咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是1-10 订阅
排序:
2nd international conference on security in computer networks and distributed systems, snds 2014
2nd International Conference on Security in Computer Network...
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
The proceedings contain 49 papers. The special focus in this conference is on security in computer networks and distributed systems. The topics include: Collaborative approach for data integrity verification in cloud ...
来源: 评论
The Application of Deep Learning Techniques in computer security for Big Data Anomaly Detection  2
The Application of Deep Learning Techniques in Computer Secu...
收藏 引用
2nd IEEE international conference on Integrated Intelligence and Communication systems, ICIICS 2024
作者: Duan, Zhijuan Wuhan University of Engineering Science Hubei Wuhan China
Today, with the rapid development of the Internet, the requirements for network security are increasing day by day. This article explores the application of deep learning technology, especially convolutional neural ne... 详细信息
来源: 评论
Data security in Communication using Blockchain and Key Based Protocols  2
Data Security in Communication using Blockchain and Key Base...
收藏 引用
2nd IEEE international conference on IoT, Communication and Automation Technology, ICICAT 2024
作者: Prabakaran, S. Harinivaash, K. Prasad, R. Kaviyan, J. Rabin, D. V.S.B. Engineering College Department of Computer Science and Engineering Karur India
The development of global communication networks depends on satellite communication. Due to its lower stability and reach, satellite communication networks have garnered a lot of attention recently as a means of reduc... 详细信息
来源: 评论
Prediction of Human Age and Gender Using Deep Learning For Smart security systems  2
Prediction of Human Age and Gender Using Deep Learning For S...
收藏 引用
2nd IEEE international conference on distributed Computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Kinthadi, Durga Bhavani Burugu, Abhishekar Rumandla, Anish Sujana, S. Vardhaman College of Engineering Dept. of Ece Telangana Hyderabad India
The demand for accurate identification and verification of a person has increased as the number of smart security systems has grown. In recent years, data from a human face has been used in numerous real-world applica... 详细信息
来源: 评论
The Smart Optimization of security systems in Wireless Personal Sensor networks  2
The Smart Optimization of Security Systems in Wireless Perso...
收藏 引用
2nd IEEE international conference on distributed Computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Das, Sunanda Sindhu Madhuri, G. Department of Computer Science and Engineering Bangalore India
Wireless personal sensor networks (WPSNs) are an emerging technology that provides a platform for monitoring and collecting data from a variety of sources. These networks are used to monitor environmental, health, and... 详细信息
来源: 评论
Impacts of High Denisty Cloud Computing on Data Protection and security Management for 6G Networking  2
Impacts of High Denisty Cloud Computing on Data Protection a...
收藏 引用
2nd international conference on Disruptive Technologies, ICDT 2024
作者: Mallikarjunaradhya, Vinay Yennapusa, Haritha Palle, Ranadeep Reddy Suganyadevi, K. Gupta, Nidhi Legal Tech Platform Thomson Reuters Toronto Canada University of Central Missouri Department of Computer Science AustinTX United States University of Houston Department of Computer Science AustinTX United States Sri Eshwar College of Engineering Department of Ece Tamil Nadu Coimbatore India G.L. Bajaj Institute of Technology and Management Department of Computer Science and Engineering Greater Noida India
Data protection and security management in the 6G era is a key challenge due to the emergence of high density cloud computing. The availability of high density cloud computing technologies creates a platform for massi... 详细信息
来源: 评论
Cryptographic Ledger for Cyber security in Smart Grid  2
Cryptographic Ledger for Cyber Security in Smart Grid
收藏 引用
2nd international conference on Edge Computing and Applications, ICECAA 2023
作者: Elanchezhiyan, E. Kalaiselvi, K. Banumathy, D. Srm Institute of Science and Technology Faculty of Engineering and Technology Department of Networking and Communications Tamilnadu Kattankulathur603203 India Paavai Engineering College Department of Computer Science and Engineering Tamilnadu Namakkal637018 India
In addition to the physical security of energy networks, cyber security is essential to protecting these systems as well. Cyber threats can stem from malicious hackers who have infiltrated the networks to gain unautho... 详细信息
来源: 评论
Comparing the Supersonic Cloud Computing Model to Enhance the Networking and security in Traditional Data Centers  2
Comparing the Supersonic Cloud Computing Model to Enhance th...
收藏 引用
2nd international conference on Disruptive Technologies, ICDT 2024
作者: Palle, Ranadeep Reddy Mallikarjunaradhya, Vinay Yennapusa, Haritha Suganyadevi, K. Gupta, Nidhi University of Houston Department of Computer Science AustinTX United States Thomson Reuters Legal Tech Platform Toronto Canada University of Central Missouri Department of Computer Science AustinTX United States Sri Eshwar College of Engineering Department of Ece Tamil Nadu Coimbatore India G.L. Bajaj Institute of Technology and Management Department of Computer Science and Engineering Greater Noida India
The Comparing the supersonic cloud computing model to enhance the networking and security in Traditional Data Centers study aimed to analyse the differences between traditional data centers and cloud computing models.... 详细信息
来源: 评论
distributed-computing based versatile healthcare services framework for diagnostic markers  2nd
Distributed-computing based versatile healthcare services fr...
收藏 引用
2nd international conference on Next-Generation Computing and Information systems, ICNGCIS 2023
作者: Chunduri, Venkata Posinasetty, Bhargavi Son, Mukesh Byeon, Haewon Department of Mathematics & Computer Science Indiana State University United States The University of Southern Mississippi HattiesburgMS United States Dr. D. Y. Patil Vidyapeeth Pune Dr. D. Y. Patil School of Science & Technology Pune Tathawade India Department of Digital Anti-Aging Healthcare Inje University Gimhae Korea Republic of
Recently, there has been a boom in imaginative medical services technologies that have enhanced the delivery of medical care data. Human-to-human and gadget-to-gadget networks are crucial in people’s lives and functi... 详细信息
来源: 评论
Innovative Data Encryption Techniques using AI for Wireless Sensor Actuator Network security  2
Innovative Data Encryption Techniques using AI for Wireless ...
收藏 引用
2nd international conference on distributed Computing and Optimization Techniques, ICDCOT 2024
作者: Dharmateja, M. Rama, Prabha K.P. Asha, N. Nithya, P. Lalitha, S. Manojkumar, P. Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Arunai Engineering College Department of Computer Science and Engineering Tamil Nadu Tiruvannamalai India Bannari Amman Institute of Technology Department of Electrical and Electronics Engineering Tamil Nadu Sathyamangalam India
Wireless Sensor Actuator networks (WSANs) are sensitive to cyber threats due to present static encryption techniques. Adaptive security methods are required in WSAN settings to reduce evolving dangers and maintain dat... 详细信息
来源: 评论