:
Blockchain-Based Decentralized Application for Telesurgery in Metaverse Environment  14
Blockchain-Based Decentralized Application for Telesurgery i...
收藏 引用
14th International conference on Cloud Computing, Data Science and Engineering, Confluence 2024
作者: Chaudhary, Satya Patel, Yogi Chaudhary, Sachi Gupta, Rajesh Kakkar, Riya Tanwar, Sudeep Nair, Anuja Ahmedabad International School Gujarat Ahmedabad380054 India Institute of Technology Nirma University Department of Computer Science and Engineering Ahmedabad382481 India
With the advent of technology in the medical industry, telesurgery has emerged as a transformative era of conventional medical practices to facilitate remote and efficient surgical procedures for the betterment of pat... 详细信息
来源: 评论
Cybersecurity Awareness Assessment Based on Bangladeshi People Perspective Using Machine Learning Approaches  14
Cybersecurity Awareness Assessment Based on Bangladeshi Peop...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Tahmiduzzaman, K.B.M. Zumma, Md. thoufiq Babi, Farzana Kausaruzzaman, Md. Sakib, Nazmus Md.adnan-E-Elahe Daffodil International University Department of Computer Science and Engineering Dhaka Bangladesh Bangladesh University of Business &technology Department of Computer Science and Engineering Dhaka Bangladesh
the demands placed on cyber security continue to rise. When data is compromised from a company, organization, or individual, we realize how crucial it is to have a basic understanding of cyber security. the company sh... 详细信息
来源: 评论
Multi-Factor Authentication System With ID Card Credentials For Secure Transactions  14
Multi-Factor Authentication System With ID Card Credentials ...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Vasudev, R. Harini, N. Neethu, M.R. Amrita Vishwa Vidyapeetham Amrita School of Computing Amrita School of Computing Department of Computer Science and Engineering Coimbatore India Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Coimbatore India
A physical document that can be utilized to validate a person's identity is known as ID card, usually comes in standard size same as that of credit cards (3.370 inch height and 2.125 inch width).the machine readab... 详细信息
来源: 评论
Applying AI and Machine Learning to Enhance Automated Cybersecurity and Network threat Identification  15
Applying AI and Machine Learning to Enhance Automated Cybers...
收藏 引用
15th International conference on Emerging Ubiquitous Systems and Pervasive Networks / 14th International conference on Current and Future Trends of Information and communication Technologies in Healthcare, EUSPN/ICth 2024
作者: Muheidat, Fadi Mallouh, Moayyad Abu Al-Saleh, Omar Al-Khasawneh, Omar Tawalbeh, Loai A. California State University- San BernardinoCA92407 United States Computer Engineering Department Jordan University of Science and Technology Irbid22110 Jordan
Artificial intelligence (AI) is now used in many sectors but its transformative impact on cybersecurity is unmatched. Cybersecurity is seen to rely heavily on artificial intelligence (AI), which has brought about auto... 详细信息
来源: 评论
GSM Based Home security Alarm System Using Arduino Using Mobile Call  14
GSM Based Home Security Alarm System Using Arduino Using Mob...
收藏 引用
14th IEEE Annual Ubiquitous Computing, Electronics and Mobile communication conference, UEMCON 2023
作者: Golder, Aditi Gupta, Debashis Roy, Saumendu Al Ahasan, Md. Abdullah Haque, Mohd Ariful Institute of Information Technology Jahangirnagar University Dhaka Bangladesh Wake Forest University Department of Computer Science North Carolina United States University of Saskatchewan Department of Computer Science Saskatoon Canada University of Regina Department of Computer Science Regina Canada Clark Atlanta University Cyber Physical Systems AtlantaGA United States
Since criminality is rising in the 21st century, people want to secure their property and belongings. So, everyone in this situation needs a secure system with cutting-edge technology. therefore, a person may go out w... 详细信息
来源: 评论
Deep Learning Approach to Enhance IDS Accuracy using Hybrid LSTM Algorithm  14
Deep Learning Approach to Enhance IDS Accuracy using Hybrid ...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Sehrawat, Sahil Singh, Dinesh Dcrust Murthal Department of Computer Science and Engineering Sonipat India
In this research, the focus is on safeguarding networks and sensitive data from cyber threats. the study utilizes the UNSW-NB15 dataset to test the effectiveness of machine learning models, specifically BiLSTM models,... 详细信息
来源: 评论
Vehicle Number Plate Detection System Using Image Processing Approach  14
Vehicle Number Plate Detection System Using Image Processing...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Tushar, N.I. Saikat, Abdullah Rahat-Bin-Rafique, A.A.M. Abedin, Md. Minhajul Tahmiduzzaman, K.B.M. Zumma, Md. thoufiq Bangladesh University of Business and Technology Department of Computer Science and Engineering Dhaka Bangladesh International University of Business Agriculture and Technology Department of Computer Science and Engineering Dhaka Bangladesh Daffodil International University Department of Computer Science and Engineering Dhaka Bangladesh
the primary method of operation for the vehicle authorization system is the reading and processing of license plates. Automatic Number Plate Recognition (ANPR) is the name given to image processing technology that use... 详细信息
来源: 评论
Explainable Artificial Intelligence in Drones: A Brief Review  14
Explainable Artificial Intelligence in Drones: A Brief Revie...
收藏 引用
14th International conference on Information and communication Systems, ICICS 2023
作者: Banimelhem, Omar Al-Khateeb, Baghdad Jordan University of Science and Technology Department of Network Engineering and Security Irbid Jordan Jordan University of Science and Technology Department of Computer Engineering Irbid Jordan
the lack of clarity of most artificial intelligence algorithms which have many applications has led to the emergence of explainable artificial intelligence (XAI), which includes machine learning algorithms that introd... 详细信息
来源: 评论
Research on Ship Automatic Collision Avoidance and Obstacle Avoidance Based on Improved Artificial Potential Field  24
Research on Ship Automatic Collision Avoidance and Obstacle ...
收藏 引用
5th International conference on Artificial Intelligence and computer Engineering, ICAICE 2024
作者: Du, Baisong Yim, Jeong-Bin Ning, Jun Li, Wei School of Naval Architecture and Maritime Zhejiang Ocean University Zhejiang Zhoushan China Department of Maritime AI & Cyber Security Graduate School Korea Maritime and Ocean University Busan Korea Republic of Division of Maritime AI & Cyber Security Korea Maritime and Ocean University Busan Korea Republic of Navigation College Dalian Maritime University Liaoning Dalian China
To address the issue that the traditional artificial potential field method cannot determine the avoidance responsibility and handle urgent situations in automatic collision avoidance of ships, the ship encounter situ... 详细信息
来源: 评论
Decentralised Application for Health Insurance management using Blockchain  14
Decentralised Application for Health Insurance management us...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Banate, Harshad Jagtap, Yash Choudhary, Divesh Dhage, Sudhir Sardar Patel Institute of Technology Department of Computer Engineering Mumbai India
Insurance fraud is a significant problem in the healthcare industry, with various types of fraudulent activities leading to significant financial losses for insurance providers and higher premiums for customers. Examp... 详细信息
来源: 评论