咨询与建议

限定检索结果

文献类型

  • 1,273 篇 会议
  • 51 册 图书
  • 10 篇 期刊文献

馆藏范围

  • 1,334 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 870 篇 工学
    • 749 篇 计算机科学与技术...
    • 573 篇 软件工程
    • 236 篇 信息与通信工程
    • 88 篇 控制科学与工程
    • 70 篇 生物工程
    • 60 篇 安全科学与工程
    • 53 篇 电气工程
    • 46 篇 生物医学工程(可授...
    • 42 篇 电子科学与技术(可...
    • 40 篇 网络空间安全
    • 38 篇 机械工程
    • 38 篇 仪器科学与技术
    • 27 篇 交通运输工程
    • 21 篇 光学工程
    • 18 篇 建筑学
  • 213 篇 理学
    • 96 篇 数学
    • 75 篇 生物学
    • 35 篇 统计学(可授理学、...
    • 29 篇 物理学
    • 27 篇 系统科学
  • 160 篇 管理学
    • 84 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 78 篇 法学
    • 50 篇 社会学
    • 29 篇 法学
  • 42 篇 医学
    • 42 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 24 篇 教育学
    • 22 篇 教育学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 18 篇 军事学
  • 13 篇 农学
  • 3 篇 艺术学

主题

  • 112 篇 security
  • 53 篇 authentication
  • 43 篇 cryptography
  • 41 篇 internet of thin...
  • 40 篇 computer communi...
  • 35 篇 blockchain
  • 34 篇 network security
  • 24 篇 systems and data...
  • 22 篇 wireless communi...
  • 22 篇 protocols
  • 19 篇 intrusion detect...
  • 19 篇 machine learning
  • 19 篇 privacy
  • 18 篇 computer archite...
  • 18 篇 computer securit...
  • 17 篇 access control
  • 17 篇 information syst...
  • 17 篇 software enginee...
  • 17 篇 algorithm analys...
  • 17 篇 training

机构

  • 7 篇 department of el...
  • 7 篇 college of compu...
  • 6 篇 department of in...
  • 6 篇 department of pr...
  • 6 篇 university of mi...
  • 6 篇 dicar polytecnic...
  • 6 篇 department of co...
  • 6 篇 monash universit...
  • 6 篇 school of engine...
  • 6 篇 department of ma...
  • 5 篇 department of ma...
  • 5 篇 de la salle univ...
  • 4 篇 institute of inf...
  • 4 篇 school of inform...
  • 4 篇 chitkara univers...
  • 4 篇 college of compu...
  • 4 篇 academy of cyber
  • 4 篇 de la salle univ...
  • 4 篇 tech univ chemni...
  • 4 篇 school of comput...

作者

  • 6 篇 bernady o. apduh...
  • 6 篇 maria irene falc...
  • 6 篇 jorge gustavo ro...
  • 6 篇 osvaldo gervasi
  • 6 篇 ana maria a. c. ...
  • 6 篇 beniamino murgan...
  • 6 篇 sanjay misra
  • 6 篇 carmelo torre
  • 6 篇 david taniar
  • 5 篇 peng jin
  • 5 篇 senthil kumar th...
  • 5 篇 sulakshan vajipa...
  • 5 篇 thangavel senthi...
  • 5 篇 vajipayajula sul...
  • 4 篇 sudeep tanwar
  • 4 篇 narayan d.g.
  • 4 篇 gaedke martin
  • 4 篇 jian su
  • 4 篇 yangzhao yang
  • 4 篇 xiaodong liu

语言

  • 1,256 篇 英文
  • 63 篇 其他
  • 16 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=14th ACM Conference on Computer and Communication Security"
1334 条 记 录,以下是81-90 订阅
排序:
Intrusion Detection for Internet of Vehicles using Machine Learning  14
Intrusion Detection for Internet of Vehicles using Machine L...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Bajpai, Soumya Sharma, Kapil Chaurasia, Brijesh Kumar Amity University Madhya Pradesh Computer Science and Engineering MP Gwalior India Pranveer Sing Institute of Technology Computer Science and Engineering Kanpur India
the Internet of Vehicles (IoV) has replaced vehicular networks as the preferred paradigm as a result of the enormous expansion in computer and network capabilities. Because of the dynamic IoV's diverse nature nece... 详细信息
来源: 评论
A Brief Study on Cloud security  14
A Brief Study on Cloud Security
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Ajith, Abhay Mathew, Adharsh S Remya, S. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Amritapuri India
Distributed, parallel, and grid computing are all used in a kind of computing known as cloud computing. It serves as a flexible, affordable, and tried-and-true online delivery platform for IT services marketed to busi... 详细信息
来源: 评论
Quantum Key Distribution for ADS-B Data Transmission security in Aircraft  14
Quantum Key Distribution for ADS-B Data Transmission Securit...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Zaher, Ahmad Rabaa, Judy Kumar, Lanke Ravi Rajesh Pandian, N. University Department of Computer Science and Engineering Bangalore India University Department of Aerospace Engineering Bangalore India
this research aims to investigate the security concerns of Automatic Dependent Surveillance-Broadcast (ADS-B) communication in the aviation industry and propose the Quantum Key Distribution (BB84) algorithm to generat... 详细信息
来源: 评论
A Decentralized BYOD Authentication System secure against ReEntrancy Attacks  14
A Decentralized BYOD Authentication System secure against Re...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Mamoon, Mohd Saim, Mohammad Shah, Ilma Samad, Abdus Aligarh Muslim University Zakir Husain College of Engineering and Technology Department of Computer Engineering Aligarh India
the concept of BYOD has been around in the corporate world for a while now which allows employees to bring and use personal devices for organizational work. However, the onset of such a trend also brought major securi... 详细信息
来源: 评论
SDN-based Firewall using Machine Learning  14
SDN-based Firewall using Machine Learning
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Kiran, G. Yashwanth Harshith, Koganti Sri Sai Sai, A.M. Abhishek Eswar, Kalla Likhit Sai Nair, Lekha S. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Amritapuri India
Due to the widespread use of the Internet, the traditional destination-based forwarding which includes two steps: (1) match and (2) action, has caused much stress on the network due to its traffic and security issues.... 详细信息
来源: 评论
BSeVS - A Smart e-Voting System based on Blockchain Technology  14
BSeVS - A Smart e-Voting System based on Blockchain Technolo...
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Gupta, Sweta Gupta, Kamlesh Kumar Shukla, Piyush Kumar UIT-RGPV Computer Science & Engineering Bhopal India Rustamji Institute of Technology Information Technology Gwalior India
security and privacy has always been a major concern for wider adoption of electronic voting systems since the election results have both major economic and political influences all around the world. the challenges of... 详细信息
来源: 评论
Anomaly-based Intrusion Detection System for ICS  14
Anomaly-based Intrusion Detection System for ICS
收藏 引用
14th International conference on Computing communication and Networking Technologies, ICCCNT 2023
作者: Prasanna, S.S. Selvan, G. S. R. Emil Ramkumar, M.P. Thiagarajar College of Engineering Dept of Computer Science and Engineering Tamil Nadu Madurai India
Industrial Control Systems (ICS) become a crucial target for hackers as these devices are unsupported in terms of storage, complex computations, and security. On the other hand, providing security for these devices ar... 详细信息
来源: 评论
Design of a Novice-Friendly Drone Control System  14
Design of a Novice-Friendly Drone Control System
收藏 引用
2024 IEEE 14th Annual Computing and communication Workshop and conference, CCWC 2024
作者: Cheng, Jinsai Mahmud, Saifuddin Mohammed, Misbahuddin Singh, Aditi Kim, Jong-Hoon Kent State University College of Aeronautics and Engineering United States Bradley University Computer Science & Information Systems United States Cleveland State University Computer Science United States Kent State University Computer Science United States
In recent times, aerial robots have gained prominence in critical applications such as natural disaster response and social security. However, existing control interfaces like joysticks and touch screens often pose si... 详细信息
来源: 评论
Shmoodle: communication through Collaborative Drawing with an Emotionally Controlled Color Palette  22
Shmoodle: Communication through Collaborative Drawing with a...
收藏 引用
14th acm Creativity and Cognition conference Series (C and C)
作者: Sagie, Ariel Rinott, Michal Shenkar Design Engn Art Azrieli Fac Design Dept Grad Studies Design Ramat Gan Israel Shenkar Design Engn Art Kadar Design & Technol Ctr Ramat Gan Israel Ben Gurion Univ Negev Art Software & Informat Syst Engn Beer Sheva Israel
Virtual communication has turned into a necessity in current culture. Although major technological breakthroughs were made in the past decade, virtual communication platforms do not prioritize the emotional connection... 详细信息
来源: 评论
Image-based DeepFake Detection Using Artificial Intelligence  14
Image-based DeepFake Detection Using Artificial Intelligence
收藏 引用
14th IEEE International conference on communication Systems and Network Technologies, CSNT 2025
作者: Singh, Shailendra Kumar Kumar, Gautam Dubey, Aditya Kumar Yadav, Ritik Rai, Vishal Sharma, Anil Department of Computer Science and Engineering Amity University Noida India
the increasing sophistication of deepfake technology poses significant risks to privacy, security, and public trust in digital media. As a result, deepfake detection has become a critical research area, with artificia... 详细信息
来源: 评论