咨询与建议

限定检索结果

文献类型

  • 1,276 篇 会议
  • 51 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 1,337 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 873 篇 工学
    • 751 篇 计算机科学与技术...
    • 575 篇 软件工程
    • 237 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 70 篇 生物工程
    • 60 篇 安全科学与工程
    • 53 篇 电气工程
    • 46 篇 生物医学工程(可授...
    • 42 篇 电子科学与技术(可...
    • 40 篇 网络空间安全
    • 39 篇 机械工程
    • 38 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 21 篇 光学工程
    • 18 篇 建筑学
  • 213 篇 理学
    • 96 篇 数学
    • 75 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 29 篇 物理学
    • 27 篇 系统科学
  • 160 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 78 篇 法学
    • 50 篇 社会学
    • 29 篇 法学
  • 42 篇 医学
    • 42 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 24 篇 教育学
    • 22 篇 教育学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 18 篇 军事学
  • 13 篇 农学
  • 3 篇 艺术学

主题

  • 112 篇 security
  • 53 篇 authentication
  • 43 篇 cryptography
  • 41 篇 internet of thin...
  • 40 篇 computer communi...
  • 35 篇 blockchain
  • 34 篇 network security
  • 24 篇 systems and data...
  • 22 篇 wireless communi...
  • 22 篇 protocols
  • 19 篇 intrusion detect...
  • 19 篇 machine learning
  • 19 篇 privacy
  • 18 篇 computer archite...
  • 18 篇 computer securit...
  • 17 篇 access control
  • 17 篇 information syst...
  • 17 篇 software enginee...
  • 17 篇 algorithm analys...
  • 17 篇 training

机构

  • 7 篇 department of el...
  • 7 篇 college of compu...
  • 6 篇 department of in...
  • 6 篇 department of pr...
  • 6 篇 university of mi...
  • 6 篇 dicar polytecnic...
  • 6 篇 department of co...
  • 6 篇 monash universit...
  • 6 篇 school of engine...
  • 6 篇 department of ma...
  • 5 篇 department of ma...
  • 5 篇 de la salle univ...
  • 4 篇 institute of inf...
  • 4 篇 school of inform...
  • 4 篇 chitkara univers...
  • 4 篇 college of compu...
  • 4 篇 academy of cyber
  • 4 篇 de la salle univ...
  • 4 篇 tech univ chemni...
  • 4 篇 school of comput...

作者

  • 6 篇 bernady o. apduh...
  • 6 篇 maria irene falc...
  • 6 篇 jorge gustavo ro...
  • 6 篇 osvaldo gervasi
  • 6 篇 ana maria a. c. ...
  • 6 篇 beniamino murgan...
  • 6 篇 sanjay misra
  • 6 篇 carmelo torre
  • 6 篇 david taniar
  • 5 篇 peng jin
  • 5 篇 senthil kumar th...
  • 5 篇 sulakshan vajipa...
  • 5 篇 thangavel senthi...
  • 5 篇 vajipayajula sul...
  • 4 篇 sudeep tanwar
  • 4 篇 narayan d.g.
  • 4 篇 gaedke martin
  • 4 篇 jian su
  • 4 篇 yangzhao yang
  • 4 篇 xiaodong liu

语言

  • 1,253 篇 英文
  • 69 篇 其他
  • 16 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Conference on Computer and Communication Security"
1337 条 记 录,以下是151-160 订阅
排序:
Aspects to determine the acceptance of cloud service: A study of cloud professionals  14
Aspects to determine the acceptance of cloud service: A stud...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Goyal, Pooja Singh Deora, Sukhvinder Dept. of Computer Sci. & App. Haryana India
Cloud computing is an essential innovation in communication and information technology. In today's scenario, any business, big or small, can use cloud services because they are scalable, affordable, and flexible. ... 详细信息
来源: 评论
Blockchain Facilitated Protection and Safety in Cyberphysical Systems from Defective Sensors  14
Blockchain Facilitated Protection and Safety in Cyberphysica...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Banerjee, Projat Guha, Krishnendu Ibm India Private Limited India School of Computer Science and Information Technology Ireland
the cyber physical systems (CPS) are linked to a range of sensors, the data from which is used for decision making and real-time operation. With the introduction of Industry 5.0, which enables human-focused processing... 详细信息
来源: 评论
Dealing with Black-hole Attacks in Inter-vehicle Networks Using the Packet Delivery Rate Algorithm  14
Dealing with Black-hole Attacks in Inter-vehicle Networks Us...
收藏 引用
14th International conference on Information and Knowledge Technology, IKT 2023
作者: Sedighi, Marzieh Hamidkhani, Mehdi Sadeghi, Mostafa Islamic Azad University Dolatabad Branch Department of Computer Engineering Isfahan Iran Branch Department of Electrical Engineering Isfahan Iran Branch Department of Computer Engineering Isfahan Iran
the VANET is a type of case mobile networks (a decentralized type of wireless networks) which includes moving vehicles as nodes in the network that establishes communication among adjacent vehicles as well as stationa... 详细信息
来源: 评论
Blockchain Unleashed: Empowering Information-centric Network Computing in Cloud, Fog, and Edge Services  14
Blockchain Unleashed: Empowering Information-centric Network...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Zambre, Pranav Panchal, Mitali Chouhan, Ankit Parul University Dept. of Computer Science and Engineering Vadodara India
Blockchain technology has been gaining a lot of attention due to its potential to improve data security, privacy, and decentralization. In this paper, we explore the use of blockchain in cloud, fog, and edge computing... 详细信息
来源: 评论
Decentralized Group Authentication of Devices Based on PhysicallyUnclonable Functions Using OneM2MArchitecture  14
Decentralized Group Authentication of Devices Based on Physi...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Saini, Pareena Mahajan, Nitish Kaushal, Sakshi Kumar, Harish Panjab University Department of Computer Science Chandigarh India
the advent of 5G networks brings significant advancements for Machine-to-machine communication as it offers high data rates, network slicing capabilities, and improved network performance. A global wave of M2M connect... 详细信息
来源: 评论
Techniques in reliability of internet of things (IoT)  16
Techniques in reliability of internet of things (IoT)
收藏 引用
16th International conference on ENTERprise Information Systems, CENTERIS 2024 - 12th International conference on Project MANagement, ProjMAN 2024 - 14th International conference on Health and Social Care Information Systems and Technologies, HCist 2024
作者: Singh, Khushwant Yadav, Mohit Singh, Yudhvir Moreira, Fernando Department of Computer Science & Engineering U.I.E.T Maharshi Dayanand University Rohtak124001 India Department of Mathematics University Institute of Sciences Chandigarh University Punjab Mohali140413 India REMIT IJP Universidade Portucalense Porto & IEETA Universidade de Aveiro Aveiro Portugal
the Internet of things (IoT) has rapidly transformed the way we interact with technology, connecting numerous smart devices to the internet. However, with the proliferation of IoT applications, ensuring the reliabilit... 详细信息
来源: 评论
Designing a Testbed for Privacy-Preserving Voice-based Social Networks  19
Designing a Testbed for Privacy-Preserving Voice-based Socia...
收藏 引用
19th International conference on Future Networks and communications, FNC 2024 / 21st International conference on Mobile Systems and Pervasive Computing, MobiSPC 2024 / 14th International conference on Sustainable Energy Information Technology, SEIT 2024
作者: Jung, Youna Knoury Colleage of Computer Science Northeastern University 1300 17th St N 1500 ArlingtonVA22209 United States
Over the past decade, existing online social networks have emerged as vital platforms for fostering and nurturing social relationships. However, their reliance on text and multimedia-based interactions has posed limit... 详细信息
来源: 评论
Evaluating AI and ML in Network security: A Comprehensive Literature Review  15
Evaluating AI and ML in Network Security: A Comprehensive Li...
收藏 引用
15th International conference on Emerging Ubiquitous Systems and Pervasive Networks / 14th International conference on Current and Future Trends of Information and communication Technologies in Healthcare, EUSPN/ICth 2024
作者: Gharbaoui, Ouissale El Kiyadi, Ikrame Boukhari, Hayat El Faculty of Law Economics and Social Sciences Sidi Mohammed Ben Abdellah University Fez28810 Morocco Prof.essor of Higher Education Student1Faculty of Law Economics and Social Sciences Sidi Mohammed Ben Abdellah University Fez28810 Morocco
Machine learning (ML) and artificial intelligence (AI) have emerged as pivotal tools for enhancing network security in the 21st century, offering innovative approaches that surpass traditional methods. this paper cond... 详细信息
来源: 评论
Optimization with Blockchain based Secure Authentication and Collaborative Data Sharing Model in Cloud  14
Optimization with Blockchain based Secure Authentication and...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Kavita, Shelke Shinde, S.K. Fr. C. Rodrigues Institute of Technology Vashi Department of Computer Engineering Navi Mumbai India Lokmanya Tilak College of Engineering Koparkhairane Department of Computer Engineering Navi Mumbai India
Cloud computing has become a critical technology to meet infrastructure and data service needs cost-effectively, with minimal effort, and with a high degree of scalability. It is widespread in many facets. Although th... 详细信息
来源: 评论
NetMiner: Identifying Failure-Inducing Patterns in the Logs Generated by Network Monitoring Software  14
NetMiner: Identifying Failure-Inducing Patterns in the Logs ...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Sathi, Gowtham Reddy Vedullapalli, Lokesh Kishan, MacHarla Hemanth Zaman, Tarannum Shaila Islam, Md Tariqul Badr, Mahmoud M. Suny Polytechnic Institute Dept. of Computer and Information Science UticaNY United States SyracuseNY United States Suny Polytechnic Institute Dept. of Network and Computer Security UticaNY United States
To ensure uninterrupted network communication among multiple sources, the network administrator needs to do real-time monitoring of network logs. Due to its huge volume and streaming nature, it is almost impossible to... 详细信息
来源: 评论