咨询与建议

限定检索结果

文献类型

  • 6,728 篇 会议
  • 40 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,802 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,043 篇 工学
    • 3,663 篇 计算机科学与技术...
    • 3,147 篇 软件工程
    • 1,333 篇 信息与通信工程
    • 722 篇 控制科学与工程
    • 646 篇 生物工程
    • 546 篇 电气工程
    • 354 篇 安全科学与工程
    • 293 篇 电子科学与技术(可...
    • 282 篇 网络空间安全
    • 258 篇 动力工程及工程热...
    • 236 篇 生物医学工程(可授...
    • 234 篇 交通运输工程
    • 211 篇 机械工程
    • 172 篇 光学工程
    • 128 篇 化学工程与技术
    • 120 篇 仪器科学与技术
  • 1,698 篇 理学
    • 845 篇 数学
    • 683 篇 生物学
    • 280 篇 物理学
    • 256 篇 统计学(可授理学、...
    • 178 篇 化学
    • 142 篇 系统科学
  • 985 篇 管理学
    • 571 篇 管理科学与工程(可...
    • 503 篇 图书情报与档案管...
    • 291 篇 工商管理
  • 386 篇 法学
    • 225 篇 社会学
    • 177 篇 法学
  • 217 篇 医学
    • 165 篇 临床医学
    • 163 篇 基础医学(可授医学...
  • 137 篇 经济学
    • 132 篇 应用经济学
  • 82 篇 教育学
  • 56 篇 农学
  • 22 篇 军事学
  • 18 篇 文学

主题

  • 352 篇 network security
  • 210 篇 security
  • 195 篇 deep learning
  • 169 篇 internet of thin...
  • 135 篇 machine learning
  • 130 篇 blockchain
  • 129 篇 software
  • 98 篇 intrusion detect...
  • 90 篇 feature extracti...
  • 80 篇 neural networks
  • 72 篇 cybersecurity
  • 71 篇 convolutional ne...
  • 66 篇 software defined...
  • 66 篇 cryptography
  • 64 篇 privacy
  • 62 篇 computational mo...
  • 61 篇 training
  • 60 篇 convolution
  • 56 篇 authentication
  • 56 篇 cloud computing

机构

  • 78 篇 school of cyber ...
  • 75 篇 institute of inf...
  • 51 篇 college of compu...
  • 41 篇 chitkara univers...
  • 37 篇 school of comput...
  • 36 篇 chinese academy ...
  • 31 篇 school of inform...
  • 28 篇 university of ch...
  • 26 篇 shandong provinc...
  • 25 篇 school of cyber ...
  • 24 篇 shenzhen univers...
  • 22 篇 school of comput...
  • 20 篇 purple mountain ...
  • 19 篇 school of comput...
  • 19 篇 university of ch...
  • 19 篇 school of softwa...
  • 19 篇 school of softwa...
  • 18 篇 peng cheng labor...
  • 17 篇 college of compu...
  • 17 篇 school of comput...

作者

  • 15 篇 sharma ishu
  • 12 篇 liu yang
  • 11 篇 li bo
  • 10 篇 zhang lei
  • 10 篇 zhang bo
  • 9 篇 iqbal muhammad w...
  • 9 篇 chen chen
  • 9 篇 yang wei
  • 9 篇 tiwari mohit
  • 8 篇 zhang yuqing
  • 8 篇 yang yang
  • 8 篇 ishu sharma
  • 8 篇 liu chang
  • 8 篇 liu qingyun
  • 8 篇 li hui
  • 7 篇 wang jing
  • 7 篇 xu yuwei
  • 7 篇 mohit tiwari
  • 7 篇 wang xu
  • 7 篇 qingyun liu

语言

  • 6,526 篇 英文
  • 268 篇 其他
  • 57 篇 中文
  • 2 篇 土耳其文
  • 1 篇 德文
  • 1 篇 葡萄牙文
检索条件"任意字段=2023 International Conference on Computer Network Security and Software Engineering, CNSSE 2023"
6802 条 记 录,以下是241-250 订阅
排序:
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains  38
MalWuKong: Towards Fast, Accurate, and Multilingual Detectio...
收藏 引用
38th IEEE/ACM international conference on Automated software engineering (ASE)
作者: Li, Ningke Wang, Shenao Feng, Mingxi Wang, Kailong Wang, Meizhen Wang, Haoyu Huazhong Univ Sci & Technol Wuhan Peoples R China
In the face of increased threats within software registries and management systems, we address the critical need for effective malicious code detection. In this paper, we propose an innovative approach that integrates... 详细信息
来源: 评论
Pressure difference of irrigation pipe network system based on binary tree
Pressure difference of irrigation pipe network system based ...
收藏 引用
2023 international conference on computer Application and Information security, ICCAIS 2023
作者: Liu, Ying Zhejiang Tongji Vocational College of Science and Technology Hangzhou311231 China
[Methods]The binary tree was used to Preorder traversal the relative pressure difference of each node in the irrigation community pipeline network, solving the optimal distance problem between two points with real wei... 详细信息
来源: 评论
5G network security: Unraveling Vulnerabilities and Innovating Defense Mechanisms  15th
5G Network Security: Unraveling Vulnerabilities and Innovati...
收藏 引用
15th international conference on e Infrastructure and e Services for Developing Countries
作者: Saeed, Mamoon M. Ali, Elmustafa Sayed Khalifa, Othman O. Mokhtar, Rania A. Univ Modern Sci UMS Dept Commun & Elect Engn Fac Engn Sanaa Yemen Red Sea Univ RSU Dept Elect & Elect Engn Port Sudan Sudan Int Islamic Univ Malaysia Dept Elect & Comp Engn Kuala Lumpur Malaysia Taif Univ Coll Comp & Informat Technol Dept Comp Engn POB 11099 Taif 21944 Saudi Arabia
Rapid developments in cellular communications are accompanied by rising privacy and security worries. Many people refrain from participating in activities like social networking, shopping, transactions, and conducting... 详细信息
来源: 评论
Big Data Framework to Detect and Mitigate Distributed Denial of Service(DDoS) Attacks in software-Defined networks (SDN)
Big Data Framework to Detect and Mitigate Distributed Denial...
收藏 引用
2023 international conference on Electrical, computer, Communications and Mechatronics engineering, ICECCME 2023
作者: Hamedani, Amirreza Fazely Aziz, Muzzamil Wieder, Philipp Yahyapour, Ramin Göettingen University Department of Computer Science Göttingen Germany EScience Group Göttingen Germany
The software-defined network is in recent years come into the sight of so many network designers as a successor to the traditional network. This type of network is vulnerable to DDoS attacks, targeting a different par... 详细信息
来源: 评论
Research on computer network Information security Protection System Based on Artificial Intelligence  2
Research on Computer Network Information Security Protection...
收藏 引用
2nd international conference on 3D Immersion, Interaction and Multi-Sensory Experiences, ICDIIME 2023
作者: Bao, Jian Yun, Kai Li, Haosheng Zhang, Qingwang Yang, Hao State Grid Xinjiang Information and Telecommunication Company Urumqi Xinjiang830063 China
With the rapid development of high technology and economy, our country has entered a new era of artificial intelligence in the 21st century. Home appliances of artificial intelligence, auxiliary software of artificial... 详细信息
来源: 评论
Bridge crack segmentation algorithm based on the novel full convolutional neural network
Bridge crack segmentation algorithm based on the novel full ...
收藏 引用
2023 international conference on computer Application and Information security, ICCAIS 2023
作者: Bai, Yun Wang, Haobo Xing, Feng Lu, En Liu, Wencong Engineering Training Center Xi'an University of Science & Technology Shaanxi Xi'an China School of Electric and Control Engineering Xi'an University of Science & Technology Shaanxi Xi'an China
Considering the impact of background noise, the traditional bridge crack detection method cannot completely extract the crack features and effectively fuse them, resulting in low crack detection accuracy, false and mi... 详细信息
来源: 评论
Research on security Protection System of network Digital Governance Database under Artificial Intelligence Technology  6
Research on Security Protection System of Network Digital Go...
收藏 引用
2023 IEEE 6th international conference on Information Systems and computer Aided Education, ICISCAE 2023
作者: Yang, Yinghui Wei, Jingxuan Bank of Beijing Tsinghua University Beijing China Technology Co. Ltd Beijing China
This paper develops an active network security protection system based on mobile devices on Android system. The hardware of the system consists of database encryption module, certificate management module, database en... 详细信息
来源: 评论
Research on the construction method of encrypted malicious traffic detection system based on machine learning
Research on the construction method of encrypted malicious t...
收藏 引用
2022 international conference on computer network security and software engineering, cnsse 2022
作者: Cheng, Qihao Zhang, Yangsen He, Ziyuan Chen, Xiang Institute of Intelligent Information Processing Beijing Information Science and Technology University Beijing100101 China Beijing Laboratory of National Economic Security Early-warning Engineering Beijing100044 China
With the development of social science and technology, the communication process is often accompanied by a variety of encrypted malicious traffic intrusion into the network system. Therefore, it is necessary to build ... 详细信息
来源: 评论
A Study of Data Augmentation for Imbalance Problem in network Traffic  3
A Study of Data Augmentation for Imbalance Problem in Networ...
收藏 引用
3rd international conference on Blockchain Technology and Information security, ICBCTIS 2023
作者: Wang, Xu Sun, Shimin Han, Li School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Software Tiangong University Tianjin China School of Computer Science and Engineering Tianjin University of Technology National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China
The complexity and diversity of smart grid systems increase the likelihood of anomalies in communications between devices in the system, and how these anomalies are detected is critical to the security of the grid sys... 详细信息
来源: 评论
Transfer Learning Innovations in network security and Threat Intelligence  3
Transfer Learning Innovations in Network Security and Threat...
收藏 引用
3rd IEEE international conference on ICT in Business Industry and Government, ICTBIG 2023
作者: Mishra, Aishwarya Kumar, Sandeep Pipalia, Dhaval Vaish, Rohit Ies College of Technology Department of Computer Science & Engineering Madhya Pradesh Bhopal462044 India Ies University Department of Computer Science & Engineering Madhya Pradesh Bhopal462044 India Electrical Engineering Rk University India Ies College of Technology Department of Electronics & Communication Engineering Madhya Pradesh Bhopal462044 India
In Transfer Learning Innovations in network security and Threat Intelligence,' we introduce a holistic approach that harnesses transfer learning to fortify network security and elevate threat intelligence. This me... 详细信息
来源: 评论