咨询与建议

限定检索结果

文献类型

  • 1,676 篇 会议
  • 85 篇 期刊文献
  • 9 篇 学位论文
  • 6 册 图书
  • 1 件 标准
  • 1 篇 科技报告

馆藏范围

  • 1,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,093 篇 工学
    • 784 篇 计算机科学与技术...
    • 476 篇 软件工程
    • 263 篇 信息与通信工程
    • 204 篇 电气工程
    • 101 篇 控制科学与工程
    • 76 篇 电子科学与技术(可...
    • 66 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 测绘科学与技术
    • 52 篇 安全科学与工程
    • 43 篇 生物医学工程(可授...
    • 39 篇 生物工程
    • 33 篇 光学工程
    • 33 篇 网络空间安全
    • 25 篇 建筑学
    • 24 篇 材料科学与工程(可...
    • 24 篇 交通运输工程
    • 23 篇 土木工程
    • 23 篇 航空宇航科学与技...
  • 362 篇 理学
    • 153 篇 物理学
    • 137 篇 数学
    • 54 篇 生物学
    • 51 篇 统计学(可授理学、...
    • 20 篇 化学
    • 20 篇 系统科学
  • 200 篇 管理学
    • 147 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 74 篇 医学
    • 67 篇 临床医学
  • 42 篇 法学
    • 26 篇 社会学
  • 16 篇 经济学
  • 15 篇 军事学
  • 12 篇 农学
  • 11 篇 文学
  • 4 篇 教育学
  • 1 篇 艺术学

主题

  • 138 篇 intrusion detect...
  • 127 篇 security
  • 77 篇 information secu...
  • 73 篇 feature extracti...
  • 71 篇 image edge detec...
  • 61 篇 network security
  • 52 篇 monitoring
  • 49 篇 object detection
  • 46 篇 signal processin...
  • 44 篇 authentication
  • 44 篇 image processing
  • 41 篇 pixel
  • 39 篇 data security
  • 38 篇 data mining
  • 38 篇 detectors
  • 37 篇 computer archite...
  • 37 篇 computational mo...
  • 36 篇 hardware
  • 35 篇 image segmentati...
  • 34 篇 robustness

机构

  • 11 篇 institute of inf...
  • 11 篇 school of cyber ...
  • 8 篇 school of comput...
  • 8 篇 university of ch...
  • 7 篇 institute of inf...
  • 6 篇 chinese acad sci...
  • 5 篇 univ chinese aca...
  • 4 篇 college of infor...
  • 4 篇 handan informati...
  • 4 篇 department of co...
  • 4 篇 college of autom...
  • 4 篇 beijing electron...
  • 4 篇 institute of int...
  • 4 篇 chinese academy ...
  • 4 篇 school of econom...
  • 4 篇 college of mathe...
  • 4 篇 beijing universi...
  • 4 篇 institute of com...
  • 3 篇 department of co...
  • 3 篇 school of electr...

作者

  • 5 篇 liu jinhuai
  • 5 篇 shi gang
  • 5 篇 chen liwei
  • 5 篇 wolthusen stephe...
  • 5 篇 jian wu
  • 4 篇 busch christoph
  • 4 篇 zelensky a.
  • 4 篇 liu yang
  • 4 篇 zhiming cui
  • 4 篇 stephen d. wolth...
  • 4 篇 ajith abraham
  • 4 篇 tadashi fujino
  • 4 篇 li minqiang
  • 4 篇 zhong weidong
  • 4 篇 voronin v.
  • 4 篇 fujino tadashi
  • 4 篇 reinartz peter
  • 4 篇 wu jian
  • 3 篇 peng xuange
  • 3 篇 li rui

语言

  • 1,741 篇 英文
  • 21 篇 中文
  • 15 篇 其他
  • 1 篇 土耳其文
检索条件"任意字段=2010 Symposium on Security Detection and Information Processing"
1778 条 记 录,以下是1-10 订阅
排序:
2010 symposium on security detection and information processing
2010 Symposium on Security Detection and Information Process...
收藏 引用
2010 symposium on security detection and information processing
The proceedings contain 80 papers. The topics discussed include: novel nanoparticle detection method using electrochemical device based on anodic aluminum oxide nanopore membrane;study of control system for X-ray gene...
来源: 评论
Discerning Challenges of security information and Event Management (SIEM) Systems in Large Organizations  18th
Discerning Challenges of Security Information and Event Mana...
收藏 引用
18th IFIP WG 11.12 International symposium on Human Aspects of information security and Assurance, HAISA 2024
作者: Shirazi, Patrick Padyab, Ali University of Skövde Skövde Sweden
security information and Event Management (SIEM) systems are essential for security experts in various daily tasks such as monitoring, anomaly detection, forensics, identifying indicators of compromises, threat huntin... 详细信息
来源: 评论
A Diary Study to Understand Young Saudi Adult Users’ Experiences of Online security Threats  18th
A Diary Study to Understand Young Saudi Adult Users’ Experi...
收藏 引用
18th IFIP WG 11.12 International symposium on Human Aspects of information security and Assurance, HAISA 2024
作者: Aldaraani, Najla Petrie, Helen Shahandashti, Siamak F. University of York YorkYO10 5GH United Kingdom King Khalid University Abha61421 Saudi Arabia
An online diary study was conducted to investigate the experience of online security threats among Saudi young adults. Over a period of 30 days, 16 participants were asked to record up to three threats they recei... 详细信息
来源: 评论
iCNN-LSTM: An Incremental CNN-LSTM Based Ransomware detection System
iCNN-LSTM: An Incremental CNN-LSTM Based Ransomware Detectio...
收藏 引用
PhD symposium, Posters, Demos, and A Web for more inclusive, sustainable and prosperous societies, WEB-for-GOOD 2024 and 1st International Workshop on AI and Web Data Analytics, AIWDA 2024 form the 25th International Conference on Web information Systems Engineering, WISE 2024
作者: Ispahany, Jamil Islam, MD Rafiqul Khan, M. Arif Islam, MD Zahidul Charles Sturt University Bathurst2795 Australia Charles Sturt University Albury/Wodonga2640 Australia Kingston2600 Australia
In response to the increasing ransomware threat, this study presents a novel detection system that combines parallel Convolutional Neural Networks (CNNs) and Long Short-Term Memory (LSTM) networks. By leveraging Sysmo... 详细信息
来源: 评论
A Comparative Analysis of Feature Selection and Machine Learning Algorithms for Enhanced Anomaly detection in 5G Core Networks
A Comparative Analysis of Feature Selection and Machine Lear...
收藏 引用
International Global information Infrastructure symposium (GIIS)
作者: Júnia Maísa Oliveira César Morais Daniel Macedo José Marcos Nogueira Computer Science Department Universidade Federal de Minas Gerais Department of Electrical Electronic and Information Engineering (DEI) University of Bologna Italy
A critical challenge lies in choosing the appropriate processing techniques to achieve optimal evaluation performance in machine learning algorithms for the 5G core data analysis in anomaly detection use case. In this... 详细信息
来源: 评论
detection of Bone Density with Ultrasound
Detection of Bone Density with Ultrasound
收藏 引用
2010 symposium on security detection and information processing
作者: Chen, Yanyan Xu, Yubing Ma, Zuchang Sun, Yining Chinese Acad Sci Inst Intelligent Machines Hefei 230031 Peoples R China
The broadband ultrasound attenuation (BUA) and the speed of sound (SOS) are usually measured to evaluate the bone density. However, as previous studies showed that the BUA is sensitive to repositioning and soft tissue... 详细信息
来源: 评论
Surface plasmons resonance detection based on the attenuated total reflection geometry
Surface plasmons resonance detection based on the attenuated...
收藏 引用
2010 symposium on security detection and information processing
作者: Deng, Yan Liu, Guohong Anhui Univ Architecture Dept Math & Phys Hefei 230601 Peoples R China
The conventional surface plasmons resonance(SPR) detection and the improved SPR detection were investigated, which were both based on the attenuated total reflection(ATR) geometry. The conventional detection system on... 详细信息
来源: 评论
Highway Traffic Incident detection Based on BPNN
Highway Traffic Incident Detection Based on BPNN
收藏 引用
2010 symposium on security detection and information processing
作者: Cheng, Xueqing Lin, Wenfang Liu, Enxiang Gu, Dan SW Jiaotong Univ Coll Traff & Transportat Chengdu 610031 Sichuan Peoples R China Sichuan Tianyi Univ Dept Informat Engn Chengdu 610100 Sichuan Peoples R China
Because traffic incident is the main cause of traffic congestion in Highway, traffic incident detection plays an important role in ITS. Based on the professional software VISSIM, we performed an experiment on incident... 详细信息
来源: 评论
Study of blasting vibration safety security criterion method based on response spectrum
Study of blasting vibration safety security criterion method...
收藏 引用
2010 symposium on security detection and information processing
作者: Yan, Guobin Chen, Chao Guo, Jun Univ Sci & Technol Beijing Beijing 100861 Peoples R China Hebei Polytech Univ Tangshan 063009 Peoples R China
Based on lots of blasting vibration monitoring data, correlation analysis on blasting vibration velocity response spectrum S-R and blasting seismic waves with each signal characteristic, research that S-R has damage a... 详细信息
来源: 评论
The Technology Research of Remote Automatic detection and Fault Diagnosis based on JTAG Boundary Scan
The Technology Research of Remote Automatic Detection and Fa...
收藏 引用
2010 symposium on security detection and information processing
作者: Wang, Daichuan Zhang, Pizhuang N Univ China Natl Key Lab Elect Measurement Technol Taiyuan 030051 Shanxi Peoples R China
Because of increasingly demanding the electronic devices and circuits with the characteristics of reliability and real-time, a web-based and JTAG boundary scan design of remote automatic detection and fault diagnosis ... 详细信息
来源: 评论