咨询与建议

限定检索结果

文献类型

  • 6,704 篇 会议
  • 40 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,027 篇 工学
    • 3,650 篇 计算机科学与技术...
    • 3,127 篇 软件工程
    • 1,337 篇 信息与通信工程
    • 721 篇 控制科学与工程
    • 645 篇 生物工程
    • 552 篇 电气工程
    • 353 篇 安全科学与工程
    • 294 篇 电子科学与技术(可...
    • 280 篇 网络空间安全
    • 256 篇 动力工程及工程热...
    • 235 篇 生物医学工程(可授...
    • 232 篇 交通运输工程
    • 212 篇 机械工程
    • 171 篇 光学工程
    • 126 篇 化学工程与技术
    • 119 篇 仪器科学与技术
  • 1,698 篇 理学
    • 849 篇 数学
    • 681 篇 生物学
    • 281 篇 物理学
    • 255 篇 统计学(可授理学、...
    • 176 篇 化学
    • 141 篇 系统科学
  • 980 篇 管理学
    • 566 篇 管理科学与工程(可...
    • 503 篇 图书情报与档案管...
    • 288 篇 工商管理
  • 382 篇 法学
    • 223 篇 社会学
    • 175 篇 法学
  • 217 篇 医学
    • 165 篇 临床医学
    • 163 篇 基础医学(可授医学...
  • 136 篇 经济学
    • 131 篇 应用经济学
  • 79 篇 教育学
  • 55 篇 农学
  • 22 篇 军事学
  • 18 篇 文学

主题

  • 354 篇 network security
  • 210 篇 security
  • 194 篇 deep learning
  • 169 篇 internet of thin...
  • 136 篇 machine learning
  • 130 篇 blockchain
  • 128 篇 software
  • 99 篇 intrusion detect...
  • 90 篇 feature extracti...
  • 80 篇 neural networks
  • 72 篇 cybersecurity
  • 69 篇 convolutional ne...
  • 66 篇 cryptography
  • 65 篇 software defined...
  • 64 篇 privacy
  • 62 篇 computational mo...
  • 61 篇 training
  • 59 篇 convolution
  • 56 篇 authentication
  • 56 篇 cloud computing

机构

  • 77 篇 school of cyber ...
  • 75 篇 institute of inf...
  • 50 篇 college of compu...
  • 41 篇 chitkara univers...
  • 36 篇 school of comput...
  • 35 篇 chinese academy ...
  • 31 篇 school of inform...
  • 27 篇 university of ch...
  • 26 篇 shandong provinc...
  • 25 篇 school of cyber ...
  • 25 篇 shenzhen univers...
  • 22 篇 school of comput...
  • 19 篇 school of comput...
  • 19 篇 university of ch...
  • 19 篇 school of softwa...
  • 19 篇 school of softwa...
  • 19 篇 purple mountain ...
  • 17 篇 peng cheng labor...
  • 17 篇 college of compu...
  • 17 篇 school of comput...

作者

  • 15 篇 sharma ishu
  • 12 篇 liu yang
  • 11 篇 li bo
  • 10 篇 zhang lei
  • 10 篇 zhang bo
  • 9 篇 iqbal muhammad w...
  • 9 篇 chen chen
  • 9 篇 yang wei
  • 9 篇 tiwari mohit
  • 8 篇 zhang yuqing
  • 8 篇 yang yang
  • 8 篇 ishu sharma
  • 8 篇 liu chang
  • 8 篇 liu qingyun
  • 8 篇 li hui
  • 7 篇 wang jing
  • 7 篇 mohit tiwari
  • 7 篇 wang xu
  • 7 篇 qingyun liu
  • 7 篇 xiao jianmao

语言

  • 6,611 篇 英文
  • 159 篇 其他
  • 38 篇 中文
  • 2 篇 土耳其文
  • 1 篇 德文
  • 1 篇 葡萄牙文
检索条件"任意字段=2023 International Conference on Computer Network Security and Software Engineering, CNSSE 2023"
6778 条 记 录,以下是1-10 订阅
排序:
international conference on computer network security and software engineering, cnsse 2023
International Conference on Computer Network Security and So...
收藏 引用
2023 international conference on computer network security and software engineering, cnsse 2023
The proceedings contain 67 papers. The topics discussed include: intrusion detection model based on GA-BP;Internet of things-oriented data security risk monitoring system;program completeness verification mechanism ba...
来源: 评论
2021 international conference on computer network security and software engineering, cnsse 2021
2021 International Conference on Computer Network Security a...
收藏 引用
2021 international conference on computer network security and software engineering, cnsse 2021
The proceedings contain 71 papers. The topics discussed include: performance optimization method for distributed storage system based on hybrid storage device;controllable text-to-image generation with enhanced text e...
来源: 评论
international conference on computer network security and software engineering, cnsse 2024
International Conference on Computer Network Security and So...
收藏 引用
2024 international conference on computer network security and software engineering, cnsse 2024
The proceedings contain 68 papers. The topics discussed include: isolate cache shield: defending cache attacks via cache set isolation;physical layer secure transmission method based on MSK modulator structure hopping...
来源: 评论
international conference on computer network security and software engineering, cnsse 2022
International Conference on Computer Network Security and So...
收藏 引用
2022 international conference on computer network security and software engineering, cnsse 2022
The proceedings contain 48 papers. The topics discussed include: research on modeling method of network attack chain efficiency;audio adversarial attack: his attack;a measure for enhancing Hreik network lookup;a priva...
来源: 评论
The security Analysis of ROS2 Communication  19th
The Security Analysis of ROS2 Communication
收藏 引用
19th international conference on security and Privacy in Communication networks
作者: Yang, Shuo Li, Hongru Guo, Jian ECNU MoE Engn Res Ctr Software Hardware Codesign Technol & Applicat Shanghai Peoples R China ECNU Shanghai Trusted Ind Internet Software Collaborat Shanghai Peoples R China ECNU Xinjiang Teachers Coll Shanghai Peoples R China ECNU Natl Trusted Embedded Software Engn Technol Res C Shanghai Peoples R China
With the increasing use of robots in various fields, the importance of communication security between robots and their components has become a pressing concern. As the primary development framework for robot applicati... 详细信息
来源: 评论
DNN Architecture Attacks via network and Power Side Channels  19th
DNN Architecture Attacks via Network and Power Side Channels
收藏 引用
19th international conference on security and Privacy in Communication networks
作者: Dai, Yuanjun Guo, Qingzhe Wang, An Case Western Reserve Univ Cleveland OH 44106 USA
The increasing complexity of machine learning models drives the emergence of Machine-Learning-as-a-Service (MLaaS) solutions provided by cloud service providers. With MLaaS, customers can leverage existing data center... 详细信息
来源: 评论
computer network information security monitoring system  2
Computer network information security monitoring system
收藏 引用
2nd international conference on Big Data, Computational Intelligence, and Applications, BDCIA 2024
作者: Lin, Hongkai Wuhan Business University Hubei Wuhan430056 China
Although traditional protection methods can improve the security of the network to a certain extent, its effect is often limited in the face of complex network environment and various attacks. Therefore, it is an impo... 详细信息
来源: 评论
5G network security: Unraveling Vulnerabilities and Innovating Defense Mechanisms  15th
5G Network Security: Unraveling Vulnerabilities and Innovati...
收藏 引用
15th international conference on e Infrastructure and e Services for Developing Countries
作者: Saeed, Mamoon M. Ali, Elmustafa Sayed Khalifa, Othman O. Mokhtar, Rania A. Univ Modern Sci UMS Dept Commun & Elect Engn Fac Engn Sanaa Yemen Red Sea Univ RSU Dept Elect & Elect Engn Port Sudan Sudan Int Islamic Univ Malaysia Dept Elect & Comp Engn Kuala Lumpur Malaysia Taif Univ Coll Comp & Informat Technol Dept Comp Engn POB 11099 Taif 21944 Saudi Arabia
Rapid developments in cellular communications are accompanied by rising privacy and security worries. Many people refrain from participating in activities like social networking, shopping, transactions, and conducting... 详细信息
来源: 评论
Predicting and Evaluating Anomaly Detection and Traffic Analysis on software Defined networks Using a Hybrid Machine Learning Approach  5th
Predicting and Evaluating Anomaly Detection and Traffic Anal...
收藏 引用
5th international conference on Computing and network Communications, CoCoNet 2023
作者: Darshan, S. Radhika, N. Radhika, G. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Coimbatore India
In the rapidly evolving landscape of software Defined networks (SDNs), network security is of paramount importance. This research paper presents a comprehensive study on anomaly detection and traffic analysis in SDNs ... 详细信息
来源: 评论
Hardware security in Evolving FinTech Landscape  5th
Hardware Security in Evolving FinTech Landscape
收藏 引用
5th international conference on Computing and network Communications, CoCoNet 2023
作者: Bhowmik, Biswajit Dongala, Joshitha Reddy Sudhama, Kruthika K. Antony, Reshma Tresa Girish, K.K. Maharshi Sushrut CAS Lab BRICS Laboratory Department of Computer Science and Engineering National Institute of Technology Karnataka Mangalore Surathkal575025 India
The assimilation of technology into the financial sector, often referred to as FinTech, has brought about a significant transformation. This shift has not only widened the scope of financial inclusivity but has also f... 详细信息
来源: 评论