咨询与建议

限定检索结果

文献类型

  • 6,701 篇 会议
  • 39 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,774 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,021 篇 工学
    • 3,643 篇 计算机科学与技术...
    • 3,131 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 718 篇 控制科学与工程
    • 646 篇 生物工程
    • 544 篇 电气工程
    • 354 篇 安全科学与工程
    • 292 篇 电子科学与技术(可...
    • 278 篇 网络空间安全
    • 256 篇 动力工程及工程热...
    • 235 篇 生物医学工程(可授...
    • 233 篇 交通运输工程
    • 210 篇 机械工程
    • 171 篇 光学工程
    • 126 篇 化学工程与技术
    • 119 篇 仪器科学与技术
  • 1,692 篇 理学
    • 842 篇 数学
    • 682 篇 生物学
    • 278 篇 物理学
    • 255 篇 统计学(可授理学、...
    • 176 篇 化学
    • 142 篇 系统科学
  • 980 篇 管理学
    • 567 篇 管理科学与工程(可...
    • 502 篇 图书情报与档案管...
    • 288 篇 工商管理
  • 384 篇 法学
    • 225 篇 社会学
    • 175 篇 法学
  • 217 篇 医学
    • 165 篇 临床医学
    • 163 篇 基础医学(可授医学...
  • 136 篇 经济学
    • 131 篇 应用经济学
  • 79 篇 教育学
  • 55 篇 农学
  • 22 篇 军事学
  • 18 篇 文学

主题

  • 352 篇 network security
  • 210 篇 security
  • 192 篇 deep learning
  • 169 篇 internet of thin...
  • 135 篇 machine learning
  • 130 篇 blockchain
  • 129 篇 software
  • 98 篇 intrusion detect...
  • 90 篇 feature extracti...
  • 80 篇 neural networks
  • 72 篇 cybersecurity
  • 69 篇 convolutional ne...
  • 66 篇 cryptography
  • 65 篇 software defined...
  • 64 篇 privacy
  • 62 篇 computational mo...
  • 61 篇 training
  • 59 篇 convolution
  • 56 篇 authentication
  • 56 篇 cloud computing

机构

  • 77 篇 school of cyber ...
  • 74 篇 institute of inf...
  • 50 篇 college of compu...
  • 41 篇 chitkara univers...
  • 36 篇 school of comput...
  • 35 篇 chinese academy ...
  • 31 篇 school of inform...
  • 27 篇 university of ch...
  • 26 篇 shandong provinc...
  • 25 篇 school of cyber ...
  • 25 篇 shenzhen univers...
  • 22 篇 school of comput...
  • 19 篇 school of comput...
  • 19 篇 university of ch...
  • 19 篇 school of softwa...
  • 19 篇 school of softwa...
  • 19 篇 purple mountain ...
  • 17 篇 peng cheng labor...
  • 17 篇 college of compu...
  • 17 篇 school of comput...

作者

  • 15 篇 sharma ishu
  • 12 篇 liu yang
  • 11 篇 li bo
  • 10 篇 zhang lei
  • 10 篇 zhang bo
  • 9 篇 iqbal muhammad w...
  • 9 篇 chen chen
  • 9 篇 yang wei
  • 9 篇 tiwari mohit
  • 8 篇 zhang yuqing
  • 8 篇 yang yang
  • 8 篇 ishu sharma
  • 8 篇 liu chang
  • 8 篇 liu qingyun
  • 8 篇 li hui
  • 7 篇 wang jing
  • 7 篇 mohit tiwari
  • 7 篇 wang xu
  • 7 篇 qingyun liu
  • 7 篇 xiao jianmao

语言

  • 6,617 篇 英文
  • 149 篇 其他
  • 41 篇 中文
  • 2 篇 土耳其文
  • 1 篇 德文
  • 1 篇 葡萄牙文
检索条件"任意字段=2023 International Conference on Computer Network Security and Software Engineering, CNSSE 2023"
6774 条 记 录,以下是31-40 订阅
排序:
A survey of the accountability framework for jobs of batch computing services
A survey of the accountability framework for jobs of batch c...
收藏 引用
2023 international conference on computer network security and software engineering, cnsse 2023
作者: Zhang, Jiajia Liao, Fu Liang, Huang Wu, Zheng Li, Xiaojian School of Computer Science & Engineering Guangxi Normal University Guilin China
Batch computing services have the characteristics of providing services required by users on demand. Furthermore, failure factors such as resource constraints and scheduling can lead to service violations. The account... 详细信息
来源: 评论
P2P Based on network Behavior Analysis Trust value calculation method
P2P Based on Network Behavior Analysis Trust value calculati...
收藏 引用
2023 international conference on computer network security and software engineering, cnsse 2023
作者: Zeng, Xingeng Yu, Xuejun Beijing University of Technology Beijing China
With the rapid development of the Internet and technological innovation, the number and resources of computers accessed in P2P (Peer to Peer) peer-to-peer networks are increasing. Another important feature of P2P is t... 详细信息
来源: 评论
A Deep Reinforce Learning Based Intrusion Detection Method for Safeguarding Internet of Things
A Deep Reinforce Learning Based Intrusion Detection Method f...
收藏 引用
2023 international conference on computer network security and software engineering, cnsse 2023
作者: Zhang, Liang Lv, Hongjie School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing China
With the increasing number of Internet of Things (IoT) access devices, security incidents in the IoT field have occurred frequently in recent years. Traditional intrusion detection techniques can no longer meet the cu... 详细信息
来源: 评论
Internet of things-oriented data security risk monitoring system
Internet of things-oriented data security risk monitoring sy...
收藏 引用
2023 international conference on computer network security and software engineering, cnsse 2023
作者: Mao, Rongjie State Grid Xinjiang Electric Power Limited Company and Altay Power Supply Company China
In order to realize real-time dynamic monitoring, remote visualization in different places, and improve the efficiency of data collection, transmission and processing in the process of subway security risk monitoring,... 详细信息
来源: 评论
CBAN: A DDoS detection method based on CNN, BiGRU, and attention mechanism
CBAN: A DDoS detection method based on CNN, BiGRU, and atten...
收藏 引用
2024 international conference on computer network security and software engineering, cnsse 2024
作者: Wang, Bing Yu, Yankun Zhao, Chunlan Jiang, Jingjing School of Computer Science and Software Engineering Southwest Petroleum University Sichuan Chengdu610500 China Key Laboratory of Energy Security and Low-carbon development Southwest Petroleum University Sichuan Chengdu610500 China School of Sciences Southwest Petroleum University Sichuan Chengdu610500 China Information Technology Department Jinchuan County Middle School Aba Tibetan and Qiang Autonomous Prefecture Sichuan624100 China
In order to address the obstacles posed by the growing security issues of the Internet of Things to the development of big data, this paper conducts in-depth research on the defense of the most harmful DDoS attack. Th... 详细信息
来源: 评论
Deep learning based intrusion detection methods
Deep learning based intrusion detection methods
收藏 引用
2023 international conference on computer network security and software engineering, cnsse 2023
作者: Chen, Hong Chen, Lili School of Software Liaoning Technical University China
With the increasing number and categories of cyber attacks in the era of big data, intrusion detection techniques are constantly updated and optimised. In order to address the shortcomings of traditional intrusion det... 详细信息
来源: 评论
Based on QUBO models with quantum-inspired algorithms to enhance the CVQKD systems to ensure security of hacking
Based on QUBO models with quantum-inspired algorithms to enh...
收藏 引用
2024 international conference on computer network security and software engineering, cnsse 2024
作者: Zhu, Feiyue Qiu, Haifeng Wang, Ziyu School of Civil Engineering Central South university 410083 China
This paper presents the need for innovative solutions to optimize computational power networks and the application of quantum computing to tackle real-world *** research addresses this critical issue by developing a r... 详细信息
来源: 评论
Research on malicious code detection and classification based on dynamic and static features
Research on malicious code detection and classification base...
收藏 引用
2024 international conference on computer network security and software engineering, cnsse 2024
作者: Shang, Yueyang Wang, Fuwei Zhang, Yunfei Li, Dong Tan, Wenbin School of Artificial Intelligence and Software LiaoNing Petrochemical University Fushun113000 China
Malicious code can reflect its malicious behaviour through dynamic API sequences and static PE header information, and deep learning algorithms have made progress in such malicious code detection. The article designs ... 详细信息
来源: 评论
Attack Detection System Based on Provenance Graph Semantic Analysis
Attack Detection System Based on Provenance Graph Semantic A...
收藏 引用
2023 international conference on computer network security and software engineering, cnsse 2023
作者: Cui, Can Yang, Zhuorao Cui, Baojiang School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing100876 China
Advanced Persistent Threat (APT) is an advanced persistent network attacks on target information systems by attackers. Most existing APT detection methods are implemented by manually designing detection rules based on... 详细信息
来源: 评论
Research on WCET assessment method of airborne display software
Research on WCET assessment method of airborne display softw...
收藏 引用
2024 international conference on computer network security and software engineering, cnsse 2024
作者: Xu, Junfeng Shanghai Aircraft Design and Research Institute Shanghai201210 China
Airborne display software WCET assessment relies on actual scenario and traditional static analysis and dynamic test methods can not reflect actual scenario requirements. To achieve WCET value closing to actual scenar... 详细信息
来源: 评论