咨询与建议

限定检索结果

文献类型

  • 1,273 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 1,283 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 870 篇 工学
    • 749 篇 计算机科学与技术...
    • 573 篇 软件工程
    • 236 篇 信息与通信工程
    • 88 篇 控制科学与工程
    • 70 篇 生物工程
    • 60 篇 安全科学与工程
    • 53 篇 电气工程
    • 46 篇 生物医学工程(可授...
    • 42 篇 电子科学与技术(可...
    • 40 篇 网络空间安全
    • 38 篇 机械工程
    • 38 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 21 篇 光学工程
    • 18 篇 建筑学
  • 213 篇 理学
    • 96 篇 数学
    • 75 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 29 篇 物理学
    • 27 篇 系统科学
  • 160 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 78 篇 法学
    • 50 篇 社会学
    • 29 篇 法学
  • 42 篇 医学
    • 42 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 24 篇 教育学
    • 22 篇 教育学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 18 篇 军事学
  • 13 篇 农学
  • 3 篇 艺术学

主题

  • 107 篇 security
  • 53 篇 authentication
  • 43 篇 cryptography
  • 41 篇 internet of thin...
  • 35 篇 blockchain
  • 34 篇 network security
  • 22 篇 wireless communi...
  • 22 篇 protocols
  • 19 篇 intrusion detect...
  • 19 篇 machine learning
  • 19 篇 privacy
  • 18 篇 computer archite...
  • 18 篇 computer securit...
  • 17 篇 access control
  • 17 篇 training
  • 16 篇 wireless sensor ...
  • 16 篇 real-time system...
  • 15 篇 communication sy...
  • 15 篇 servers
  • 15 篇 cybersecurity

机构

  • 7 篇 department of el...
  • 7 篇 college of compu...
  • 5 篇 department of ma...
  • 5 篇 de la salle univ...
  • 4 篇 institute of inf...
  • 4 篇 chitkara univers...
  • 4 篇 college of compu...
  • 4 篇 de la salle univ...
  • 4 篇 tech univ chemni...
  • 4 篇 school of comput...
  • 3 篇 amrita vishwa vi...
  • 3 篇 school of comput...
  • 3 篇 kle technologica...
  • 3 篇 department of co...
  • 3 篇 school of comput...
  • 3 篇 college of mathe...
  • 3 篇 department of co...
  • 3 篇 amrita vishwa vi...
  • 3 篇 department of co...
  • 3 篇 department of co...

作者

  • 5 篇 peng jin
  • 5 篇 senthil kumar th...
  • 5 篇 sulakshan vajipa...
  • 5 篇 thangavel senthi...
  • 5 篇 vajipayajula sul...
  • 4 篇 sudeep tanwar
  • 4 篇 narayan d.g.
  • 4 篇 gaedke martin
  • 4 篇 tanwar sudeep
  • 4 篇 ronnie concepcio...
  • 3 篇 srinivasan karti...
  • 3 篇 prakash duraisam...
  • 3 篇 hanaoka goichiro
  • 3 篇 kartik srinivasa...
  • 3 篇 wang haoran
  • 3 篇 cui xinyue
  • 3 篇 mohana
  • 3 篇 tibrewal anjali
  • 3 篇 bandala argel
  • 3 篇 duraisamy prakas...

语言

  • 1,205 篇 英文
  • 63 篇 其他
  • 16 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Conference on Computer and Communication Security"
1283 条 记 录,以下是41-50 订阅
排序:
15th International conference on Emerging Ubiquitous Systems and Pervasive Networks / 14th International conference on Current and Future Trends of Information and communication Technologies in Healthcare, EUSPN/ICth 2024
15th International Conference on Emerging Ubiquitous Systems...
收藏 引用
15th International conference on Emerging Ubiquitous Systems and Pervasive Networks / 14th International conference on Current and Future Trends of Information and communication Technologies in Healthcare, EUSPN/ICth 2024
the proceedings contain 115 papers. the topics discussed include: receding horizon and optimization-based control for UAV path planning with collision avoidance;application of machine learning in technological forecas...
来源: 评论
security Implications of Augmented Reality in Healthcare: Integrating Human-computer Interaction for Modern Systems  14
Security Implications of Augmented Reality in Healthcare: In...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Alyami, Raneem Y. Department of information technology College of Computer and Information Technology Taif University PO Box. 11099 Taif21994 Saudi Arabia
the current study presents a risk assessment and mitigation framework based on augmented reality (AR) used in healthcare systems to improve human-computer interaction and assistive technology. the proposed approach is... 详细信息
来源: 评论
Enhancing Trustworthiness and security in Cloud Environments: A Review of Methodologies and Advancements  14
Enhancing Trustworthiness and Security in Cloud Environments...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Kaur, Manpreet Singh, Sarpreet Mata Gujri College Pg Department of Computer Science Fatehgarh Sahib India Sri Guru Granth Sahib World University Department of Computer Science Fatehgarh Sahib India
Cloud Computing has reformed the way agencies manage and store their data by offering scalable and flexible computing resources. However, data security and trustworthiness in the cloud remain major concerns. Trust-bas... 详细信息
来源: 评论
Storage Optimization of Product Traceability System Based on Blockchain  14
Storage Optimization of Product Traceability System Based on...
收藏 引用
14th IEEE International conference on Electronics Information and Emergency communication, ICEIEC 2024
作者: Huang, Jiahuan Shen, Wei Yu, Jie Liu, Qiang Hu, Tao Wei, Jianghao Duan, Xiaoqiu School of Computer Science and Engineering Wuhan Institute of Technology Hubei Province Wuhan430205 China
To address the storage capacity limitations and high costs inherent in the existing single-chain storage model of blockchain-based traceability systems, a strategy combining on-chain and off-chain storage using IPFS a... 详细信息
来源: 评论
Zero Knowledge based Authentication for Internet of Medical things  14
Zero Knowledge based Authentication for Internet of Medical ...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Misha, Garima Hazela, Bramah Chaurasia, Brijesh Kumar Amity University Uttar Pradesh Computer Science and Engineering Amity School of Engineering and Technology Lucknow India Pranveer Sing Institute of Technology Computer Science and Engineering Kanpur India
Internet of things (IoT) applications, such as e-healthcare departments have grown tremendously where devices gather patient data and instantly transmit it over a distance to servers. Despite its huge advantages, IoT ... 详细信息
来源: 评论
Building Secure and Decentralized Survey Methodology: A Comprehensive Solution with FIDO2 Authentication and Fluree  14
Building Secure and Decentralized Survey Methodology: A Comp...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Balachandher, Jawahar Dongre, Chandana Bhattacharyya, Somanshu Hunashikatti, Rohit Sarasvathi, V. Department of Computer Science and Engineering PES University Karnataka Bangalore India
Traditional survey systems struggle with data immutability, privacy protection, and reliable storage. these limitations compromise transparency, security, and data integrity. this paper proposes a decentralized and se... 详细信息
来源: 评论
Analysis and study of IDSs for cybersecurity vulnerability detection and prevention: A Comprehensive Review  14
Analysis and study of IDSs for cybersecurity vulnerability d...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Shaji, Lijin Suji Pramila, R. Noorul Islam Center for Higher Education Thucklay Computer Applications Tamil Nadu 629180 India Mar Baselios Institute of Technology and Science Computer Science and Engineering Kerala Kothamangalam686693 India
Smart environments are worried about private keys and security problems. To prevent security attacks, which take benefit of a few of these intrusion detection systems (IDSs) and security vulnerabilities, were modeled.... 详细信息
来源: 评论
Comparison Of MQTT And COAP Protocol Using Contiki OS For Low Power And Lossy Networks In IoT  14
Comparison Of MQTT And COAP Protocol Using Contiki OS For Lo...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Behal, Anil Chandigarh University Department of Computer Science Gharuan Mohali140413 India
In the Internet of things, Power consumption has always been an issue, particularly for small wireless devices. the device requires a consistent flow of electricity. For the development of sustainable and energy-effic... 详细信息
来源: 评论
Intrusion Detection at the Edge Computing: A Deep Learning Approach Using the UNSW-NB15 Dataset  14
Intrusion Detection at the Edge Computing: A Deep Learning A...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Kumar, Vipin Kumar, Vivek Bhadauria, Abhay Pratap Singh Dixit, Jay Kumar, Amit Haridwar India Department of Computer Engineering & Applications GLA University UP Mathura India
Edge computing has transformed technology by enabling seamless connections between IoT devices, but it also introduces significant security challenges. EC is crucial for providing minimal latency processing and reduci... 详细信息
来源: 评论
Underpinning of Resource-Constrained IoT Networks: Analysis and Countermeasures for Attacks and Vulnerabilities  14
Underpinning of Resource-Constrained IoT Networks: Analysis ...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Singh, Umeshwer Sood, Manu Bhadoria, Robin Singh Department of Computer Science Himachal Pradesh University Shimla India Department of Computer Science and Engineering National Institute of Technology Hamirpur Himachal Pradesh India
the Internet of things integrate various electronics devices on common platform as objects over the Internet. IoT devices have limited capabilities, such as low power, less memory, and low computational processing. Be... 详细信息
来源: 评论