咨询与建议

限定检索结果

文献类型

  • 1,274 篇 会议
  • 51 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 1,335 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 871 篇 工学
    • 750 篇 计算机科学与技术...
    • 573 篇 软件工程
    • 237 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 70 篇 生物工程
    • 60 篇 安全科学与工程
    • 53 篇 电气工程
    • 46 篇 生物医学工程(可授...
    • 42 篇 电子科学与技术(可...
    • 41 篇 网络空间安全
    • 39 篇 机械工程
    • 38 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 21 篇 光学工程
    • 18 篇 建筑学
  • 213 篇 理学
    • 96 篇 数学
    • 75 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 29 篇 物理学
    • 27 篇 系统科学
  • 160 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 78 篇 法学
    • 50 篇 社会学
    • 29 篇 法学
  • 42 篇 医学
    • 42 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 24 篇 教育学
    • 22 篇 教育学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 18 篇 军事学
  • 13 篇 农学
  • 3 篇 艺术学

主题

  • 112 篇 security
  • 53 篇 authentication
  • 43 篇 cryptography
  • 41 篇 internet of thin...
  • 40 篇 computer communi...
  • 35 篇 blockchain
  • 34 篇 network security
  • 24 篇 systems and data...
  • 22 篇 wireless communi...
  • 22 篇 protocols
  • 19 篇 intrusion detect...
  • 19 篇 machine learning
  • 19 篇 privacy
  • 18 篇 computer archite...
  • 18 篇 computer securit...
  • 17 篇 access control
  • 17 篇 information syst...
  • 17 篇 software enginee...
  • 17 篇 algorithm analys...
  • 17 篇 training

机构

  • 7 篇 department of el...
  • 7 篇 college of compu...
  • 6 篇 department of in...
  • 6 篇 department of pr...
  • 6 篇 university of mi...
  • 6 篇 dicar polytecnic...
  • 6 篇 department of co...
  • 6 篇 monash universit...
  • 6 篇 school of engine...
  • 6 篇 department of ma...
  • 5 篇 department of ma...
  • 5 篇 de la salle univ...
  • 4 篇 institute of inf...
  • 4 篇 school of inform...
  • 4 篇 chitkara univers...
  • 4 篇 college of compu...
  • 4 篇 academy of cyber
  • 4 篇 de la salle univ...
  • 4 篇 tech univ chemni...
  • 4 篇 school of comput...

作者

  • 6 篇 bernady o. apduh...
  • 6 篇 maria irene falc...
  • 6 篇 jorge gustavo ro...
  • 6 篇 osvaldo gervasi
  • 6 篇 ana maria a. c. ...
  • 6 篇 beniamino murgan...
  • 6 篇 sanjay misra
  • 6 篇 carmelo torre
  • 6 篇 david taniar
  • 5 篇 peng jin
  • 5 篇 senthil kumar th...
  • 5 篇 sulakshan vajipa...
  • 5 篇 thangavel senthi...
  • 5 篇 vajipayajula sul...
  • 4 篇 sudeep tanwar
  • 4 篇 narayan d.g.
  • 4 篇 gaedke martin
  • 4 篇 jian su
  • 4 篇 yangzhao yang
  • 4 篇 xiaodong liu

语言

  • 1,256 篇 英文
  • 64 篇 其他
  • 16 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Conference on Computer and Communication Security"
1335 条 记 录,以下是21-30 订阅
排序:
Building Secure and Decentralized Survey Methodology: A Comprehensive Solution with FIDO2 Authentication and Fluree  14
Building Secure and Decentralized Survey Methodology: A Comp...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Balachandher, Jawahar Dongre, Chandana Bhattacharyya, Somanshu Hunashikatti, Rohit Sarasvathi, V. Department of Computer Science and Engineering PES University Karnataka Bangalore India
Traditional survey systems struggle with data immutability, privacy protection, and reliable storage. these limitations compromise transparency, security, and data integrity. this paper proposes a decentralized and se... 详细信息
来源: 评论
Decentralised Cloud Architecture: Blockchain Driven Integrity and Raptor Codes for Enhanced Data Transmission  14
Decentralised Cloud Architecture: Blockchain Driven Integrit...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Preethi, M. Kale, Ayush Satheesh, Pooja Harshitha, R. Rohith Vaidya, K. Department of Computer Science PES University Bangalore India
Ensuring data integrity and security has become integral in the digital era. Blockchain, an immutable ledger can be leveraged to provide data integrity to the cloud system. Centralised cloud systems present challenges... 详细信息
来源: 评论
Intrusion Detection at the Edge Computing: A Deep Learning Approach Using the UNSW-NB15 Dataset  14
Intrusion Detection at the Edge Computing: A Deep Learning A...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Kumar, Vipin Kumar, Vivek Bhadauria, Abhay Pratap Singh Dixit, Jay Kumar, Amit Haridwar India Department of Computer Engineering & Applications GLA University UP Mathura India
Edge computing has transformed technology by enabling seamless connections between IoT devices, but it also introduces significant security challenges. EC is crucial for providing minimal latency processing and reduci... 详细信息
来源: 评论
LIGHT-YOLOv11: An Efficient S mall Object Detection Model for UAV Images  14
LIGHT-YOLOv11: An Efficient S mall Object Detection Model fo...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Dewangan, Bhimendra Srinivas, M. Computer Science and Information Security National Institute of Technology Warangal India Computer Science and Engineering National Institute of Technology Warangal India
Object recognition in UAV images is very challenging due to the frequent appearance of numerous small and truncated entities. Object detection is an essential component of computer vision for accurate object localizat... 详细信息
来源: 评论
A Hardware Trojan Detection using Machine Learning Technique  14
A Hardware Trojan Detection using Machine Learning Technique
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Jaiswal, Yashasvi Sitaraman, S. Harihara VIT Bhopal University Bhopal India
Hardware Trojan is a major vulnerability in the security of the system. Various researchers have worked on the hardware Trojan detection and prevention techniques as solutions that are based on traditional methods suc... 详细信息
来源: 评论
Underpinning of Resource-Constrained IoT Networks: Analysis and Countermeasures for Attacks and Vulnerabilities  14
Underpinning of Resource-Constrained IoT Networks: Analysis ...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Singh, Umeshwer Sood, Manu Bhadoria, Robin Singh Department of Computer Science Himachal Pradesh University Shimla India Department of Computer Science and Engineering National Institute of Technology Hamirpur Himachal Pradesh India
the Internet of things integrate various electronics devices on common platform as objects over the Internet. IoT devices have limited capabilities, such as low power, less memory, and low computational processing. Be... 详细信息
来源: 评论
Deep Learning Techniques for Intrusion Detection Systems in Healthcare Environments  14
Deep Learning Techniques for Intrusion Detection Systems in ...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Alam, Mahfooz Ashraf, Zubair Singh, Priya Pandey, Bishwajeet Rehman, Kaleemur Aldasheva, Laura Department of Master of Computer Applications G. L. Bajaj Institute of Technology and Management Greater Noida201306 India College of Computing and Information Technology University of Bisha Bisha67714 Saudi Arabia Department of Computer Science Institute of Engineering & Technology Dr. B. R. Ambedkar University Khandri Agra India Department of CSE-AI G. L. Bajaj Institute of Technology and Management Greater Noida201306 India Department of IS and CS Astana IT University Astana Kazakhstan
Nowadays, healthcare systems face ever-increasing cyber security threats due to the sensitive nature of patient data and the proliferation of IoT-enabled medical devices. Traditional Intrusion Detection Systems (IDS) ... 详细信息
来源: 评论
Intelligent Anti-theft System with Automated Spray Control using ESP32 WROOM  14
Intelligent Anti-Theft System with Automated Spray Control u...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Shanmugam, Geetha Balusamy, Deepa Elamparithi, S. Vetriselvan, R. Praamoth, Mourin S. Department of Computer Science and Engineering Nandha Engineering College Erode India
this project demonstrates a low-cost anti-theft solution built around the ESP32-WROOM microcontroller, with integrated chemical spray for security. the system is designed to detect unauthorized entry and respond with ... 详细信息
来源: 评论
Proceedings of the acm workshop on survivable and self-regenerative systems (In association with 10th acm conference on computer communication security)
Proceedings of the ACM workshop on survivable and self-regen...
收藏 引用
Proceedings of the acm Workshop on Survivable and Self-Regenerative Systems (In Association with 10th acm conference on computer communications security)
the proceedings contains 14 papers of the conference on Proceedings of the acm Workshop On Survivable and Self-Regenerative Systems (In Association With 10th acm conference On computer communication security). the top... 详细信息
来源: 评论
Dynamic Forensic Analysis of CryptBot Malware  14
Dynamic Forensic Analysis of CryptBot Malware
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Rahman, Rizwan Ur Acharya, Abanteeka Deb, Sanjipan Panchal, Priyanshi Vellore Institute of Technology Bhopal Madhya Pradesh Bhopal India
CryptBot, an infostealer malware first identified in 2019, poses a serious threat by stealing sensitive data, including login credentials and cryptocurrency wallet details, and transmitting them to command-and-control... 详细信息
来源: 评论