咨询与建议

限定检索结果

文献类型

  • 6,704 篇 会议
  • 40 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,027 篇 工学
    • 3,650 篇 计算机科学与技术...
    • 3,127 篇 软件工程
    • 1,337 篇 信息与通信工程
    • 721 篇 控制科学与工程
    • 645 篇 生物工程
    • 552 篇 电气工程
    • 353 篇 安全科学与工程
    • 294 篇 电子科学与技术(可...
    • 280 篇 网络空间安全
    • 256 篇 动力工程及工程热...
    • 235 篇 生物医学工程(可授...
    • 232 篇 交通运输工程
    • 212 篇 机械工程
    • 171 篇 光学工程
    • 126 篇 化学工程与技术
    • 119 篇 仪器科学与技术
  • 1,698 篇 理学
    • 849 篇 数学
    • 681 篇 生物学
    • 281 篇 物理学
    • 255 篇 统计学(可授理学、...
    • 176 篇 化学
    • 141 篇 系统科学
  • 980 篇 管理学
    • 566 篇 管理科学与工程(可...
    • 503 篇 图书情报与档案管...
    • 288 篇 工商管理
  • 382 篇 法学
    • 223 篇 社会学
    • 175 篇 法学
  • 217 篇 医学
    • 165 篇 临床医学
    • 163 篇 基础医学(可授医学...
  • 136 篇 经济学
    • 131 篇 应用经济学
  • 79 篇 教育学
  • 55 篇 农学
  • 22 篇 军事学
  • 18 篇 文学

主题

  • 354 篇 network security
  • 210 篇 security
  • 194 篇 deep learning
  • 169 篇 internet of thin...
  • 136 篇 machine learning
  • 130 篇 blockchain
  • 128 篇 software
  • 99 篇 intrusion detect...
  • 90 篇 feature extracti...
  • 80 篇 neural networks
  • 72 篇 cybersecurity
  • 69 篇 convolutional ne...
  • 66 篇 cryptography
  • 65 篇 software defined...
  • 64 篇 privacy
  • 62 篇 computational mo...
  • 61 篇 training
  • 59 篇 convolution
  • 56 篇 authentication
  • 56 篇 cloud computing

机构

  • 77 篇 school of cyber ...
  • 75 篇 institute of inf...
  • 50 篇 college of compu...
  • 41 篇 chitkara univers...
  • 36 篇 school of comput...
  • 35 篇 chinese academy ...
  • 31 篇 school of inform...
  • 27 篇 university of ch...
  • 26 篇 shandong provinc...
  • 25 篇 school of cyber ...
  • 25 篇 shenzhen univers...
  • 22 篇 school of comput...
  • 19 篇 school of comput...
  • 19 篇 university of ch...
  • 19 篇 school of softwa...
  • 19 篇 school of softwa...
  • 19 篇 purple mountain ...
  • 17 篇 peng cheng labor...
  • 17 篇 college of compu...
  • 17 篇 school of comput...

作者

  • 15 篇 sharma ishu
  • 12 篇 liu yang
  • 11 篇 li bo
  • 10 篇 zhang lei
  • 10 篇 zhang bo
  • 9 篇 iqbal muhammad w...
  • 9 篇 chen chen
  • 9 篇 yang wei
  • 9 篇 tiwari mohit
  • 8 篇 zhang yuqing
  • 8 篇 yang yang
  • 8 篇 ishu sharma
  • 8 篇 liu chang
  • 8 篇 liu qingyun
  • 8 篇 li hui
  • 7 篇 wang jing
  • 7 篇 mohit tiwari
  • 7 篇 wang xu
  • 7 篇 qingyun liu
  • 7 篇 xiao jianmao

语言

  • 6,611 篇 英文
  • 159 篇 其他
  • 38 篇 中文
  • 2 篇 土耳其文
  • 1 篇 德文
  • 1 篇 葡萄牙文
检索条件"任意字段=2023 International Conference on Computer Network Security and Software Engineering, CNSSE 2023"
6778 条 记 录,以下是11-20 订阅
排序:
Challenges and Prospects of Power network security Protection in the Context of a New Power System: A Case Study of Jiangxi  4th
Challenges and Prospects of Power Network Security Protectio...
收藏 引用
4th international conference on Data and Information in Online Environments
作者: Xiao, Yongcai Xu, Jian Liu, Kuangye Ge, Jingjing Hu, Lei Wang, Chenxi State Grid Jiangxi Elect Power Co Ltd Elect Power Res Inst Jiangxi Prov Key Lab Operat Control New Energy Po Nanchang 330013 Jiangxi Peoples R China East China Jiaotong Univ Nanchang 330013 Jiangxi Peoples R China Jiangxi Normal Univ Nanchang 330013 Jiangxi Peoples R China
In recent years, the power grid in Jiangxi Province has entered a new phase of construction in the context of a new power system. However, the traditional network security protection system of the company is facing in... 详细信息
来源: 评论
Learning AI Coding Style for software Plagiarism Detection  19th
Learning AI Coding Style for Software Plagiarism Detection
收藏 引用
19th international conference on security and Privacy in Communication networks
作者: Ambati, Sri Haritha Stakhanova, Natalia Branca, Enrico Univ Saskatchewan Dept Comp Sci Saskatoon SK Canada
software plagiarism is the reuse of software code without proper attribution and in violation of software licensing agreements or copyright laws. With the popularity of open-source software and the rapid emergence of ... 详细信息
来源: 评论
Blockchain Based Efficient Pairing-Free Certificateless Authentication Scheme for Vehicular Ad-hoc network  22nd
Blockchain Based Efficient Pairing-Free Certificateless Auth...
收藏 引用
22nd international conference on Service Oriented Computing
作者: Yu, Meiju Sa, Rula Zhang, Jin Zhao, Yi An, Qi Gao, Qiaomei Inner Mongolia Univ Coll Comp Hohhot 010021 Inner Mongolia Peoples R China
Vehicular ad hoc network (VANET) provides short range communication for vehicles, achieving information sharing to improve road safety and traffic efficiency. However, public communication between vehicles has led to ... 详细信息
来源: 评论
Lightweight Authentication System for software-Defined Wireless Sensor networks  15th
Lightweight Authentication System for Software-Defined Wirel...
收藏 引用
15th international conference on e Infrastructure and e Services for Developing Countries
作者: Illy, Amado Faye, Youssou Yelemou, Tiguiane Univ Nazi BONI Bobo Dioulasso Burkina Faso Univ Assane Seck Ziguinchor Ziguinchor Senegal
Sybil attack consists to generate several false identities in order to bypass access control and thus produce false messages to seriously undermine the normal operation of Wireless Sensor networks (WSN). It is conside... 详细信息
来源: 评论
Research on dynamic network security detection technology based on SDN  4
Research on dynamic network security detection technology ba...
收藏 引用
4th international conference on network Communication and Information security, ICNCIS 2024
作者: Zhao, Kai Beijing Polytechnic Beijing100176 China
Traditional network architecture can no longer meet the development needs of technologies such as cloud computing and big data. SDN network architecture has the characteristics of high openness and programmability, wh... 详细信息
来源: 评论
Low-Cost Advanced Undetectable Hardware-Based Malicious Keyboard  5th
Low-Cost Advanced Undetectable Hardware-Based Malicious Keyb...
收藏 引用
5th international conference on Computing and network Communications, CoCoNet 2023
作者: Diaz, Kevin Dofe, Jaya Electrical and Computer Engineering California State University Fullerton 800 N State College Blvd FullertonCA92831 United States
The widespread presence of peripheral devices in households, connecting to desktops and laptops, creates a substantial security vulnerability. These devices can be manipulated at the hardware level, allowing unauthori... 详细信息
来源: 评论
Design and Research of a computer network Experimental Teaching Systembased on SDN  14
Design and Research of a Computer Network Experimental Teach...
收藏 引用
14th international conference on Educational and Information Technology, ICEIT 2025
作者: Tao, Jun Yu, Wangfeng Han, Huihui Wang, Xinyu School of computer and software engineering Anhui Institute of information engineering WuHu China
The importance of computer network experiments in teaching is elaborated, while traditional computer network systems have low efficiency and chaotic management, these shortcomings affect the effectiveness of related t... 详细信息
来源: 评论
VRC-GraphNet: A Graph Neural network-Based Reasoning Framework for Attacking Visual Reasoning Captchas  19th
VRC-GraphNet: A Graph Neural Network-Based Reasoning Framewo...
收藏 引用
19th international conference on security and Privacy in Communication networks
作者: Xu, Botao Wang, Haizhou Sichuan Univ Sch Cyber Sci & Engn Chengdu 610065 Peoples R China
Captchas are widely used to distinguish between human and machine programs and protect computers from malicious attacks. However, with the development of image recognition and deep learning techniques, the attack succ... 详细信息
来源: 评论
Certificateless Aggregate Signature Without Trapdoor for Cloud Storage  19th
Certificateless Aggregate Signature Without Trapdoor for Clo...
收藏 引用
19th international conference on security and Privacy in Communication networks
作者: Dong, Yingjie Liao, Yongjian Zhang, Zhishuo Huang, Wen Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu Peoples R China Sichuan Univ Chengdu Peoples R China
In this paper, we propose a lattice-based certificateless signature scheme and certificateless aggregate signature which can be used to verify a large number of signatures simultaneously efficiently. To improve the se... 详细信息
来源: 评论
A Succinct Study on the DDoS Attack Detection Methods  3rd
A Succinct Study on the DDoS Attack Detection Methods
收藏 引用
3rd international conference on Machine Vision and Augmented Intelligence, MAI 2023
作者: Shylla, Dapynhunlang Nandan, Durgesh Symbiosis International Symbiosis Institute of Technology Deemed University Pune411042 India
The growth of "distributed denial-of-service" attacks has become one of the most serious threats to Internet security in recent years. They are classified as serious and have the potential to disrupt network... 详细信息
来源: 评论