咨询与建议

限定检索结果

文献类型

  • 1,274 篇 会议
  • 51 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 1,335 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 871 篇 工学
    • 750 篇 计算机科学与技术...
    • 573 篇 软件工程
    • 237 篇 信息与通信工程
    • 89 篇 控制科学与工程
    • 70 篇 生物工程
    • 60 篇 安全科学与工程
    • 53 篇 电气工程
    • 46 篇 生物医学工程(可授...
    • 42 篇 电子科学与技术(可...
    • 41 篇 网络空间安全
    • 39 篇 机械工程
    • 38 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 21 篇 光学工程
    • 18 篇 建筑学
  • 213 篇 理学
    • 96 篇 数学
    • 75 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 29 篇 物理学
    • 27 篇 系统科学
  • 160 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 78 篇 法学
    • 50 篇 社会学
    • 29 篇 法学
  • 42 篇 医学
    • 42 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 24 篇 教育学
    • 22 篇 教育学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 18 篇 军事学
  • 13 篇 农学
  • 3 篇 艺术学

主题

  • 112 篇 security
  • 53 篇 authentication
  • 43 篇 cryptography
  • 41 篇 internet of thin...
  • 40 篇 computer communi...
  • 35 篇 blockchain
  • 34 篇 network security
  • 24 篇 systems and data...
  • 22 篇 wireless communi...
  • 22 篇 protocols
  • 19 篇 intrusion detect...
  • 19 篇 machine learning
  • 19 篇 privacy
  • 18 篇 computer archite...
  • 18 篇 computer securit...
  • 17 篇 access control
  • 17 篇 information syst...
  • 17 篇 software enginee...
  • 17 篇 algorithm analys...
  • 17 篇 training

机构

  • 7 篇 department of el...
  • 7 篇 college of compu...
  • 6 篇 department of in...
  • 6 篇 department of pr...
  • 6 篇 university of mi...
  • 6 篇 dicar polytecnic...
  • 6 篇 department of co...
  • 6 篇 monash universit...
  • 6 篇 school of engine...
  • 6 篇 department of ma...
  • 5 篇 department of ma...
  • 5 篇 de la salle univ...
  • 4 篇 institute of inf...
  • 4 篇 school of inform...
  • 4 篇 chitkara univers...
  • 4 篇 college of compu...
  • 4 篇 academy of cyber
  • 4 篇 de la salle univ...
  • 4 篇 tech univ chemni...
  • 4 篇 school of comput...

作者

  • 6 篇 bernady o. apduh...
  • 6 篇 maria irene falc...
  • 6 篇 jorge gustavo ro...
  • 6 篇 osvaldo gervasi
  • 6 篇 ana maria a. c. ...
  • 6 篇 beniamino murgan...
  • 6 篇 sanjay misra
  • 6 篇 carmelo torre
  • 6 篇 david taniar
  • 5 篇 peng jin
  • 5 篇 senthil kumar th...
  • 5 篇 sulakshan vajipa...
  • 5 篇 thangavel senthi...
  • 5 篇 vajipayajula sul...
  • 4 篇 sudeep tanwar
  • 4 篇 narayan d.g.
  • 4 篇 gaedke martin
  • 4 篇 jian su
  • 4 篇 yangzhao yang
  • 4 篇 xiaodong liu

语言

  • 1,256 篇 英文
  • 64 篇 其他
  • 16 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Conference on Computer and Communication Security"
1335 条 记 录,以下是71-80 订阅
排序:
Intelligent Defenses: Advancing Cybersecurity through Machine Learning-Driven Malware Detection
Intelligent Defenses: Advancing Cybersecurity through Machin...
收藏 引用
International conference on communication Systems and Network Technologies (CSNT)
作者: Sakshi Mittal Prateek Rajvanshi
the exponential rise in cyberthreats has rendered malware detection a crucial component of cybersecurity. Traditional signature-based detection technologies are insufficient for combating emerging threat vectors, as i... 详细信息
来源: 评论
Perceptual Learning Technology Based on computer Vision and Machine Learning Algorithms
Perceptual Learning Technology Based on Computer Vision and ...
收藏 引用
International conference on communication Systems and Network Technologies (CSNT)
作者: Tianjian Wang School of Computer Science and Technology Wuhan Qingchuan University Wuhan China
To address the issue of low accuracy and poor robustness of perceptual learning in complex scenarios, a new method integrating computer vision and machine learning is adopted, that is, by applying deep neural networks... 详细信息
来源: 评论
Advanced Fault Sleuth System Architectures for Prognostic Anomaly Detection and Autonomous Irregularity Mitigation in Intelligent Power Networks
Advanced Fault Sleuth System Architectures for Prognostic An...
收藏 引用
International conference on communication Systems and Network Technologies (CSNT)
作者: Biresh Kumar Arpit Anurag Sanyam Anand Ritesh Kumar Kamaldeep Gupta Binod Kumar Sharma Amity Inst. of Information Technology Amity University Ranchi Jharkhand India Cambridge Institute Of Technology Tatisilwai Ranchi Jharkhand India St. Xavier’s College Ranchi Jharkhand India Dept. of Computer Sci. & Engg. BIT Mesra Ranchi Jharkhand India
Revenue losses, inconsistent service, delayed problem detection, and electricity theft are just a few of the major issues that power distribution networks deal with. the suggested Fault Sleuth System makes use of Inte... 详细信息
来源: 评论
Privacy-Preserving Model for Cyber threat Intelligence, Sharing Across Multi-Organizational Platforms
Privacy-Preserving Model for Cyber Threat Intelligence, Shar...
收藏 引用
International conference on communication Systems and Network Technologies (CSNT)
作者: Shridhar Pandey H. Azath Rizwan Ur Rahman Hemraj Lamkuche School of Computing Science Engineering and Artificial Intelligence (SCAI) VIT Bhopal University Bhopal India
the research presents a privacy-preserving structure for secure Cyber threat Intelligence (CTI) exchanging, using cutting-edge AI techniques to increase cooperative IT delicacy while keeping secret information safe. W... 详细信息
来源: 评论
Securing Your Web Applications: the Power of Bugbite Vulnerability Scanner  14th
Securing Your Web Applications: The Power of Bugbite Vulner...
收藏 引用
14th International conference on Applications and Techniques in Information security, ATIS 2024
作者: thirunavukkarasu, K. Raju, Leo Sathishbabu, S. Yogeshwaran, V.N. Shafeeq Ahmed, Z. Department of Computer Science and Engineering Thanthai Periyar Government Institute of Technology Tamil Nadu Vellore India Department of Electrical and Electronics Engineering Sri Sivasubramaniya Nadar College of Engineering Tamil Nadu Chennai India Department of Electronics and Communication Engineering Thanthai Periyar Government Institute of Technology Tamil Nadu Vellore India
the BugBite vulnerability scanner is a comprehensive tool developed to discover security flaws inside online web applications. By applying a combination of dynamic and static analysis approaches the BugBite successful... 详细信息
来源: 评论
Enhancing IoT Cyber Attack Detection in the Presence of Highly Imbalanced Data
Enhancing IoT Cyber Attack Detection in the Presence of High...
收藏 引用
International conference on communication Systems and Network Technologies (CSNT)
作者: Md. Ehsanul Haque Md. Saymon Hosen Polash Md Al-Imran Sanjida Simla Md Alomgir Hossain Sarwar Jahan Department of Computer Science and Engineering East West University Dhaka Bangladesh
Due to the rapid growth in the number of Internet of things (IoT) networks, the cyber risk has increased exponentially, and therefore, we have to develop effective IDS that can work well with highly imbalanced dataset... 详细信息
来源: 评论
Denial of Service or Denial of security?
Denial of Service or Denial of Security?
收藏 引用
14th acm conference on computer and communication security
作者: Borisov, Nikita Danezis, George Mittal, Prateek Tabriz, Parisa Univ Illinois 1308 W Main St Urbana IL 61801 USA
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems;as well as on the Hydra-Onion and Cashmere systems that a... 详细信息
来源: 评论
An Information-theoretic Model for Adaptive Side-Channel Attacks
An Information-Theoretic Model for Adaptive Side-Channel Att...
收藏 引用
14th acm conference on computer and communication security
作者: Koepf, Boris Basin, David ETH Zurich Switzerland
We present a model of adaptive side-channel attacks which we combine with information-theoretic metrics to quantify the information revealed to an attacker. this allows us to express an attacker's remaining uncert... 详细信息
来源: 评论
Improvement of communication Stability by Geo-Drone-Based SOA Routing Algorithm in Emergency Area Ad-Hoc Network  15th
Improvement of Communication Stability by Geo-Drone-Based SO...
收藏 引用
15th International conference on Soft Computing and Pattern Recognition, SoCPaR 2023 and 14th World Congress on Nature and Biologically Inspired Computing, NaBIC 2023
作者: Kumar, M. Rudra Kalyani, B.J.D. Suneetha, K. Satyam, K. HemaChandra, S. Madhavi, K. Reddy Department of Information Technology MGIT Hyderabad India Department of CSE Institute of Aeronautical Engineering Telangana Hyderabad India Department of Computer Science and Information Technology Jain (Deemed-to-Be University) Karnataka Bangalore India Department of MCA Annamacharya Institute of Technology and Sciences Andhra Pradesh Tirupati India Department of EEE School of Engineering Mohan Babu University A.P Tirupati India Department of AI and ML School of Computing Mohan Babu University A.P Tirupati India
Research into the use of drones to gather data from on-the-ground networks, known as the Internet of Drone things (IoDT), is now on the rise. Drone-assisted Internet of Vehicles (IoV) refers to the integration of (UAV... 详细信息
来源: 评论
Split-Ballot Voting: Everlasting Privacy With Distributed Trust
Split-Ballot Voting: Everlasting Privacy With Distributed Tr...
收藏 引用
14th acm conference on computer and communication security
作者: Moran, Tal Naor, Moni Weizmann Inst Sci Dept Comp Sci & Appl Math IL-76100 Rehovot Israel
In this paper we propose a new voting protocol with desirable security properties. the voting stage of the protocol can be performed by humans without computers;it provides every voter with the means to verify that al... 详细信息
来源: 评论