咨询与建议

限定检索结果

文献类型

  • 1,273 篇 会议
  • 51 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 1,334 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 870 篇 工学
    • 749 篇 计算机科学与技术...
    • 573 篇 软件工程
    • 236 篇 信息与通信工程
    • 88 篇 控制科学与工程
    • 70 篇 生物工程
    • 60 篇 安全科学与工程
    • 53 篇 电气工程
    • 46 篇 生物医学工程(可授...
    • 42 篇 电子科学与技术(可...
    • 40 篇 网络空间安全
    • 38 篇 机械工程
    • 38 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 21 篇 光学工程
    • 18 篇 建筑学
  • 213 篇 理学
    • 96 篇 数学
    • 75 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 29 篇 物理学
    • 27 篇 系统科学
  • 160 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 78 篇 法学
    • 50 篇 社会学
    • 29 篇 法学
  • 42 篇 医学
    • 42 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 24 篇 教育学
    • 22 篇 教育学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 18 篇 军事学
  • 13 篇 农学
  • 3 篇 艺术学

主题

  • 112 篇 security
  • 53 篇 authentication
  • 43 篇 cryptography
  • 41 篇 internet of thin...
  • 40 篇 computer communi...
  • 35 篇 blockchain
  • 34 篇 network security
  • 24 篇 systems and data...
  • 22 篇 wireless communi...
  • 22 篇 protocols
  • 19 篇 intrusion detect...
  • 19 篇 machine learning
  • 19 篇 privacy
  • 18 篇 computer archite...
  • 18 篇 computer securit...
  • 17 篇 access control
  • 17 篇 information syst...
  • 17 篇 software enginee...
  • 17 篇 algorithm analys...
  • 17 篇 training

机构

  • 7 篇 department of el...
  • 7 篇 college of compu...
  • 6 篇 department of in...
  • 6 篇 department of pr...
  • 6 篇 university of mi...
  • 6 篇 dicar polytecnic...
  • 6 篇 department of co...
  • 6 篇 monash universit...
  • 6 篇 school of engine...
  • 6 篇 department of ma...
  • 5 篇 department of ma...
  • 5 篇 de la salle univ...
  • 4 篇 institute of inf...
  • 4 篇 school of inform...
  • 4 篇 chitkara univers...
  • 4 篇 college of compu...
  • 4 篇 academy of cyber
  • 4 篇 de la salle univ...
  • 4 篇 tech univ chemni...
  • 4 篇 school of comput...

作者

  • 6 篇 bernady o. apduh...
  • 6 篇 maria irene falc...
  • 6 篇 jorge gustavo ro...
  • 6 篇 osvaldo gervasi
  • 6 篇 ana maria a. c. ...
  • 6 篇 beniamino murgan...
  • 6 篇 sanjay misra
  • 6 篇 carmelo torre
  • 6 篇 david taniar
  • 5 篇 peng jin
  • 5 篇 senthil kumar th...
  • 5 篇 sulakshan vajipa...
  • 5 篇 thangavel senthi...
  • 5 篇 vajipayajula sul...
  • 4 篇 sudeep tanwar
  • 4 篇 narayan d.g.
  • 4 篇 gaedke martin
  • 4 篇 jian su
  • 4 篇 yangzhao yang
  • 4 篇 xiaodong liu

语言

  • 1,256 篇 英文
  • 63 篇 其他
  • 16 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Conference on Computer and Communication Security"
1334 条 记 录,以下是51-60 订阅
排序:
Deep Learning Enabled Secure IoT Module for Smart Agriculture in Diverse Environmental Conditions  14
Deep Learning Enabled Secure IoT Module for Smart Agricultur...
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Ansari, Shaharyar Alam Ali, Salman Luqman, Mohammad Ahmad, Shahnawaz School of Computer Science Engineering and Technology Bennett University Greater Noida India Department of Computer Science Aligrah Muslim University Aligarh India
the Internet of things (IoT) stands as a revolutionary technology which impacts smart agriculture and different sectors beyond it. the research describes an intelligent IoT-enabled monitoring system which uses sensors... 详细信息
来源: 评论
Person Image Generation To Enhance the Input Training Image For Re-Identification  14
Person Image Generation To Enhance The Input Training Image ...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Anjali, P.S. Rahamathulla, K. Swaraj, K.P. Government Engineering College Department of Computer Science and Engineering Thrissur India Government Engineering College Sreekrishnapuram Department of Computer Science and Engineering Palakkad India
the process of recognizing a person from photos or videos taken with a different camera is called re-identification (reID). In today's world, the widespread use of extensive networks of CCTV and security cameras m... 详细信息
来源: 评论
CCSW'23: 2023 Cloud Computing security Workshop  30
CCSW'23: 2023 Cloud Computing Security Workshop
收藏 引用
30th acm SIGSAC conference on computer and communications security (acm CCS)
作者: Regazzoni, Francesco Fournaris, Apostolos Univ Amsterdam Amsterdam Netherlands Univ Svizzera Lugano Switzerland Res Ctr ATHENA Ind Syst Inst Athens Greece
Clouds and massive-scale computing infrastructures are starting to dominate computing and will likely continue to do so for the foreseeable future. Major cloud operators are now comprising millions of cores hosting su... 详细信息
来源: 评论
Zero Trust Architecture Using Hyperledger Fabric  14
Zero Trust Architecture Using Hyperledger Fabric
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Awale, Vinayak Gaikwad, Siddharth Pune India Coep Technological University Computer Science & Engineering Pune India
Traditional security measures focused on network perimeter protection are no longer sufficient to defend against cyber threats in the quickly changing digital environment of today. A zero-trust architecture (ZTA), whi... 详细信息
来源: 评论
Design and simulation experiments of the security model for edge devices of government terminal networks  5
Design and simulation experiments of the security model for ...
收藏 引用
5th International conference on computer communication and Network security, CCNS 2024
作者: Wu, Yuqiang Wu, Yubao College of Information Technology Nanjing Police University Jiangsu Nanjing210023 China
Due to the significant asymmetry between the high frequency of access and the low protection level of government networks and their edge devices, there is a considerable risk of being targeted by hackers. this study i... 详细信息
来源: 评论
15th International conference on Emerging Ubiquitous Systems and Pervasive Networks / 14th International conference on Current and Future Trends of Information and communication Technologies in Healthcare, EUSPN/ICth 2024
15th International Conference on Emerging Ubiquitous Systems...
收藏 引用
15th International conference on Emerging Ubiquitous Systems and Pervasive Networks / 14th International conference on Current and Future Trends of Information and communication Technologies in Healthcare, EUSPN/ICth 2024
the proceedings contain 115 papers. the topics discussed include: receding horizon and optimization-based control for UAV path planning with collision avoidance;application of machine learning in technological forecas...
来源: 评论
Enhancing Trustworthiness and security in Cloud Environments: A Review of Methodologies and Advancements  14
Enhancing Trustworthiness and Security in Cloud Environments...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Kaur, Manpreet Singh, Sarpreet Mata Gujri College Pg Department of Computer Science Fatehgarh Sahib India Sri Guru Granth Sahib World University Department of Computer Science Fatehgarh Sahib India
Cloud Computing has reformed the way agencies manage and store their data by offering scalable and flexible computing resources. However, data security and trustworthiness in the cloud remain major concerns. Trust-bas... 详细信息
来源: 评论
Storage Optimization of Product Traceability System Based on Blockchain  14
Storage Optimization of Product Traceability System Based on...
收藏 引用
14th IEEE International conference on Electronics Information and Emergency communication, ICEIEC 2024
作者: Huang, Jiahuan Shen, Wei Yu, Jie Liu, Qiang Hu, Tao Wei, Jianghao Duan, Xiaoqiu School of Computer Science and Engineering Wuhan Institute of Technology Hubei Province Wuhan430205 China
To address the storage capacity limitations and high costs inherent in the existing single-chain storage model of blockchain-based traceability systems, a strategy combining on-chain and off-chain storage using IPFS a... 详细信息
来源: 评论
Zero Knowledge based Authentication for Internet of Medical things  14
Zero Knowledge based Authentication for Internet of Medical ...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Misha, Garima Hazela, Bramah Chaurasia, Brijesh Kumar Amity University Uttar Pradesh Computer Science and Engineering Amity School of Engineering and Technology Lucknow India Pranveer Sing Institute of Technology Computer Science and Engineering Kanpur India
Internet of things (IoT) applications, such as e-healthcare departments have grown tremendously where devices gather patient data and instantly transmit it over a distance to servers. Despite its huge advantages, IoT ... 详细信息
来源: 评论
Analysis and study of IDSs for cybersecurity vulnerability detection and prevention: A Comprehensive Review  14
Analysis and study of IDSs for cybersecurity vulnerability d...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Shaji, Lijin Suji Pramila, R. Noorul Islam Center for Higher Education Thucklay Computer Applications Tamil Nadu 629180 India Mar Baselios Institute of Technology and Science Computer Science and Engineering Kerala Kothamangalam686693 India
Smart environments are worried about private keys and security problems. To prevent security attacks, which take benefit of a few of these intrusion detection systems (IDSs) and security vulnerabilities, were modeled.... 详细信息
来源: 评论