咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是141-150 订阅
排序:
Enhanced security of PHR System in Cloud Using Prioritized Level Based Encryption
Enhanced Security of PHR System in Cloud Using Prioritized L...
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
作者: Sangeetha, D. Vijayakumar, Vaidehi Thirunavukkarasu, Valliammai Ramesh, Aiswarya Information Technology Madras Institute of Technology Chennai India
Cloud Computing has emerged as one of the vital part of the IT industry and it requires users to entrust their valuable data to cloud providers and so, there has been increasing security and privacy concerns on outsou... 详细信息
来源: 评论
security Assessment of computer networks Based on Attack Graphs and security Events
Security Assessment of Computer Networks Based on Attack Gra...
收藏 引用
2nd IFIP TC5/8 international conference on ICT-EurAsia
作者: Kotenko, Igor Doynikova, Elena St Petersburg Inst Informat & Automat SPIIRAS Lab Comp Secur Problems St Petersburg Russia
security assessment is an important task for operation of modern computer networks. The paper suggests the security assessment technique based on attack graphs which can be implemented in contemporary SIEM systems. It... 详细信息
来源: 评论
Proceedings - 2nd IEEE international conference on Cyber-Physical systems, networks, and Applications, CPSNA 2014
Proceedings - 2nd IEEE International Conference on Cyber-Phy...
收藏 引用
2nd IEEE international conference on Cyber-Physical systems, networks, and Applications, CPSNA 2014
The proceedings contain 16 papers. The topics discussed include: towards assurance cases for resilient control systems;practical use of formal verification for safety critical cyber-physical systems: a case study;peak...
来源: 评论
Research and design of a trusted distributed file system based on HDFS
Research and design of a trusted distributed file system bas...
收藏 引用
2nd international conference on Precision Mechanical Instruments and Measurement Technology, ICPMIMT 2014
作者: Liu, Fa Gui Zhang, Xiao Jie School of Computer Science and Engineering South China University of Technology China
distributed file systems such as HDFS are facing the threat of Advanced Persistent Threat, APT. Although security mechanisms such as Kerberos and ACL are implemented in distributed file systems, most of them are not s... 详细信息
来源: 评论
Advanced computing, networking and informatics - volume 2: Wireless networks and security proceedings of the second international conference on advanced computing, networking and informatics (ICACNI-2014)
Advanced computing, networking and informatics - volume 2: W...
收藏 引用
2nd international conference on Advanced Computing, Networking and Informatics, ICACN 2014
作者: Kumar Kundu, Malay Mohapatra, Durga Prasad Konar, Amit Chakraborty, Aruna Indian Statistical Institute Machine Intelligence Unit Kolkata India Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela India Department of Electronics and Tele-Communication Engineering Artificial Intelligence Laboratory Jadavpur University Kolkata India Department of Computer Science and Engineering St. Thomas' College of Engineering and Technology West Bengal India
来源: 评论
Service recovery for large scale distributed publish and subscription services for cyber-physical systems and disaster management  2
Service recovery for large scale distributed publish and sub...
收藏 引用
2nd IEEE international conference on Cyber-Physical systems, networks, and Applications, CPSNA 2014
作者: Shih, Chi Sheng Chen, Hsin Yi Yeh, Zi You Department of Computer Science and Information Engineering Graduate Institute of Networking and Multimedia National Taiwan University Taipei Taiwan Research Center for Information Technology Innovation Academia Sinica Taipei Taiwan
Information and communication technology (ICT) played a critical role in disaster management in last few decades. One example is the messaging service for disaster alerts, rescue workers, and victims. Many of these me... 详细信息
来源: 评论
security Vulnerabilities in Open Source Projects: An India Perspective  2
Security Vulnerabilities in Open Source Projects: An India P...
收藏 引用
2nd international conference on Information and Communication Technology (ICoICT)
作者: Achuthan, Krishnashree SudhaRavi, Sreekutty Kumar, Renuka Raman, Raghu Amrita Vishwa Vidyapeetham Amrita Ctr Cybersecur Syst & Networks Amritapuri Kollam India Amrita Vishwa Vidyapeetham Ctr Res Adv Technol Educ Amritapuri Kollam India
Educational and governmental organizations are heavy users of Free and Open Source Software (FOSS) due to the numerous economic advantages it offers. But because of the lack of formal notification of vulnerabilities i... 详细信息
来源: 评论
A novel shared key for security in grid computing  2
A novel shared key for security in grid computing
收藏 引用
2nd IEEE international conference on Smart Structures and systems, ICSSS 2014
作者: Nandakumar, V. Computer Centre Alagappa University Karaikudi Tamilnadu India
Current use of high-speed networks has brought a change in computing methods. Technologies enabling cooperative use of varied resources as a single powerful computer for solving large scale problems have evolved into ... 详细信息
来源: 评论
Mapping time-critical safety-critical cyber physical systems to hybrid FPGAs  2
Mapping time-critical safety-critical cyber physical systems...
收藏 引用
2nd IEEE international conference on Cyber-Physical systems, networks, and Applications, CPSNA 2014
作者: Vipin, Kizheppatt Shreejith, Shanker Fahmy, Suhaib A. Easwaran, Arvind School of Computer Engineering Nanyang Technological University Singapore Singapore
Cyber Physical systems (CPSs), such as those found in modern vehicles, include a number of important time and safety-critical functions. Traditionally, applications are mapped to several dedicated electronic control u... 详细信息
来源: 评论
Supporting the Process of Monument Classification Based on Reducts, Decision Rules and Neural networks
收藏 引用
2nd international conference on Rough Sets and Emerging Intelligent systems Paradigms (RSEISP) held as part of Joint Rough Set Symposium (JRS)
作者: Olszewski, Robert Fiedukowicz, Anna Warsaw Univ Technol Fac Geodesy & Cartog Dept Cartog Warsaw Poland
The present article attempts to support the process of classification of multi-characteristic spatial data in order to develop the correct cartographic visualisation of complex geographical information in the thematic... 详细信息
来源: 评论