咨询与建议

限定检索结果

文献类型

  • 1,676 篇 会议
  • 85 篇 期刊文献
  • 9 篇 学位论文
  • 6 册 图书
  • 1 件 标准
  • 1 篇 科技报告

馆藏范围

  • 1,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,093 篇 工学
    • 784 篇 计算机科学与技术...
    • 476 篇 软件工程
    • 263 篇 信息与通信工程
    • 204 篇 电气工程
    • 101 篇 控制科学与工程
    • 76 篇 电子科学与技术(可...
    • 66 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 测绘科学与技术
    • 52 篇 安全科学与工程
    • 43 篇 生物医学工程(可授...
    • 39 篇 生物工程
    • 33 篇 光学工程
    • 33 篇 网络空间安全
    • 25 篇 建筑学
    • 24 篇 材料科学与工程(可...
    • 24 篇 交通运输工程
    • 23 篇 土木工程
    • 23 篇 航空宇航科学与技...
  • 362 篇 理学
    • 153 篇 物理学
    • 137 篇 数学
    • 54 篇 生物学
    • 51 篇 统计学(可授理学、...
    • 20 篇 化学
    • 20 篇 系统科学
  • 200 篇 管理学
    • 147 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 74 篇 医学
    • 67 篇 临床医学
  • 42 篇 法学
    • 26 篇 社会学
  • 16 篇 经济学
  • 15 篇 军事学
  • 12 篇 农学
  • 11 篇 文学
  • 4 篇 教育学
  • 1 篇 艺术学

主题

  • 138 篇 intrusion detect...
  • 127 篇 security
  • 77 篇 information secu...
  • 73 篇 feature extracti...
  • 71 篇 image edge detec...
  • 61 篇 network security
  • 52 篇 monitoring
  • 49 篇 object detection
  • 46 篇 signal processin...
  • 44 篇 authentication
  • 44 篇 image processing
  • 41 篇 pixel
  • 39 篇 data security
  • 38 篇 data mining
  • 38 篇 detectors
  • 37 篇 computer archite...
  • 37 篇 computational mo...
  • 36 篇 hardware
  • 35 篇 image segmentati...
  • 34 篇 robustness

机构

  • 11 篇 institute of inf...
  • 11 篇 school of cyber ...
  • 8 篇 school of comput...
  • 8 篇 university of ch...
  • 7 篇 institute of inf...
  • 6 篇 chinese acad sci...
  • 5 篇 univ chinese aca...
  • 4 篇 college of infor...
  • 4 篇 handan informati...
  • 4 篇 department of co...
  • 4 篇 college of autom...
  • 4 篇 beijing electron...
  • 4 篇 institute of int...
  • 4 篇 chinese academy ...
  • 4 篇 school of econom...
  • 4 篇 college of mathe...
  • 4 篇 beijing universi...
  • 4 篇 institute of com...
  • 3 篇 department of co...
  • 3 篇 school of electr...

作者

  • 5 篇 liu jinhuai
  • 5 篇 shi gang
  • 5 篇 chen liwei
  • 5 篇 wolthusen stephe...
  • 5 篇 jian wu
  • 4 篇 busch christoph
  • 4 篇 zelensky a.
  • 4 篇 liu yang
  • 4 篇 zhiming cui
  • 4 篇 stephen d. wolth...
  • 4 篇 ajith abraham
  • 4 篇 tadashi fujino
  • 4 篇 li minqiang
  • 4 篇 zhong weidong
  • 4 篇 voronin v.
  • 4 篇 fujino tadashi
  • 4 篇 reinartz peter
  • 4 篇 wu jian
  • 3 篇 peng xuange
  • 3 篇 li rui

语言

  • 1,741 篇 英文
  • 21 篇 中文
  • 15 篇 其他
  • 1 篇 土耳其文
检索条件"任意字段=2010 Symposium on Security Detection and Information Processing"
1778 条 记 录,以下是31-40 订阅
排序:
The study and design on secure-intranet storage system
The study and design on secure-intranet storage system
收藏 引用
3rd International symposium on information processing, ISIP 2010
作者: Chen, Yanshen Han, Dezhi School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China College of Information Engineering Shanghai Maritime University of Science and Technology Shanghai China
For the security issue in intranet storage systems, we design a data security storage system, which integrates information isolation, accessing control, virus detection, metadata safeguard of crucial data and fast-spe... 详细信息
来源: 评论
Digital Watermarking Algorithm Based on Space-Time Coding
Digital Watermarking Algorithm Based on Space-Time Coding
收藏 引用
2010 symposium on security detection and information processing
作者: Zhang, Fan Zhang, Xinhong Li, Rui Henan Univ Coll Comp & Informat Engn Kaifeng 475001 Peoples R China Henan Univ Inst Image Proc & Pattern Kaifeng 475001 Peoples R China
Theories of spread spectrum communications, channel coding, capacity analysis techniques have been widely applied in digital watermarking research. In recent years, communication theory has made an important technolog... 详细信息
来源: 评论
Methods of Personnel Screening for Concealed Contraband detection by Millimeter-wave Radiometric Imaging
Methods of Personnel Screening for Concealed Contraband Dete...
收藏 引用
2010 symposium on security detection and information processing
作者: Hu, Taiyang Xiao, Zelong Xu, Jianzhong Wu, Li Nanjing Univ Sci & Technol Sch Elect Engn & Optoelect Technol Nanjing 210094 Peoples R China
The currently emerging terrorism and violence crimes in the scope of worldwide have posed increasingly extensive threats to the personnel and public security. Therefore, it is crucial to carry out personnel screening ... 详细信息
来源: 评论
Network Forensics: Notions and Challenges
Network Forensics: Notions and Challenges
收藏 引用
9th IEEE International symposium on Signal processing and information Technology
作者: Almulhem, Ahmad King Fahd Univ Petr & Minerals Dept Comp Engn Dhahran 31261 Saudi Arabia
Network forensics is an extension of the network security model which traditionally emphasizes prevention and detection of network attacks. It addresses the need for dedicated investigative capabilities in the current... 详细信息
来源: 评论
Feasibility study on application of CT using γ-ray with double energy to container security inspection
Feasibility study on application of CT using γ-ray with dou...
收藏 引用
2010 symposium on security detection and information processing
作者: Zhang, Weijun Li, Xueqin Xu, Zhengguang Chinese Ctr Dis Control & Prevent Natl Inst Radiol Protect Beijing 100088 Peoples R China Minist Publ Secur Res Inst 1 Beijing 102200 Peoples R China
The study object in this research is the attenuation coefficient of linear (ACOL) from an interaction, which is get form the incident gamma ray, radiated by a 600 keV (gamma ray energy level is Near Cs-137) source and... 详细信息
来源: 评论
Voice phishing detection technique based on minimum classification error method incorporating codec parameters
收藏 引用
IET SIGNAL processing 2010年 第5期4卷 502-509页
作者: Chang, J. -H. Lee, K. -H. Inha Univ Sch Elect Engn Inchon 402751 South Korea
The authors propose an effective voice phishing detection algorithm based on a Gaussian mixture model (GMM) employing the minimum classification error (MCE) technique. The detection of voice phishing is performed base... 详细信息
来源: 评论
detection and localization of improvised explosive devices based on 3-axis magnetic sensor array system
Detection and localization of improvised explosive devices b...
收藏 引用
2010 symposium on security detection and information processing
作者: Liu, Renhao Wang, Hua Beijing Univ Aeronaut & Astronaut Sch Astronaut Beijing 100191 Peoples R China
The detection and localization of improvised explosive devices(IEDs) on the roadside is a new subject encountered in the struggle against terrorism. A novel detection and localization method was proposed for IEDs base... 详细信息
来源: 评论
The influence of X-ray wavelength and the simulative human skin and muscle obstruction on the detection of human body-hidden drugs by non-intrusive X-ray diffraction method
The influence of X-ray wavelength and the simulative human s...
收藏 引用
2010 symposium on security detection and information processing
作者: Sun, Bai Li, Minqiang Zhang, Fang Zhong, Yu Yu, Daoyang Lu, Wei Pan, Guoqiang Liu, Jinhuai Chinese Acad Sci Inst Intelligent Machines Key Lab Biomimet Sensing & Adv Robot Technol Hefei 230031 Anhui Peoples R China Univ Sci & Technol China Natl Synchrotron Radiat Lab Hefei 230039 Peoples R China
In order to detect the body-hidden drugs non-intrusively and rapidly, the influence of the X-ray wavelength and covering of the simulative skin and muscle on the detection of methamphetamine sample by synchrotron radi... 详细信息
来源: 评论
Centered Hyperspherical and Hyperellipsoidal One-Class Support Vector Machines for Anomaly detection in Sensor Networks
收藏 引用
IEEE TRANSACTIONS ON information FORENSICS AND security 2010年 第3期5卷 518-533页
作者: Rajasegarar, Sutharshan Leckie, Christopher Bezdek, James C. Palaniswami, Marimuthu Univ Melbourne Dept Elect & Elect Engn Melbourne Vic 3010 Australia Univ Melbourne Dept Comp Sci & Software Engn Melbourne Vic 3010 Australia
Anomaly detection in wireless sensor networks is an important challenge for tasks such as intrusion detection and monitoring applications. This paper proposes two approaches to detecting anomalies from measurements fr... 详细信息
来源: 评论
SVD for Enhanced Explosives detection Using NQR
SVD for Enhanced Explosives Detection Using NQR
收藏 引用
2010 symposium on security detection and information processing
作者: Zhu, Kairan Su, Tao He, Xuehui Niu, Jinping Xidian Univ Natl Lab Radar Signal Proc Xian 710071 Peoples R China
Nuclear Quadrupole Resonance (NQR) is a solid-state radio frequency (RF) spectroscopic technique, allowing the detection of many high explosives and narcotics. Unlike metal detectors and ground penetrating radar (GPR)... 详细信息
来源: 评论