咨询与建议

限定检索结果

文献类型

  • 1,273 篇 会议
  • 51 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 1,334 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 870 篇 工学
    • 749 篇 计算机科学与技术...
    • 573 篇 软件工程
    • 236 篇 信息与通信工程
    • 88 篇 控制科学与工程
    • 70 篇 生物工程
    • 60 篇 安全科学与工程
    • 53 篇 电气工程
    • 46 篇 生物医学工程(可授...
    • 42 篇 电子科学与技术(可...
    • 40 篇 网络空间安全
    • 38 篇 机械工程
    • 38 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 21 篇 光学工程
    • 18 篇 建筑学
  • 213 篇 理学
    • 96 篇 数学
    • 75 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 29 篇 物理学
    • 27 篇 系统科学
  • 160 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 78 篇 法学
    • 50 篇 社会学
    • 29 篇 法学
  • 42 篇 医学
    • 42 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 24 篇 教育学
    • 22 篇 教育学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 18 篇 军事学
  • 13 篇 农学
  • 3 篇 艺术学

主题

  • 112 篇 security
  • 53 篇 authentication
  • 43 篇 cryptography
  • 41 篇 internet of thin...
  • 40 篇 computer communi...
  • 35 篇 blockchain
  • 34 篇 network security
  • 24 篇 systems and data...
  • 22 篇 wireless communi...
  • 22 篇 protocols
  • 19 篇 intrusion detect...
  • 19 篇 machine learning
  • 19 篇 privacy
  • 18 篇 computer archite...
  • 18 篇 computer securit...
  • 17 篇 access control
  • 17 篇 information syst...
  • 17 篇 software enginee...
  • 17 篇 algorithm analys...
  • 17 篇 training

机构

  • 7 篇 department of el...
  • 7 篇 college of compu...
  • 6 篇 department of in...
  • 6 篇 department of pr...
  • 6 篇 university of mi...
  • 6 篇 dicar polytecnic...
  • 6 篇 department of co...
  • 6 篇 monash universit...
  • 6 篇 school of engine...
  • 6 篇 department of ma...
  • 5 篇 department of ma...
  • 5 篇 de la salle univ...
  • 4 篇 institute of inf...
  • 4 篇 school of inform...
  • 4 篇 chitkara univers...
  • 4 篇 college of compu...
  • 4 篇 academy of cyber
  • 4 篇 de la salle univ...
  • 4 篇 tech univ chemni...
  • 4 篇 school of comput...

作者

  • 6 篇 bernady o. apduh...
  • 6 篇 maria irene falc...
  • 6 篇 jorge gustavo ro...
  • 6 篇 osvaldo gervasi
  • 6 篇 ana maria a. c. ...
  • 6 篇 beniamino murgan...
  • 6 篇 sanjay misra
  • 6 篇 carmelo torre
  • 6 篇 david taniar
  • 5 篇 peng jin
  • 5 篇 senthil kumar th...
  • 5 篇 sulakshan vajipa...
  • 5 篇 thangavel senthi...
  • 5 篇 vajipayajula sul...
  • 4 篇 sudeep tanwar
  • 4 篇 narayan d.g.
  • 4 篇 gaedke martin
  • 4 篇 jian su
  • 4 篇 yangzhao yang
  • 4 篇 xiaodong liu

语言

  • 1,256 篇 英文
  • 63 篇 其他
  • 16 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Conference on Computer and Communication Security"
1334 条 记 录,以下是51-60 订阅
排序:
security Implications of Augmented Reality in Healthcare: Integrating Human-computer Interaction for Modern Systems
Security Implications of Augmented Reality in Healthcare: In...
收藏 引用
International conference on communication Systems and Network Technologies (CSNT)
作者: Raneem Y. Alyami Department of Information Technology College of Computer and Information Technology Taif University Taif Saudi Arabia
the current study presents a risk assessment and mitigation framework based on augmented reality (AR) used in healthcare systems to improve human-computer interaction and assistive technology. the proposed approach is... 详细信息
来源: 评论
Underpinning of Resource-Constrained IoT Networks: Analysis and Countermeasures for Attacks and Vulnerabilities
Underpinning of Resource-Constrained IoT Networks: Analysis ...
收藏 引用
International conference on communication Systems and Network Technologies (CSNT)
作者: Umeshwer Singh Manu Sood Robin Singh Bhadoria Department of Computer Science Himachal Pradesh University Shimla India Department of Computer Science and Engineering National Institute of Technology Hamirpur Himachal Pradesh India
the Internet of things integrate various electronics devices on common platform as objects over the Internet. IoT devices have limited capabilities, such as low power, less memory, and low computational processing. Be... 详细信息
来源: 评论
Intrusion Detection at the Edge Computing: A Deep Learning Approach Using the UNSW-NB15 Dataset
Intrusion Detection at the Edge Computing: A Deep Learning A...
收藏 引用
International conference on communication Systems and Network Technologies (CSNT)
作者: Vipin Kumar Vivek Kumar Abhay Pratap Singh Bhadauria Jay Dixit Amit Kumar Department of Computer Science Gurukula Kangri (Deemed to be University) Haridwar India Department of Computer Engineering & Applications GLA University Mathura Department of Computer Engineering & Applications GLA University Mathura UP
Edge computing has transformed technology by enabling seamless connections between IoT devices, but it also introduces significant security challenges. EC is crucial for providing minimal latency processing and reduci... 详细信息
来源: 评论
Decentralised Cloud Architecture: Blockchain Driven Integrity and Raptor Codes for Enhanced Data Transmission
Decentralised Cloud Architecture: Blockchain Driven Integrit...
收藏 引用
International conference on communication Systems and Network Technologies (CSNT)
作者: Preethi M Ayush Kale Pooja Satheesh Harshitha R Rohith Vaidya K Department of Computer Science PES University Bangalore India
Ensuring data integrity and security has become integral in the digital era. Blockchain, an immutable ledger can be leveraged to provide data integrity to the cloud system. Centralised cloud systems present challenges... 详细信息
来源: 评论
Generative AI SSH Honeypot With Reinforcement Learning
Generative AI SSH Honeypot With Reinforcement Learning
收藏 引用
International conference on communication Systems and Network Technologies (CSNT)
作者: Pragna Prasad Nikhil Girish Sarasvathi V Apoorva Vh Prem Kumar S Department of CSE PES University Bengaluru India
In today's rapidly evolving cyber landscape, traditional honeypots face significant limitations in their ability to adapt to sophisticated attack patterns and maintain convincing interactions with attackers. We pr... 详细信息
来源: 评论
Intelligent Anti-theft System with Automated Spray Control using ESP32 WROOM
Intelligent Anti-Theft System with Automated Spray Control u...
收藏 引用
International conference on communication Systems and Network Technologies (CSNT)
作者: Geetha Shanmugam Deepa Balusamy Elamparithi S Vetriselvan R Mourin Praamoth S Department of Computer Science and Engineering Nandha Engineering College Erode India
this project demonstrates a low-cost anti-theft solution built around the ESP32-WROOM microcontroller, with integrated chemical spray for security. the system is designed to detect unauthorized entry and respond with ... 详细信息
来源: 评论
A Comprehensive Usage of AI in Prevention of Social Engineering Attack
A Comprehensive Usage of AI in Prevention of Social Engineer...
收藏 引用
International conference on communication Systems and Network Technologies (CSNT)
作者: Vishal Jain Bishwajeet Pandey Laura Aldasheva Pranav Shukla Pushpanjali Pandey Damini Jain Technical Head- Cyber Security Global Institute of Cyber Security Noida India Department of MCA GL Bajaj College of Technology and Management Greater Noida India Dept of IS&CS Astana IT University Astana Kazakhstan Software Engineer 2 Deloitte Lucknow India Department of R&D Gyancity Research Consultancy Greater Noida India Managing Director CyberiumX Delhi India
AI has become a tool for social engineering attackers, enhancing the likelihood of successful attacks. However, as the saying goes, "Diamonds cut diamonds." In this research, we have enlisted the usage of AI... 详细信息
来源: 评论
CCS'07 - Proceedings of the 14th acm conference on computer and communications security
CCS'07 - Proceedings of the 14th ACM Conference on Computer ...
收藏 引用
14th acm conference on computer and communications security, CCS'07
the proceedings contain 55 papers. the topics discussed include: assurance and evaluation: what next?;an analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism;candid: preventing SQ...
来源: 评论
Building Secure and Decentralized Survey Methodology: A Comprehensive Solution with FIDO2 Authentication and Fluree
Building Secure and Decentralized Survey Methodology: A Comp...
收藏 引用
International conference on communication Systems and Network Technologies (CSNT)
作者: Jawahar Balachandher Chandana Dongre Somanshu Bhattacharyya Rohit Hunashikatti Sarasvathi V Department of Computer Science and Engineering PES University Bangalore Karnataka India
Traditional survey systems struggle with data immutability, privacy protection, and reliable storage. these limitations compromise transparency, security, and data integrity. this paper proposes a decentralized and se... 详细信息
来源: 评论
Leveraging Next-Generation Business Intelligence for Proactive Cybersecurity Defense
Leveraging Next-Generation Business Intelligence for Proacti...
收藏 引用
International conference on communication Systems and Network Technologies (CSNT)
作者: Arijit Sengupta Vidyavati Ramteke Symbiosis Centre for Information Technology Symbiosis International (Deemed University) Pune India
this paper explores how Business Intelligence operates better for protecting cybersecurity through its capability to merge predictive analytics methods with real-time data detection. A qualitative research design enab... 详细信息
来源: 评论