咨询与建议

限定检索结果

文献类型

  • 6,728 篇 会议
  • 40 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,802 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,043 篇 工学
    • 3,663 篇 计算机科学与技术...
    • 3,147 篇 软件工程
    • 1,333 篇 信息与通信工程
    • 722 篇 控制科学与工程
    • 646 篇 生物工程
    • 546 篇 电气工程
    • 354 篇 安全科学与工程
    • 293 篇 电子科学与技术(可...
    • 282 篇 网络空间安全
    • 258 篇 动力工程及工程热...
    • 236 篇 生物医学工程(可授...
    • 234 篇 交通运输工程
    • 211 篇 机械工程
    • 172 篇 光学工程
    • 128 篇 化学工程与技术
    • 120 篇 仪器科学与技术
  • 1,698 篇 理学
    • 845 篇 数学
    • 683 篇 生物学
    • 280 篇 物理学
    • 256 篇 统计学(可授理学、...
    • 178 篇 化学
    • 142 篇 系统科学
  • 985 篇 管理学
    • 571 篇 管理科学与工程(可...
    • 503 篇 图书情报与档案管...
    • 291 篇 工商管理
  • 386 篇 法学
    • 225 篇 社会学
    • 177 篇 法学
  • 217 篇 医学
    • 165 篇 临床医学
    • 163 篇 基础医学(可授医学...
  • 137 篇 经济学
    • 132 篇 应用经济学
  • 82 篇 教育学
  • 56 篇 农学
  • 22 篇 军事学
  • 18 篇 文学

主题

  • 352 篇 network security
  • 210 篇 security
  • 195 篇 deep learning
  • 169 篇 internet of thin...
  • 135 篇 machine learning
  • 130 篇 blockchain
  • 129 篇 software
  • 98 篇 intrusion detect...
  • 90 篇 feature extracti...
  • 80 篇 neural networks
  • 72 篇 cybersecurity
  • 71 篇 convolutional ne...
  • 66 篇 software defined...
  • 66 篇 cryptography
  • 64 篇 privacy
  • 62 篇 computational mo...
  • 61 篇 training
  • 60 篇 convolution
  • 56 篇 authentication
  • 56 篇 cloud computing

机构

  • 78 篇 school of cyber ...
  • 75 篇 institute of inf...
  • 51 篇 college of compu...
  • 41 篇 chitkara univers...
  • 37 篇 school of comput...
  • 36 篇 chinese academy ...
  • 31 篇 school of inform...
  • 28 篇 university of ch...
  • 26 篇 shandong provinc...
  • 25 篇 school of cyber ...
  • 24 篇 shenzhen univers...
  • 22 篇 school of comput...
  • 20 篇 purple mountain ...
  • 19 篇 school of comput...
  • 19 篇 university of ch...
  • 19 篇 school of softwa...
  • 19 篇 school of softwa...
  • 18 篇 peng cheng labor...
  • 17 篇 college of compu...
  • 17 篇 school of comput...

作者

  • 15 篇 sharma ishu
  • 12 篇 liu yang
  • 11 篇 li bo
  • 10 篇 zhang lei
  • 10 篇 zhang bo
  • 9 篇 iqbal muhammad w...
  • 9 篇 chen chen
  • 9 篇 yang wei
  • 9 篇 tiwari mohit
  • 8 篇 zhang yuqing
  • 8 篇 yang yang
  • 8 篇 ishu sharma
  • 8 篇 liu chang
  • 8 篇 liu qingyun
  • 8 篇 li hui
  • 7 篇 wang jing
  • 7 篇 xu yuwei
  • 7 篇 mohit tiwari
  • 7 篇 wang xu
  • 7 篇 qingyun liu

语言

  • 6,526 篇 英文
  • 268 篇 其他
  • 57 篇 中文
  • 2 篇 土耳其文
  • 1 篇 德文
  • 1 篇 葡萄牙文
检索条件"任意字段=2023 International Conference on Computer Network Security and Software Engineering, CNSSE 2023"
6802 条 记 录,以下是91-100 订阅
排序:
Analysis of cyber security rebuts and its rising aims on current technologies
Analysis of cyber security rebuts and its rising aims on cur...
收藏 引用
2022 international conference on computer network security and software engineering, cnsse 2022
作者: Jonath, Kwizera K. Liu, Zhaohui School of Computer Science University of South China Hunan Hengyang China
Cyber security executes a useful function in the information technology sector. Recently, keeping the data in the secured area has grown one of the most rebuts recently. In the cyber security field the first thought t... 详细信息
来源: 评论
software Development Teams Knowledge and Awareness of security Requirement engineering and security Requirement Elicitation and Analysis  7
Software Development Teams Knowledge and Awareness of Securi...
收藏 引用
7th Information Systems international conference, ISICO 2023
作者: Janisar, Aftab Alam bin Kalid, Khairul Shafee Sarlan, Aliza Bt Maiwada, Umar Danjuma Department of computer and information science Universiti Teknologi Petronas Seri Iskandar Perak32610 Malaysia
software security is a concern due to software's pervasiveness and how rapid software's are developed. Although studies have emphasized the importance of addressing security requirements during the early phase... 详细信息
来源: 评论
A Review of the security Challenges Mitigation in IoT Systems Via the Utilization of SDN Technology
A Review of the Security Challenges Mitigation in IoT System...
收藏 引用
2023 international conference on engineering, Science and Advanced Technology, ICESAT 2023
作者: Keti, Faris Ghazal, Omar Ms University of Duhok Electrical and Computer Engineering Department Duhok Kurdistan Region Iraq
The emergence of the Internet of Things (IoT) has led to an increase in data streams, requiring new network architectures that can accommodate the mass number of connected devices. However, the heterogeneity and secur... 详细信息
来源: 评论
Nmap network Scan Performance Optimisation  4
Nmap Network Scan Performance Optimisation
收藏 引用
4th international conference on Signal Processing and computer Science, SPCS 2023
作者: Liu, Ruiyang Guangzhou Huali Science and Technology Vocational College 7 Huali Road Guangzhou Huali Science Park Zengcheng District Guangdong Province Guangzhou City China
With the rapid development of computer networks, a vast amount of information is transmitted and stored within them. However, each node within these networks could potentially be a source of information leakage. In or... 详细信息
来源: 评论
A Multi-Feature Fusion Method with Inception Architecture for Image Steganalysis  27
A Multi-Feature Fusion Method with Inception Architecture fo...
收藏 引用
27th international conference on computer Supported Cooperative Work in Design (CSCWD)
作者: Jiang, Ming Zhang, Shuo Zhang, Feng Guo, Biao Li, Yun Guilin Univ Elect Technol Sch Comp Sci & Informat Secur Guilin Peoples R China Guangxi Metaverse Applicat Engn Ctr Nanning Peoples R China Guangxi Polytech Construct Sch Informat Engn Nanning Peoples R China Guangxi Inst Digital Technol Nanning Peoples R China Guilin Univ Elect Technol Guangxi Key Lab Trusted Software Guilin Peoples R China
Image steganography and image steganalysis is one of the research hotspots in the field of information security, the abuse of steganography causes many security risks. As an attack method of image steganography, the m... 详细信息
来源: 评论
Research and application of 5G-based smart airport terminal security access
Research and application of 5G-based smart airport terminal ...
收藏 引用
2023 international conference on computer Application and Information security, ICCAIS 2023
作者: Ye, Sheng Pan, Ping Bai, Bo Zheng, Xinzhe Huang, Yanqiang Jia, Guozu China Mobile Group Guangdong Co. Ltd. Guangzhou Branch Guangdong Guangzhou China
In the era of artificial intelligence, intelligence improves the operational efficiency and service quality of the civil aviation industry, but at the same time, it also brings various network security problems. In th... 详细信息
来源: 评论
Research on the Application Risk of computer network security Technology
Research on the Application Risk of Computer Network Securit...
收藏 引用
2023 international conference on networking, Informatics and Computing, ICNETIC 2023
作者: Guo, Bingqian Zhao, Wei Chen, Peicheng Zhang, Changsheng Sun, Zhaodong Feng, Wenbin Southwest Jiaotong University SWJTU-Leeds Joint School Chengdu China Huazhong Agricultural University School of Public Administration Wulanchabu China Xi'an Jiaotong University School of Energy and Power Engineering Xi'an China Yan'an University School of Petroleum Engineering and Environmental Engineering Yan'an China Qufu Normal University School of Physics and Physical Engineering Qufu China Nanfang College of Guangzhou School of Electrical and Computer Engineering Guangzhou China
In the new era, computer network security issues have attracted more and more attention. How to use the latest technology to strengthen the network operating environment and prevent data information leakage has become... 详细信息
来源: 评论
Research on the Framework Structure and Application of computer network security
Research on the Framework Structure and Application of Compu...
收藏 引用
2023 international conference on Mechatronics and Intelligent Control, ICMIC 2023
作者: Wang, Jin Hu Nan open university Hunan Changsha China
In the current social construction and development, the computer network security architecture design is composed of software and hardware, which refers to the communication transmission activities with transmission c... 详细信息
来源: 评论
engineering cost prediction based on BIM and BP neural network
Engineering cost prediction based on BIM and BP neural netwo...
收藏 引用
2023 international conference on computer Application and Information security, ICCAIS 2023
作者: Wang, Jianqi Faculty of Engineering University of Sydney NSW2006 Australia
Facing the fierce competition in the construction market, the contractor's investigation and forecast of construction material prices is not only an important prerequisite for reasonable quotation and winning bids... 详细信息
来源: 评论
Research on cracking WIFI wireless network using Kali-Linux penetration testing software  3
Research on cracking WIFI wireless network using Kali-Linux ...
收藏 引用
3rd international conference on Digital Signal and computer Communications, DSCC 2023
作者: Wang, Lin Ta, Chen Chin Ming, Tsai Chih School of Electronic and Electrical Engineering Zhaoqing University Zhaoqing526061 China Auray Technology Corp
In the paper, the penetration testing software aircrack-ng tool group was used to attack the wireless network, and the wireless network password of WPA/WPA2 encryption mode was cracked in the Kali-Linux virtual experi... 详细信息
来源: 评论