咨询与建议

限定检索结果

文献类型

  • 1,676 篇 会议
  • 85 篇 期刊文献
  • 9 篇 学位论文
  • 6 册 图书
  • 1 件 标准
  • 1 篇 科技报告

馆藏范围

  • 1,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,093 篇 工学
    • 784 篇 计算机科学与技术...
    • 476 篇 软件工程
    • 263 篇 信息与通信工程
    • 204 篇 电气工程
    • 101 篇 控制科学与工程
    • 76 篇 电子科学与技术(可...
    • 66 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 测绘科学与技术
    • 52 篇 安全科学与工程
    • 43 篇 生物医学工程(可授...
    • 39 篇 生物工程
    • 33 篇 光学工程
    • 33 篇 网络空间安全
    • 25 篇 建筑学
    • 24 篇 材料科学与工程(可...
    • 24 篇 交通运输工程
    • 23 篇 土木工程
    • 23 篇 航空宇航科学与技...
  • 362 篇 理学
    • 153 篇 物理学
    • 137 篇 数学
    • 54 篇 生物学
    • 51 篇 统计学(可授理学、...
    • 20 篇 化学
    • 20 篇 系统科学
  • 200 篇 管理学
    • 147 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 74 篇 医学
    • 67 篇 临床医学
  • 42 篇 法学
    • 26 篇 社会学
  • 16 篇 经济学
  • 15 篇 军事学
  • 12 篇 农学
  • 11 篇 文学
  • 4 篇 教育学
  • 1 篇 艺术学

主题

  • 138 篇 intrusion detect...
  • 127 篇 security
  • 77 篇 information secu...
  • 73 篇 feature extracti...
  • 71 篇 image edge detec...
  • 61 篇 network security
  • 52 篇 monitoring
  • 49 篇 object detection
  • 46 篇 signal processin...
  • 44 篇 authentication
  • 44 篇 image processing
  • 41 篇 pixel
  • 39 篇 data security
  • 38 篇 data mining
  • 38 篇 detectors
  • 37 篇 computer archite...
  • 37 篇 computational mo...
  • 36 篇 hardware
  • 35 篇 image segmentati...
  • 34 篇 robustness

机构

  • 11 篇 institute of inf...
  • 11 篇 school of cyber ...
  • 8 篇 school of comput...
  • 8 篇 university of ch...
  • 7 篇 institute of inf...
  • 6 篇 chinese acad sci...
  • 5 篇 univ chinese aca...
  • 4 篇 college of infor...
  • 4 篇 handan informati...
  • 4 篇 department of co...
  • 4 篇 college of autom...
  • 4 篇 beijing electron...
  • 4 篇 institute of int...
  • 4 篇 chinese academy ...
  • 4 篇 school of econom...
  • 4 篇 college of mathe...
  • 4 篇 beijing universi...
  • 4 篇 institute of com...
  • 3 篇 department of co...
  • 3 篇 school of electr...

作者

  • 5 篇 liu jinhuai
  • 5 篇 shi gang
  • 5 篇 chen liwei
  • 5 篇 wolthusen stephe...
  • 5 篇 jian wu
  • 4 篇 busch christoph
  • 4 篇 zelensky a.
  • 4 篇 liu yang
  • 4 篇 zhiming cui
  • 4 篇 stephen d. wolth...
  • 4 篇 ajith abraham
  • 4 篇 tadashi fujino
  • 4 篇 li minqiang
  • 4 篇 zhong weidong
  • 4 篇 voronin v.
  • 4 篇 fujino tadashi
  • 4 篇 reinartz peter
  • 4 篇 wu jian
  • 3 篇 peng xuange
  • 3 篇 li rui

语言

  • 1,741 篇 英文
  • 21 篇 中文
  • 15 篇 其他
  • 1 篇 土耳其文
检索条件"任意字段=2010 Symposium on Security Detection and Information Processing"
1778 条 记 录,以下是71-80 订阅
排序:
Complex model of system requirements analysis
Complex model of system requirements analysis
收藏 引用
International symposium on Intelligence information processing and Trusted Computing
作者: Liao, Xiaoyong College of Mathematical and Information Sciences Huanggang Normal University Hubei 438000 China
Depth study of the network environment based on software engineering theory and cutting-edge technology to improve the competitiveness of China's software industry breakthrough. Only by having a strong independent... 详细信息
来源: 评论
Wavelet-based personal identification  3
Wavelet-based personal identification
收藏 引用
3rd IEEE International symposium on Signal processing and information Technology
作者: Takano, S Niijima, K Kuzume, K Kyushu Univ Dept Informat Kasuga Fukuoka 8168580 Japan
This paper presents a personal identification system based on the learning of lifting dyadic wavelet filters. Our system consists of face learning, detection and identification processes. In the learning process, free... 详细信息
来源: 评论
Survivable storage architecture
Survivable storage architecture
收藏 引用
3rd International symposium on information processing, ISIP 2010
作者: Zhang, Wei Liu, Shuguang Zhong, Weidong Institute of Information Security Engineering College of Chinese Armed Police Force Xi'an China
Basing on the idea of intrusion masking and defense-in-depth, a generic architecture of survivable storage system is presented. The architecture includes 3 subsystems: storage strategy, user management and security mo... 详细信息
来源: 评论
Intrusion detection Model based on Improved Support Vector Machine
Intrusion Detection Model based on Improved Support Vector M...
收藏 引用
3rd International symposium on Intelligent information Technology and security Informatics
作者: Yuan, Jingbo Li, Haixiao Ding, Shunli Cao, Limin Northeastern Univ Qinhuangdao Inst Informat Management Technol & Applicat Qinhuangdao Peoples R China Qinhuangdao Glass Ind Res & Design Inst Architecture Engn Dept 1 Architecture Design Inst Qinhuangdao Peoples R China
With development and popularization of computer network, network security problems increasingly bring into prominence. Intrusion detection technique can effectively enlarge the scope of protection on network and syste... 详细信息
来源: 评论
A Method of in-Depth-Defense for Network security Based on Immunity Principles
A Method of in-Depth-Defense for Network Security Based on I...
收藏 引用
IEEE International symposium on Parallel and Distributed processing with Applications
作者: Jiang, Yaping Zhou, Jianhua Gan, Yong Cai, Zengyu Zhengzhou Univ Light Ind Sch Comp & Commun Engn Zhengzhou 450000 Peoples R China
The concepts of self, nonself, antibody, antigen and vaccine in in-Depth-Defense system for Network security was presented in this paper, the architecture of in-Depth Defense for network intrusion and detection based ... 详细信息
来源: 评论
The Design and Implementation of Host-based Intrusion detection System
The Design and Implementation of Host-based Intrusion Detect...
收藏 引用
3rd International symposium on Intelligent information Technology and security Informatics
作者: Lin Ying Zhang Yan Ou Yang-Jia Yunnan Univ Sch Software Kunming Yunnan Province Peoples R China Southwest Forestry Univ Dept Comp Sci Kunming Yunnan Province Peoples R China Cent South Univ Sch Informat Sci & Engn Changsha Hunan Peoples R China
Intrusion detection is the process of identifying and responding to suspicious activities targeted at computing and communication resources, and it has become the mainstream of information assurance as the dramatic in... 详细信息
来源: 评论
An Improved Pattern Matching Algorithm
An Improved Pattern Matching Algorithm
收藏 引用
3rd International symposium on Intelligent information Technology and security Informatics
作者: Yuan, Jingbo Zheng, Jisen Ding, Shunli Northeastern Univ Qinhuangdao Inst Informat Management Technol & Applicat Qinhuangdao Peoples R China
Pattern matching is a basic operation in various kinds of string process system. Pattern matching algorithms play an important role in intrusion detection, information retrieval, feature matching of computer virus and... 详细信息
来源: 评论
Multi-Agent network security audit system based on information entropy
Multi-Agent network security audit system based on informati...
收藏 引用
2010 IEEE 2nd symposium on Web Society, SWS 2010
作者: Lü, Taoxia Liu, Peiyu School of Information Science and Engineering Shandong Normal University Ji'nan 250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Ji'nan 250014 China
Because of the confidential and important information contained inside the local area network (LAN) of the companies or government departments, the network interior's security problem highlights gradually. On the ... 详细信息
来源: 评论
Research on Application of Region-of-Interest in Face detection
Research on Application of Region-of-Interest in Face Detect...
收藏 引用
3rd International symposium on Intelligent information Technology and security Informatics
作者: Zhou, Deng-feng Ye, Shui-sheng Hu, Shao-hua Nanchang Hangkong Univ Sch Software Nanchang Jiangxi Peoples R China Nanchang Hangkong Univ Sch Informat Engn Nanchang Jiangxi Peoples R China
The ROI regions in JPEG2000 coding system mostly are defined artificially but it will decrease working efficiency a lot. This paper proposed a new fast face detection method based on AdaBoost and skin color detection,... 详细信息
来源: 评论
Role-based collaborative information collection model for botnet detection
Role-based collaborative information collection model for bo...
收藏 引用
2010 International symposium on Collaborative Technologies and Systems, CTS 2010
作者: Wang, Hailong Gong, Zhenghu School of Computer National University of Defense Technology Changsha Hunan 410073 China
With the growing number of botnet attacks, the botnet detection is becoming increasingly important for the network security. To enhance the existing botnet detection systems which are short of efficient information co... 详细信息
来源: 评论