咨询与建议

限定检索结果

文献类型

  • 6,730 篇 会议
  • 40 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,804 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,046 篇 工学
    • 3,662 篇 计算机科学与技术...
    • 3,143 篇 软件工程
    • 1,336 篇 信息与通信工程
    • 728 篇 控制科学与工程
    • 646 篇 生物工程
    • 547 篇 电气工程
    • 355 篇 安全科学与工程
    • 293 篇 电子科学与技术(可...
    • 283 篇 网络空间安全
    • 260 篇 动力工程及工程热...
    • 236 篇 生物医学工程(可授...
    • 235 篇 交通运输工程
    • 214 篇 机械工程
    • 171 篇 光学工程
    • 130 篇 化学工程与技术
    • 120 篇 仪器科学与技术
  • 1,698 篇 理学
    • 845 篇 数学
    • 683 篇 生物学
    • 280 篇 物理学
    • 255 篇 统计学(可授理学、...
    • 178 篇 化学
    • 142 篇 系统科学
  • 985 篇 管理学
    • 570 篇 管理科学与工程(可...
    • 504 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 386 篇 法学
    • 225 篇 社会学
    • 177 篇 法学
  • 217 篇 医学
    • 165 篇 临床医学
    • 163 篇 基础医学(可授医学...
  • 137 篇 经济学
    • 132 篇 应用经济学
  • 80 篇 教育学
  • 56 篇 农学
  • 22 篇 军事学
  • 18 篇 文学

主题

  • 352 篇 network security
  • 210 篇 security
  • 194 篇 deep learning
  • 169 篇 internet of thin...
  • 135 篇 machine learning
  • 130 篇 blockchain
  • 130 篇 software
  • 98 篇 intrusion detect...
  • 90 篇 feature extracti...
  • 80 篇 neural networks
  • 72 篇 cybersecurity
  • 70 篇 convolutional ne...
  • 66 篇 software defined...
  • 66 篇 cryptography
  • 64 篇 privacy
  • 62 篇 computational mo...
  • 61 篇 training
  • 59 篇 convolution
  • 56 篇 authentication
  • 56 篇 cloud computing

机构

  • 78 篇 school of cyber ...
  • 75 篇 institute of inf...
  • 51 篇 college of compu...
  • 41 篇 chitkara univers...
  • 37 篇 school of comput...
  • 36 篇 chinese academy ...
  • 31 篇 school of inform...
  • 28 篇 university of ch...
  • 26 篇 shandong provinc...
  • 25 篇 school of cyber ...
  • 24 篇 shenzhen univers...
  • 22 篇 school of comput...
  • 20 篇 purple mountain ...
  • 19 篇 school of comput...
  • 19 篇 university of ch...
  • 19 篇 school of softwa...
  • 19 篇 school of softwa...
  • 17 篇 peng cheng labor...
  • 17 篇 college of compu...
  • 17 篇 school of comput...

作者

  • 15 篇 sharma ishu
  • 12 篇 liu yang
  • 11 篇 li bo
  • 10 篇 zhang lei
  • 10 篇 zhang bo
  • 9 篇 iqbal muhammad w...
  • 9 篇 chen chen
  • 9 篇 yang wei
  • 9 篇 tiwari mohit
  • 8 篇 zhang yuqing
  • 8 篇 yang yang
  • 8 篇 ishu sharma
  • 8 篇 liu chang
  • 8 篇 liu qingyun
  • 8 篇 li hui
  • 7 篇 wang jing
  • 7 篇 xu yuwei
  • 7 篇 mohit tiwari
  • 7 篇 wang xu
  • 7 篇 qingyun liu

语言

  • 6,524 篇 英文
  • 272 篇 其他
  • 57 篇 中文
  • 2 篇 土耳其文
  • 1 篇 德文
  • 1 篇 葡萄牙文
检索条件"任意字段=2023 International Conference on Computer Network Security and Software Engineering, CNSSE 2023"
6804 条 记 录,以下是111-120 订阅
排序:
Research on a lightweight real-time anomaly traffic detection method
Research on a lightweight real-time anomaly traffic detectio...
收藏 引用
2023 international conference on computer Application and Information security, ICCAIS 2023
作者: Geng, Haijun Ren, Min Wang, Qingsheng Liang, Shuanglong Zhou, Manlan School of Automation and Software Engineering Shanxi University Shanxi Taiyuan030006 China Shanxi Qingzhong Technology Co. Ltd. Shanxi Taiyuan030000 China School of Safety and Emergency Management Shanxi Vocational University of Engineering Science and Technology Shanxi Jinzhong China
Anomalous traffic detection in the network is one of the essential components of network security protection. Neural networks are widely used in intrusion detection systems, which can learn the ability to distinguish ... 详细信息
来源: 评论
security challenges of IoT with its applications and architecture
Security challenges of IoT with its applications and archite...
收藏 引用
international conference on Artificial Intelligence, Blockchain, Computing and security, ICABCS 2023
作者: Bathla, Neha Kaur, Amanpreet Department of Computer Science and Engineering Chitkara University Institute of Engineering & Technology Chitkara University Punjab India
IoT (Internet of Things) is the network of physical objects("things") in which embedded devices are used like sensors and software that are used for connecting the devices and objects over the internet. Curr... 详细信息
来源: 评论
Survivability Model of networks using Attack Graphs and Markov Chains  47
Survivability Model of Networks using Attack Graphs and Mark...
收藏 引用
47th IEEE-computer-Society Annual international conference on computers, software, and Applications (COMPSAC)
作者: Bardhan, Shuvo Georgetown Univ Sch Continuing Studies Cybersecur Risk Management Program Georgetown Guyana
The most difficult task that a networks administrator faces today is to save a network from an ongoing cyber attack. Modern networks have the capability of detecting ongoing cyber attacks (i.e., using Intrusion Detect... 详细信息
来源: 评论
Research Directions in Formal Verification of network Configurations Toward Verification of Mobile networks  7th
Research Directions in Formal Verification of Network Config...
收藏 引用
7th international conference on Mobile Internet security (MobiSec)
作者: Sakurada, Hideki Sakurai, Kouichi NTT Corp Tokyo Japan Kyushu Univ Fukuoka Japan Adv Telecommun Res Inst Int Kyoto Japan
This paper reviews current research trends in the formal verification of computer network configurations, specifically focusing on formal verification for software-defined networking (SDN). We explore the challenges e... 详细信息
来源: 评论
Research on computer network Intrusion Detection Algorithm Based on Deep Learning
Research on Computer Network Intrusion Detection Algorithm B...
收藏 引用
2023 IEEE international conference on Electrical, Automation and computer engineering, ICEACE 2023
作者: Huang, Xiaoyang Tianjin University of Technology Tianjin China
With the continuous popularization and deepening of the network, the problem of network security is becoming increasingly prominent. How to detect the network intrusion behavior timely and accurately plays a very impo... 详细信息
来源: 评论
Simulation of computer network Information security Assessment Model Based on Data Mining  2
Simulation of Computer Network Information Security Assessme...
收藏 引用
2nd international conference on Artificial Intelligence and Autonomous Robot Systems, AIARS 2023
作者: Liu, Yanjia Yong, Xi Hua, Baojian Yang, Jianhua Institute of Computing Technology Chinese Academy of Sciences Beijing100086 China Ministry of Water Resources Information Centre Beijing100053 China University of Science and Technology of China School of Software Engineering Jiangsu Suzhou215123 China Beijing Sinohonour Computing Technology Beijing100029 China
With the continuous growth of scie & tech, network technology has been widely used, which has brought great convenience to people's life and work. However, the rapid improvement of network technology has also ... 详细信息
来源: 评论
Incorporating of security Methods into the software Development Lifecycle Process (SDLC)
Incorporating of Security Methods into the Software Developm...
收藏 引用
2023 international conference on computer Communication and Informatics, ICCCI 2023
作者: Aishwarya, Vakkalagadda Pediredla, Saivishal Radhika, Batchu Vasanthi, Bhumula Padmanaban, K. Velmurugan, A.K. Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Andhra Pradesh Vaddeswaram India
As software usage increases and updates, software development requires several essential elements, including industry security. As vulnerabilities are exploited, we've witnessed an upsurge in the demand for securi... 详细信息
来源: 评论
Temporal-Gated Graph Neural network with Graph Sampling for Multi-step Attack Detection  22
Temporal-Gated Graph Neural Network with Graph Sampling for ...
收藏 引用
IEEE 22nd international conference on Trust, security and Privacy in Computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Chen, Shuyu Lin, Dawei Xie, Zhenping Wang, Hongbo Jiangnan Univ Sch Artificial Intelligence & Comp Sci Wuxi Jiangsu Peoples R China Jiangnan Univ Jiangsu Key Lab Media Design & Software Technol Wuxi Jiangsu Peoples R China Inspur Software Co Ltd Tai An Shandong Peoples R China TRS Topwalk Informat Technol Co Ltd Beijing Peoples R China
The emergence of new network attacks, especially multi-step attacks which exhibit complex patterns, presents challenges to network security. Intrusion detection in network traffic is one of the core means to ensure ne... 详细信息
来源: 评论
Research on the Application of computer network security in Cloud computer Intelligent System
Research on the Application of Computer Network Security in ...
收藏 引用
2023 IEEE international conference on Image Processing and computer Applications, ICIPCA 2023
作者: Zhang, Jianqin Jiangsu Union Technical Institute Nanjing Engineering Branch Nanjing China
This paper proposes a new firewall model to solve the problem of computer network security threats. Firstly, this paper gives the division of function modules and the working algorithm of firewall model system. Then t... 详细信息
来源: 评论
computer networkS CYBER security VIA AN INTRUSION DETECTION SYSTEM
COMPUTER NETWORKS CYBER SECURITY VIA AN INTRUSION DETECTION ...
收藏 引用
2023 IEEE international conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication engineering, RMKMATE 2023
作者: Latha, J. KarthickMurugan, S. Logalakshmi, A. Department of Computer Science and Engineering R.M.K. Engineering College India Department of Computer Science and Engineering R.M.D. Engineering College India Department of Computer Science and Engineering Thiruthangal Nadar College India
Effectively identifying computer network attacks is still a challenge. This is due to recent attempts by cybercriminals to spoof intrusion detection systems (IDS) by altering packet contents. Additionally, the compute... 详细信息
来源: 评论