咨询与建议

限定检索结果

文献类型

  • 1,274 篇 会议
  • 51 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 1,335 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 871 篇 工学
    • 750 篇 计算机科学与技术...
    • 573 篇 软件工程
    • 237 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 70 篇 生物工程
    • 60 篇 安全科学与工程
    • 53 篇 电气工程
    • 46 篇 生物医学工程(可授...
    • 42 篇 电子科学与技术(可...
    • 41 篇 网络空间安全
    • 39 篇 机械工程
    • 38 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 21 篇 光学工程
    • 18 篇 建筑学
  • 213 篇 理学
    • 96 篇 数学
    • 75 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 29 篇 物理学
    • 27 篇 系统科学
  • 160 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 78 篇 法学
    • 50 篇 社会学
    • 29 篇 法学
  • 42 篇 医学
    • 42 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 24 篇 教育学
    • 22 篇 教育学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 18 篇 军事学
  • 13 篇 农学
  • 3 篇 艺术学

主题

  • 112 篇 security
  • 53 篇 authentication
  • 43 篇 cryptography
  • 41 篇 internet of thin...
  • 40 篇 computer communi...
  • 35 篇 blockchain
  • 34 篇 network security
  • 24 篇 systems and data...
  • 22 篇 wireless communi...
  • 22 篇 protocols
  • 19 篇 intrusion detect...
  • 19 篇 machine learning
  • 19 篇 privacy
  • 18 篇 computer archite...
  • 18 篇 computer securit...
  • 17 篇 access control
  • 17 篇 information syst...
  • 17 篇 software enginee...
  • 17 篇 algorithm analys...
  • 17 篇 training

机构

  • 7 篇 department of el...
  • 7 篇 college of compu...
  • 6 篇 department of in...
  • 6 篇 department of pr...
  • 6 篇 university of mi...
  • 6 篇 dicar polytecnic...
  • 6 篇 department of co...
  • 6 篇 monash universit...
  • 6 篇 school of engine...
  • 6 篇 department of ma...
  • 5 篇 department of ma...
  • 5 篇 de la salle univ...
  • 4 篇 institute of inf...
  • 4 篇 school of inform...
  • 4 篇 chitkara univers...
  • 4 篇 college of compu...
  • 4 篇 academy of cyber
  • 4 篇 de la salle univ...
  • 4 篇 tech univ chemni...
  • 4 篇 school of comput...

作者

  • 6 篇 bernady o. apduh...
  • 6 篇 maria irene falc...
  • 6 篇 jorge gustavo ro...
  • 6 篇 osvaldo gervasi
  • 6 篇 ana maria a. c. ...
  • 6 篇 beniamino murgan...
  • 6 篇 sanjay misra
  • 6 篇 carmelo torre
  • 6 篇 david taniar
  • 5 篇 peng jin
  • 5 篇 senthil kumar th...
  • 5 篇 sulakshan vajipa...
  • 5 篇 thangavel senthi...
  • 5 篇 vajipayajula sul...
  • 4 篇 sudeep tanwar
  • 4 篇 narayan d.g.
  • 4 篇 gaedke martin
  • 4 篇 jian su
  • 4 篇 yangzhao yang
  • 4 篇 xiaodong liu

语言

  • 1,256 篇 英文
  • 64 篇 其他
  • 16 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Conference on Computer and Communication Security"
1335 条 记 录,以下是31-40 订阅
排序:
Analyzing Network Traffic Features for IoT Malware Detection through Forensic Methods  14
Analyzing Network Traffic Features for IoT Malware Detection...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Kapoor, Mehak Patidar, Nitesh Arya, Namita Centre of Internet of Things MITS Gwalior Madhya Pradesh India
this emerges as an issue given that the rapid proliferation of IoT (Internet of things) devices came alongside several security issues in which IoT malware became an issue of interest in this regard. Due to the fact t... 详细信息
来源: 评论
Network and security Solution using Jaya Algorithm-based graph search for Drone Transportation  14
Network and Security Solution using Jaya Algorithm-based gra...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Patel, Pramod Kumar Khan, Nikhat Raza Mishra, Aishwarya Agrawal, Akrati Daravai, Archana Department of Electronics and Communication Engineering IES College of Technology Bhopal India Department of Computer Science and Engineering IES College of Technology Bhopal India
this study reports the suitability of several algorithms to identify the best course in a network of lines that is utilized to guide an Unmanned Arial Vehicle (UAV) aircraft in a safety configuration. It utilizes a wa... 详细信息
来源: 评论
Mitigating security Vulnerabilities in Cloud-Based Home Automation through Advanced Edge Computing: A Comprehensive Framework for Privacy Enhancement and Data Protection  14
Mitigating Security Vulnerabilities in Cloud-Based Home Auto...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Kumar, Biresh Kumari, Shreya Kumar, Ritesh Singh, Vineet Kumar Sharma, Binod Kumar Gupta, Kamaldeep Amity Institute of Information Technology Amity University Jharkhand Jharkhand Ranchi India Cambridge Institute of Technology Tatisilwai Jharkhand Ranchi India Dept Of IT Dr. R.M.L. Avadh University UP Ayodhya India Dept. of Computer Sci. & Engg. BIT Mesra Jharkhand Ranchi India St. Xavier’s College Jharkhand Ranchi India
With the soaring adoption of cloud-constructed home automation systems with CAGR of 8.5% from 2023 to 2030, security and privacy concerns have become critical considerations. this paper examines the security risks in ... 详细信息
来源: 评论
the Evolution of Cloud Computing: A Study of Aspirational Technologies and Practical Achievements  14
The Evolution of Cloud Computing: A Study of Aspirational Te...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Upreti, Kamal Jain, Rituraj Kumar, Raj Goyal, Kamal Deepika Gupta, Komal Dept. of Computer Sciecne CHRIST University DelhiNCR India Dept. of IT Marwadi University Gujarat Rajkot India Gautam Buddha University U.P Gautam Budh Nagar India Pimpri Chinchwad University Pune India Dept. of Computer Science & Engg. Maharishi MM Haryana Ambala India Accenture Bangalore India
Cloud computing has transformed the digital landscape, providing scalability, cost efficiency, and seamless access to computing resources. Yet, there is a gap between its theoretical aspirations and real-world achieve... 详细信息
来源: 评论
Image-based DeepFake Detection Using Artificial Intelligence  14
Image-based DeepFake Detection Using Artificial Intelligence
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Singh, Shailendra Kumar Kumar, Gautam Dubey, Aditya Kumar Yadav, Ritik Rai, Vishal Sharma, Anil Department of Computer Science and Engineering Amity University Noida India
the increasing sophistication of deepfake technology poses significant risks to privacy, security, and public trust in digital media. As a result, deepfake detection has become a critical research area, with artificia... 详细信息
来源: 评论
Deep Learning Enabled Secure IoT Module for Smart Agriculture in Diverse Environmental Conditions  14
Deep Learning Enabled Secure IoT Module for Smart Agricultur...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Ansari, Shaharyar Alam Ali, Salman Luqman, Mohammad Ahmad, Shahnawaz School of Computer Science Engineering and Technology Bennett University Greater Noida India Department of Computer Science Aligrah Muslim University Aligarh India
the Internet of things (IoT) stands as a revolutionary technology which impacts smart agriculture and different sectors beyond it. the research describes an intelligent IoT-enabled monitoring system which uses sensors... 详细信息
来源: 评论
Advanced Fault Sleuth System Architectures for Prognostic Anomaly Detection and Autonomous Irregularity Mitigation in Intelligent Power Networks  14
Advanced Fault Sleuth System Architectures for Prognostic An...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Kumar, Biresh Anurag, Arpit Anand, Sanyam Kumar, Ritesh Gupta, Kamaldeep Sharma, Binod Kumar Amity Inst. of Information Technology Amity University Jharkhand Ranchi India Cambridge Institute of Technology Tatisilwai Jharkhand Ranchi India St. Xavier’s College Jharkhand Ranchi India Dept. of Computer Sci. & Engg. BIT Mesra Jharkhand Ranchi India
Revenue losses, inconsistent service, delayed problem detection, and electricity theft are just a few of the major issues that power distribution networks deal with. the suggested Fault Sleuth System makes use of Inte... 详细信息
来源: 评论
Techniques in reliability of internet of things (IoT)  16
Techniques in reliability of internet of things (IoT)
收藏 引用
16th International conference on ENTERprise Information Systems, CENTERIS 2024 - 12th International conference on Project MANagement, ProjMAN 2024 - 14th International conference on Health and Social Care Information Systems and Technologies, HCist 2024
作者: Singh, Khushwant Yadav, Mohit Singh, Yudhvir Moreira, Fernando Department of Computer Science & Engineering U.I.E.T Maharshi Dayanand University Rohtak124001 India Department of Mathematics University Institute of Sciences Chandigarh University Punjab Mohali140413 India REMIT IJP Universidade Portucalense Porto & IEETA Universidade de Aveiro Aveiro Portugal
the Internet of things (IoT) has rapidly transformed the way we interact with technology, connecting numerous smart devices to the internet. However, with the proliferation of IoT applications, ensuring the reliabilit... 详细信息
来源: 评论
Perceptual Learning Technology Based on computer Vision and Machine Learning Algorithms  14
Perceptual Learning Technology Based on Computer Vision and ...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Wang, Tianjian School of Computer Science and Technology Wuhan Qingchuan University Hubei Wuhan430204 China
To address the issue of low accuracy and poor robustness of perceptual learning in complex scenarios, a new method integrating computer vision and machine learning is adopted, that is, by applying deep neural networks... 详细信息
来源: 评论
Enhancing IoT Cyber Attack Detection in the Presence of Highly Imbalanced Data  14
Enhancing IoT Cyber Attack Detection in the Presence of High...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Haque, Md. Ehsanul Polash, Md. Saymon Hosen Al-Imran, Md. Simla, Sanjida Hossain, Md Alomgir Jahan, Sarwar Department of Computer Science and Engineering East West University Dhaka Bangladesh
Due to the rapid growth in the number of Internet of things (IoT) networks, the cyber risk has increased exponentially, and therefore, we have to develop effective IDS that can work well with highly imbalanced dataset... 详细信息
来源: 评论