咨询与建议

限定检索结果

文献类型

  • 6,728 篇 会议
  • 40 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,802 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,043 篇 工学
    • 3,663 篇 计算机科学与技术...
    • 3,147 篇 软件工程
    • 1,333 篇 信息与通信工程
    • 722 篇 控制科学与工程
    • 646 篇 生物工程
    • 546 篇 电气工程
    • 354 篇 安全科学与工程
    • 293 篇 电子科学与技术(可...
    • 282 篇 网络空间安全
    • 258 篇 动力工程及工程热...
    • 236 篇 生物医学工程(可授...
    • 234 篇 交通运输工程
    • 211 篇 机械工程
    • 172 篇 光学工程
    • 128 篇 化学工程与技术
    • 120 篇 仪器科学与技术
  • 1,698 篇 理学
    • 845 篇 数学
    • 683 篇 生物学
    • 280 篇 物理学
    • 256 篇 统计学(可授理学、...
    • 178 篇 化学
    • 142 篇 系统科学
  • 985 篇 管理学
    • 571 篇 管理科学与工程(可...
    • 503 篇 图书情报与档案管...
    • 291 篇 工商管理
  • 386 篇 法学
    • 225 篇 社会学
    • 177 篇 法学
  • 217 篇 医学
    • 165 篇 临床医学
    • 163 篇 基础医学(可授医学...
  • 137 篇 经济学
    • 132 篇 应用经济学
  • 82 篇 教育学
  • 56 篇 农学
  • 22 篇 军事学
  • 18 篇 文学

主题

  • 352 篇 network security
  • 210 篇 security
  • 195 篇 deep learning
  • 169 篇 internet of thin...
  • 135 篇 machine learning
  • 130 篇 blockchain
  • 129 篇 software
  • 98 篇 intrusion detect...
  • 90 篇 feature extracti...
  • 80 篇 neural networks
  • 72 篇 cybersecurity
  • 71 篇 convolutional ne...
  • 66 篇 software defined...
  • 66 篇 cryptography
  • 64 篇 privacy
  • 62 篇 computational mo...
  • 61 篇 training
  • 60 篇 convolution
  • 56 篇 authentication
  • 56 篇 cloud computing

机构

  • 78 篇 school of cyber ...
  • 75 篇 institute of inf...
  • 51 篇 college of compu...
  • 41 篇 chitkara univers...
  • 37 篇 school of comput...
  • 36 篇 chinese academy ...
  • 31 篇 school of inform...
  • 28 篇 university of ch...
  • 26 篇 shandong provinc...
  • 25 篇 school of cyber ...
  • 24 篇 shenzhen univers...
  • 22 篇 school of comput...
  • 20 篇 purple mountain ...
  • 19 篇 school of comput...
  • 19 篇 university of ch...
  • 19 篇 school of softwa...
  • 19 篇 school of softwa...
  • 18 篇 peng cheng labor...
  • 17 篇 college of compu...
  • 17 篇 school of comput...

作者

  • 15 篇 sharma ishu
  • 12 篇 liu yang
  • 11 篇 li bo
  • 10 篇 zhang lei
  • 10 篇 zhang bo
  • 9 篇 iqbal muhammad w...
  • 9 篇 chen chen
  • 9 篇 yang wei
  • 9 篇 tiwari mohit
  • 8 篇 zhang yuqing
  • 8 篇 yang yang
  • 8 篇 ishu sharma
  • 8 篇 liu chang
  • 8 篇 liu qingyun
  • 8 篇 li hui
  • 7 篇 wang jing
  • 7 篇 xu yuwei
  • 7 篇 mohit tiwari
  • 7 篇 wang xu
  • 7 篇 qingyun liu

语言

  • 6,526 篇 英文
  • 268 篇 其他
  • 57 篇 中文
  • 2 篇 土耳其文
  • 1 篇 德文
  • 1 篇 葡萄牙文
检索条件"任意字段=2023 International Conference on Computer Network Security and Software Engineering, CNSSE 2023"
6802 条 记 录,以下是201-210 订阅
排序:
Bi-directional LSTM-Attention Chinese Text Classification Model Based on Subsampling Optimization
Bi-directional LSTM-Attention Chinese Text Classification Mo...
收藏 引用
2023 international conference on Cyber security, Artificial Intelligence, and Digital Economy, CSAIDE 2023
作者: Lv, Jingze Huang, Wuzhe School of Software Computer and Information Science Southwest University Chongqing400715 China
This paper proposes a text classification model based on a bi-directional LSTM network with attention mechanism and subsampling in the word vector stage. Firstly, we use the Skip-gram model in Word2Vec for feature ext... 详细信息
来源: 评论
A Smart NIDS Design for SDN-based Cloud IoT network using Optimal Path Selection and RNN  9
A Smart NIDS Design for SDN-based Cloud IoT Network using Op...
收藏 引用
9th international conference on Signal Processing and Communication, ICSC 2023
作者: Kumar, Narendra Aeron, Anurag Dawar, Ishaan Kumar, Santosh Department of Computer Science and Engineering Amity University Jharkhand Ranchi India School of Computing DIT University Dehradun Dehradun India Computer science and Information Technology Siksha 'O' Anusandhan University Bhubaneshwar India
The Internet of Things (IoT) has greatly increased the possibility for developing intelligent connections and applications in many facets of daily life. Traditional security solutions frequently fail to solve security... 详细信息
来源: 评论
Adapting Graph Structure for IoT network: A Performance Analysis  21
Adapting Graph Structure for IoT Network: A Performance Anal...
收藏 引用
21st international Joint conference on computer Science and software engineering (JCSSE)
作者: Sejan, Mohammad Abrar Shakil Rahman, Md Habibur Aziz, Md Abdul Song, Hyoung-Kyu Tabassum, Rana Sejong Univ Dept Informat & Commun Engn Seoul South Korea Sejong Univ Dept Convergence Engn Intelligent Drone Seoul South Korea
Graph structures can effectively replicate intricate relationships among diverse entities, offering valuable insights into the interconnections among nodes. In this paper, we leverage graph neural network (GNN) algori... 详细信息
来源: 评论
An analysis of network security Attacks and their mitigation for Cognitive Radio Communication  9
An analysis of Network Security Attacks and their mitigation...
收藏 引用
9th international conference on Advanced Computing and Communication Systems, ICACCS 2023
作者: Gayathri, N. Anandakumar, H. Gowri, S. Keerthika, J. Nithyapriya, S. Sri Eshwar College of Engineering Computer Science and Engineering Tamilnadu Coimbatore India Sri Eshwar College of Engineering Department of Artificial Intelligence and Data Science Tamilnadu Coimbatore India
The primary motivator after the evolution of cognitive radio is the lack of utilization of the spectrum. This technology adds new functionality in the physical layer, data link sub-layer, Transmission Control Protocol... 详细信息
来源: 评论
Are We Aware? An Empirical Study on the Privacy and security Awareness of Smartphone Sensors  21
Are We Aware? An Empirical Study on the Privacy and Security...
收藏 引用
21st IEEE/ACIS international conference on software engineering Research, Management and Applications, SERA 2023
作者: Champa, Arifa I. Rabbi, Md Fazle Eishita, Farjana Z. Zibran, Minhaz F. Idaho State University Department of Computer Science United States
Smartphones are equipped with a wide variety of sensors, which can pose significant security and privacy risks if not properly protected. To assess the privacy and security risks of smartphone sensors, we first system... 详细信息
来源: 评论
IoT security: A Deep Learning-Based Approach for Intrusion Detection and Prevention
IoT Security: A Deep Learning-Based Approach for Intrusion D...
收藏 引用
2023 international conference on Evolutionary Algorithms and Soft Computing Techniques, EASCT 2023
作者: Kauhsik, Bhanu Nandanwar, Himanshu Katarya, Rahul Delhi Technological University Dept. of Software Engineering Delhi India Delhi Technological University Dept. of Computer Science and Engineering Delhi India
The size and market worth of the Internet of Things (IoT) have expanded, but unfortunately, the likelihood of user data being compromised has also risen. This presents a notable danger that has the potential to create... 详细信息
来源: 评论
Boolean Similarity Measure for Assessing Temporal Variation in the network Attack Surface  15
Boolean Similarity Measure for Assessing Temporal Variation ...
收藏 引用
15th international conference on Communication Systems and networks (COMSNETS)
作者: Bopche, Ghanshyam S. Tiwari, Deepnarayan Rai, Gopal N. Natl Inst Technol Dept Comp Applicat Tiruchirappalli India NPCI Mumbai Maharashtra India Collins Aerosp India Pvt Ltd Hyderabad Telangana India
The network security assessment is vital for improving the overall security posture. With diverse opportunities for using networking devices and configuring them, varying software application portfolios, and the incre... 详细信息
来源: 评论
Intelligent security Aware Routing: Using Model-Free Reinforcement Learning  32
Intelligent Security Aware Routing: Using Model-Free Reinfor...
收藏 引用
32nd international conference on computer Communications and networks, ICCCN 2023
作者: Mudgerikar, Anand Bertino, Elisa Purdue University Department of Computer Science United States
With the emergence and successful deployment of software defined networks (SDN), zero-trust security architecture, and network function virtualization (NFV) in large scale modern enterprise and 5G networks, it is poss... 详细信息
来源: 评论
Predicting and Evaluating Anomaly Detection and Traffic Analysis on software Defined networks Using a Hybrid Machine Learning Approach  5th
Predicting and Evaluating Anomaly Detection and Traffic Anal...
收藏 引用
5th international conference on Computing and network Communications, CoCoNet 2023
作者: Darshan, S. Radhika, N. Radhika, G. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Coimbatore India
In the rapidly evolving landscape of software Defined networks (SDNs), network security is of paramount importance. This research paper presents a comprehensive study on anomaly detection and traffic analysis in SDNs ... 详细信息
来源: 评论
A security Survey of NFV: From Causes to Practices  3
A Security Survey of NFV: From Causes to Practices
收藏 引用
3rd international conference on Consumer Electronics and computer engineering, ICCECE 2023
作者: He, Gang Liao, Xingxing Liu, Caixia School of Cyber Science and Engineering Southeast University Nanjing211189 China Purple Mountain Laboratories Nanjing211100 China National Digital Switching System Engineering and Technological R and D Center Zhengzhou450002 China Academy of Military Sciences Institute of System Engineering Beijing100091 China
network Function Virtualization (NFV) is proposed as new technology to address massive proprietary devices, high operation costs, poor flexibility and other problems in current traditional network. By separating netwo... 详细信息
来源: 评论