咨询与建议

限定检索结果

文献类型

  • 7,092 篇 会议
  • 104 册 图书
  • 102 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 7,300 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,590 篇 工学
    • 4,757 篇 计算机科学与技术...
    • 3,286 篇 软件工程
    • 2,066 篇 信息与通信工程
    • 627 篇 生物工程
    • 616 篇 电气工程
    • 490 篇 控制科学与工程
    • 318 篇 电子科学与技术(可...
    • 299 篇 动力工程及工程热...
    • 292 篇 生物医学工程(可授...
    • 274 篇 安全科学与工程
    • 202 篇 机械工程
    • 201 篇 光学工程
    • 164 篇 交通运输工程
    • 131 篇 化学工程与技术
    • 127 篇 建筑学
    • 124 篇 仪器科学与技术
  • 1,991 篇 理学
    • 1,096 篇 数学
    • 660 篇 生物学
    • 414 篇 物理学
    • 345 篇 统计学(可授理学、...
    • 195 篇 系统科学
    • 145 篇 化学
  • 1,001 篇 管理学
    • 542 篇 管理科学与工程(可...
    • 511 篇 图书情报与档案管...
    • 327 篇 工商管理
  • 359 篇 法学
    • 214 篇 社会学
    • 148 篇 法学
  • 241 篇 医学
    • 200 篇 临床医学
    • 197 篇 基础医学(可授医学...
  • 130 篇 经济学
    • 126 篇 应用经济学
  • 66 篇 教育学
  • 65 篇 农学
  • 30 篇 军事学
  • 11 篇 文学
  • 2 篇 艺术学

主题

  • 345 篇 security
  • 301 篇 internet of thin...
  • 239 篇 network security
  • 207 篇 blockchain
  • 177 篇 feature extracti...
  • 171 篇 machine learning
  • 143 篇 authentication
  • 140 篇 deep learning
  • 126 篇 protocols
  • 119 篇 training
  • 118 篇 cloud computing
  • 108 篇 intrusion detect...
  • 108 篇 computer archite...
  • 105 篇 wireless sensor ...
  • 97 篇 cryptography
  • 94 篇 wireless communi...
  • 94 篇 neural networks
  • 92 篇 convolution
  • 85 篇 servers
  • 82 篇 artificial intel...

机构

  • 45 篇 univ chinese aca...
  • 43 篇 chinese acad sci...
  • 27 篇 school of cyber ...
  • 26 篇 school of comput...
  • 24 篇 school of commun...
  • 24 篇 institute of inf...
  • 23 篇 school of inform...
  • 20 篇 school of comput...
  • 20 篇 school of comput...
  • 19 篇 univ chinese aca...
  • 18 篇 school of comput...
  • 17 篇 college of compu...
  • 15 篇 university of el...
  • 15 篇 school of data a...
  • 14 篇 beijing electron...
  • 14 篇 school of inform...
  • 14 篇 school of comput...
  • 13 篇 school of cybers...
  • 13 篇 beijing universi...
  • 12 篇 school of inform...

作者

  • 20 篇 wang zhiqiang
  • 17 篇 wang lei
  • 16 篇 zhang bo
  • 15 篇 luo xiaonan
  • 15 篇 li jingbing
  • 15 篇 yang yang
  • 14 篇 liu jing
  • 14 篇 li hui
  • 13 篇 yang tao
  • 12 篇 zhang lei
  • 12 篇 liu yang
  • 12 篇 zhang ke
  • 12 篇 ding yong
  • 12 篇 wang wei
  • 11 篇 liu jian
  • 11 篇 lin bin
  • 10 篇 wang tao
  • 10 篇 wang yujue
  • 10 篇 zhang shibin
  • 10 篇 han weihong

语言

  • 7,220 篇 英文
  • 68 篇 其他
  • 30 篇 中文
检索条件"任意字段=2019 International Conference on Computer Science Communication and Network Security, CSCNS 2019"
7300 条 记 录,以下是1-10 订阅
排序:
2019 international conference on computer science communication and network security, cscns 2019
2019 International Conference on Computer Science Communicat...
收藏 引用
2019 international conference on computer science communication and network security, cscns 2019
The proceedings contain 109 papers. The topics discussed include: multi-channel wireless A/D acquisition system based on NRF24L01 and LABVIEW;ADE-FDTD method for study of two-dimensional electromagnetic wave propagati...
来源: 评论
Research on network security Situation Assessment Method  1
收藏 引用
13th international conference on computer Engineering and networks (CENet)
作者: Gao, Yuan Wen, Jin Chen, Pu Wang, Zhiqiang Beijing Elect Sci & Technol Inst Dept Elect & Commun Engn Beijing 10070 Peoples R China Beijing Elect Sci & Technol Inst Dept Cyberspace Secur Beijing 10070 Peoples R China
The Internet has penetrated into various fields of human production and life. While enjoying Internet technology, people have to face various problems brought about by the Internet, among which network security issues... 详细信息
来源: 评论
An Updatable Key Management Scheme for Underwater Wireless Sensor networks  23rd
An Updatable Key Management Scheme for Underwater Wireless S...
收藏 引用
23rd international conference on Algorithms and Architectures for Parallel Processing (ICA3PP)
作者: Guan, Zhiyun Wu, Junhua Li, Guangshun Wang, Tielin Qufu Normal Univ Sch Comp Sci Rizhao 276826 Peoples R China
In recent years, underwater wireless sensor networks (UWSNs) have emerged as promising network model for various marine exploration, detection, and protection applications. The problems of frequent node movement and h... 详细信息
来源: 评论
Optimizing DDoS Attack Detection Using Machine Learning  2
Optimizing DDoS Attack Detection Using Machine Learning
收藏 引用
2nd international conference on Computational Intelligence, communication Technology and networking, CICTN 2025
作者: Aggarwal, Saransh Behera, Bhagrajyoti Singh, Murari Kumar Sharma, Ajeet Kumar School of Computing Science and Engineering Sharda University Greater Noida India School of Computer Science and Engineering Sharda University Greater Noida India
The increase in the Distributed Denial of Service attack (DDoS) leads to a significant threat to the network security. Inability to timely and accurately detect DDoS attacks disrupts services offered by companies and ... 详细信息
来源: 评论
XGBoost and Deep Learning Based-Federated Learning for DDoS Attack Detection in 5G Core network VNFs.  6
XGBoost and Deep Learning Based-Federated Learning for DDoS ...
收藏 引用
6th international conference on computer communication and the Internet (ICCCI)
作者: Maiga, Abdoul-Aziz Ataro, Edwin Githinji, Stanley Pan African Univ Inst Basic Sci Technol & Innovat Nairobi Kenya Tech Univ Kenya Dept Elect & Elect Engn Nairobi Kenya US Int Univ Africa USIU A Dept Comp Nairobi Kenya
Distributed Denial-of-Service (DDoS) attacks can employ cloud network zombies to compromise the availability of 5G network services and hinder the ability of telecommunication service providers (TSPs) to deliver promi... 详细信息
来源: 评论
An Enhanced Intrusion Detection Model with FeedForward Neural network Classifier  27
An Enhanced Intrusion Detection Model with FeedForward Neura...
收藏 引用
27th international conference on Advanced communications Technology, ICACT 2025
作者: Amirjon, Asadov Gain, Mrityunjoy Oh Kim, Keon Hong, Choong Seon Department of Computer Science and Engineering Kyung Hee University Yongin Korea Republic of Department of Artificial Intelligence Kyung Hee University Yongin Korea Republic of
A major obstacle in the face of increasingly complex cyberattacks is network security. Proactive security measures require effective intrusion detection systems (IDS) that can precisely classify and categorize network... 详细信息
来源: 评论
CGPNet: Enhancing Medical Image Classification through Channel Grouping and Partial Convolution network  22
CGPNet: Enhancing Medical Image Classification through Chann...
收藏 引用
IEEE 22nd international conference on Trust, security and Privacy in Computing and communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Chen, Kairen Chen, Shuhong Wang, Guojun Wang, Chenchen Guangzhou Univ Sch Comp Sci & Cyber Engn Guangzhou 510006 Peoples R China
With the rapid development of artificial intelligence (AI), various industries have been propelled forward. In the field of medicine, AI has proven to be invaluable in aiding doctors to gain further insights into medi... 详细信息
来源: 评论
Evaluating Machine Learning Approaches for DDoS Attack Detection Using CIC-DDoS2019  2
Evaluating Machine Learning Approaches for DDoS Attack Detec...
收藏 引用
2nd international conference on Advanced Computing and communication Technologies, ICACCTech 2024
作者: Kapil, Divya Mittal, Varsha Gangodkar, DurgaPrasad School of Computing CSE Graphic Era Hill University Graphic Era Deemed to be University Dehradun India Computer Science and Engineering Graphic Era Deemed to be University Dehradun India
With the increasing majority of DDoS attacks, adequate detection techniques are required to protect network infrastructure. DDoS attacks are a substantial hazard to network security. The CICDDoS 2019 dataset furnishes... 详细信息
来源: 评论
Encrypted Malicious Traffic Detection Based on Graph Convolutional network and Temporal Dissection  27
Encrypted Malicious Traffic Detection Based on Graph Convolu...
收藏 引用
27th international conference on computer Supported Cooperative Work in Design (CSCWD)
作者: Liu, Yuchen Wang, Shanshan Jin Au-yeung Chen, Zhenxiang Univ Jinan Sch Informat Sci & Engn Jinan Peoples R China Quancheng Lab Jinan Peoples R China
With the rapid development of the Internet, network security issues are receiving increasing attention and various network attack methods are emerging, among which encrypted malicious traffic, as a common attack metho... 详细信息
来源: 评论
Information Encryption Transmission Method of Automobile communication network Based on Neural network  1
收藏 引用
4th international conference on Machine Learning for Cyber security, ML4CS 2022
作者: Kong, Chunhua Ma, Kai Wei, Jiatong College of Automotive Engineering Jilin Communications Polytechnic Changchun130012 China Jilin Communications Polytechnic Changchun130012 China
In order to ensure the information security of automobile communication network, an encryption transmission method of automobile communication network information based on neural network is proposed. Use neural networ... 详细信息
来源: 评论