咨询与建议

限定检索结果

文献类型

  • 6,730 篇 会议
  • 40 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,804 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,046 篇 工学
    • 3,662 篇 计算机科学与技术...
    • 3,143 篇 软件工程
    • 1,336 篇 信息与通信工程
    • 728 篇 控制科学与工程
    • 646 篇 生物工程
    • 547 篇 电气工程
    • 355 篇 安全科学与工程
    • 293 篇 电子科学与技术(可...
    • 283 篇 网络空间安全
    • 260 篇 动力工程及工程热...
    • 236 篇 生物医学工程(可授...
    • 235 篇 交通运输工程
    • 214 篇 机械工程
    • 171 篇 光学工程
    • 130 篇 化学工程与技术
    • 120 篇 仪器科学与技术
  • 1,698 篇 理学
    • 845 篇 数学
    • 683 篇 生物学
    • 280 篇 物理学
    • 255 篇 统计学(可授理学、...
    • 178 篇 化学
    • 142 篇 系统科学
  • 985 篇 管理学
    • 570 篇 管理科学与工程(可...
    • 504 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 386 篇 法学
    • 225 篇 社会学
    • 177 篇 法学
  • 217 篇 医学
    • 165 篇 临床医学
    • 163 篇 基础医学(可授医学...
  • 137 篇 经济学
    • 132 篇 应用经济学
  • 80 篇 教育学
  • 56 篇 农学
  • 22 篇 军事学
  • 18 篇 文学

主题

  • 352 篇 network security
  • 210 篇 security
  • 194 篇 deep learning
  • 169 篇 internet of thin...
  • 135 篇 machine learning
  • 130 篇 blockchain
  • 130 篇 software
  • 98 篇 intrusion detect...
  • 90 篇 feature extracti...
  • 80 篇 neural networks
  • 72 篇 cybersecurity
  • 70 篇 convolutional ne...
  • 66 篇 software defined...
  • 66 篇 cryptography
  • 64 篇 privacy
  • 62 篇 computational mo...
  • 61 篇 training
  • 59 篇 convolution
  • 56 篇 authentication
  • 56 篇 cloud computing

机构

  • 78 篇 school of cyber ...
  • 75 篇 institute of inf...
  • 51 篇 college of compu...
  • 41 篇 chitkara univers...
  • 37 篇 school of comput...
  • 36 篇 chinese academy ...
  • 31 篇 school of inform...
  • 28 篇 university of ch...
  • 26 篇 shandong provinc...
  • 25 篇 school of cyber ...
  • 24 篇 shenzhen univers...
  • 22 篇 school of comput...
  • 20 篇 purple mountain ...
  • 19 篇 school of comput...
  • 19 篇 university of ch...
  • 19 篇 school of softwa...
  • 19 篇 school of softwa...
  • 17 篇 peng cheng labor...
  • 17 篇 college of compu...
  • 17 篇 school of comput...

作者

  • 15 篇 sharma ishu
  • 12 篇 liu yang
  • 11 篇 li bo
  • 10 篇 zhang lei
  • 10 篇 zhang bo
  • 9 篇 iqbal muhammad w...
  • 9 篇 chen chen
  • 9 篇 yang wei
  • 9 篇 tiwari mohit
  • 8 篇 zhang yuqing
  • 8 篇 yang yang
  • 8 篇 ishu sharma
  • 8 篇 liu chang
  • 8 篇 liu qingyun
  • 8 篇 li hui
  • 7 篇 wang jing
  • 7 篇 xu yuwei
  • 7 篇 mohit tiwari
  • 7 篇 wang xu
  • 7 篇 qingyun liu

语言

  • 6,524 篇 英文
  • 272 篇 其他
  • 57 篇 中文
  • 2 篇 土耳其文
  • 1 篇 德文
  • 1 篇 葡萄牙文
检索条件"任意字段=2023 International Conference on Computer Network Security and Software Engineering, CNSSE 2023"
6804 条 记 录,以下是151-160 订阅
排序:
Algae Object Detection Algorithm Based on Improved YOLOv5  6
Algae Object Detection Algorithm Based on Improved YOLOv5
收藏 引用
6th international conference on software engineering and computer Science, CSECS 2023
作者: Lin, Ke Tang, Yang Tang, Jianheng Huang, Huiqing Qin, Zhisong School of Computer and Information Security Guilin University of Electronic Technology Guilin China
Algae are sensitive to changes in water quality, and the substances produced by algae also have a direct impact on the aquatic environment, so the detection and analysis of algae can provide important information on c... 详细信息
来源: 评论
security Evaluation in software-Defined networks  12th
Security Evaluation in Software-Defined Networks
收藏 引用
13th international conference on Cloud Computing and Services Science (CLOSER)
作者: Ivkic, Igor Thiede, Dominik Race, Nicholas Broadbent, Matthew Gouglidis, Antonios Univ Lancaster Lancaster England Univ Appl Sci Burgenland Eisenstadt Austria Edinburgh Napier Univ Edinburgh Midlothian Scotland
Cloud computing has grown in importance in recent years which has led to a significant increase in Data Centre (DC) network requirements. A major driver of this change is virtualisation, which allows computing resourc... 详细信息
来源: 评论
network security, trust & privacy in a wiredwireless Environments-An Overview  1
Network security, trust & privacy in a wiredwireless Environ...
收藏 引用
1st international conference on Computational Intelligence, Communication Technology and networking, CICTN 2023
作者: Salama, Ramiz Al-Turjman, Fadi Bhatla, Shruti Gautam, Devendra Ai and Robotics Institute Research Center for Ai and IoT Near East University Nicosia Department of Computer Engineering Mersin10 Turkey Ai and Robotics Institute Near East University Artificial Intelligence Engineering Dept. Mersin Nicosia10 Turkey University of Kyrenia Research Center for Ai and IoT Faculty of Engineering Kyrenia Mersin10 Turkey Graphic Era Hill University Department of Computer Science and Engineering Dehradun India Abes Engineering College Ghaziabad India
In this report, we explore the key challenges and threats facing network security in wired and wireless environments, as well as the technologies and best practices for addressing these challenges. We provide an overv... 详细信息
来源: 评论
Evaluation of the Effectiveness Mitigation of Distributed Denial of Service in software-Defined networking Using the Nearest Centroid Classification  6
Evaluation of the Effectiveness Mitigation of Distributed De...
收藏 引用
6th international conference on computer and Informatics engineering, IC2IE 2023
作者: Grananta, Rahma Syndu Data, Mahendra Basuki, Achmad Brawijaya University Faculty of Computer Science Malang Indonesia
software-defined networking (SDN) is a modern approach in computer networking where the control plane and data plane layers are decoupled. The advantage of this separation is that it allows computer networks to be pro... 详细信息
来源: 评论
Automatic summarization of medical conversations based on episodic memory network hierarchical labels
Automatic summarization of medical conversations based on ep...
收藏 引用
2022 international conference on computer network security and software engineering, cnsse 2022
作者: Zheng, Peng Liu, Yongbin Wu, Lin University of South China Hunan Hengyang421000 China
Summarizations to the patients' problems and the doctors' treatments in the medical conversations can be highly useful, in terms of helping other patients with similar problems have a precise reference for pot... 详细信息
来源: 评论
computer network information security monitoring system  2
Computer network information security monitoring system
收藏 引用
2nd international conference on Big Data, Computational Intelligence, and Applications, BDCIA 2024
作者: Lin, Hongkai Wuhan Business University Hubei Wuhan430056 China
Although traditional protection methods can improve the security of the network to a certain extent, its effect is often limited in the face of complex network environment and various attacks. Therefore, it is an impo... 详细信息
来源: 评论
Based on WOA-BP neural network power the behavior detection
Based on WOA-BP neural network power the behavior detection
收藏 引用
2023 international conference on computer Application and Information security, ICCAIS 2023
作者: Kong, Lingji Wang, Xinmeng Li, Haiqi Zhao, Chengnan Tian, Junqiang State Grid Shandong Electric Power Company Heze Power Supply Company Shandong Heze274000 China
In view of the current situation that the phenomenon of power pilferage is common and the difficulty of anti-theft, a BP (Back Propagation) neural network steal detection method optimized by whale algorithm is propose... 详细信息
来源: 评论
CBAM-DnCNN: An Improved Method For Image Denoising  3
CBAM-DnCNN: An Improved Method For Image Denoising
收藏 引用
3rd international conference on Electronic Information engineering and computer Science, EIECS 2023
作者: Cai, Guofeng Sichuan University School of Software Engineering Chengdu China
In modern society, with the wide application of digital images in the fields of social media, medical diagnosis, security monitoring, and automatic driving, the quality of images has become particularly critical for i... 详细信息
来源: 评论
A Review of Methods to Prevent DDOS Attacks Using NFV and SDN  9
A Review of Methods to Prevent DDOS Attacks Using NFV and SD...
收藏 引用
9th international conference on Web Research, ICWR 2023
作者: Shayegan, Mohammad Javad Damghanian, Amirreza University of Science and Culture Department of Computer Engineering Tehran Iran
Denial-of-service attacks are always one of the most widespread security attacks at the enterprise network level. In DDOS attacks, a large amount of false demand is intentionally sent to the target network to disable ... 详细信息
来源: 评论
Role of DDoS in Smart Grid networks
Role of DDoS in Smart Grid Networks
收藏 引用
2023 international conference on Power Energy, Environment and Intelligent Control, PEEIC 2023
作者: Pandey, Vijay Kumar Singh, Yaduvir Manivasagam Vivekananda Global University Department of Mechanical Engineering Jaipur India Uttar Pradesh Greater Noida India Computer Science Engineering Department Bangalore India
This paper tackles the essential problem of distributed denial- of-service (DDoS) assaults on smart grid networks (SG) and presents a novel approach based on network software defined (SDN). The rising energy needs of ... 详细信息
来源: 评论