咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是161-170 订阅
排序:
Enhancing the security Levels in WLAN via Novel IBSPS
Enhancing the Security Levels in WLAN via Novel IBSPS
收藏 引用
2nd international conference on Advanced Computing, Networking and Informatics, ICACN 2014
作者: Kumar, Sanjay Department of Computer Science and Engineering National Institute of Technology Jamshedpur Jharkhand India
Need of wireless technology increasing day to day due to the rapid development in information and communications technology. Threats and attacks are also growing in accordance with the increment in the usage of wirele... 详细信息
来源: 评论
2nd international conference on Advanced Computing, Networking and Informatics, ICACN 2014
2nd International Conference on Advanced Computing, Networki...
收藏 引用
2nd international conference on Advanced Computing, Networking and Informatics, ICACN 2014
The proceedings contain 68 papers. The special focus in this conference is on Advanced Computing, Networking and Informatics. The topics include: Parallel processing concept based vehicular bridge traffic problem;anal...
来源: 评论
2nd international Symposium on security in Computing and Communications, SSCC 2014
2nd International Symposium on Security in Computing and Com...
收藏 引用
2nd international Symposium on security in Computing and Communications, SSCC 2014
The proceedings contain 42 papers. The special focus in this conference is on security and Privacy in Networked systems. The topics include: cryptanalysis of an efficient biometric authentication protocol for wireless...
来源: 评论
Dynamic clustering based hybrid routing protocol for mobile ad hoc networks  2
Dynamic clustering based hybrid routing protocol for mobile ...
收藏 引用
2nd international conference on Recent Advances on Information Technology, RAIT 2014
作者: Malwe, Shweta R. Biswas, G.P. Dept of Computer Science and Engineering Indian School of Mines Dhanbad India
Routing in mobile ad hoc network must be efficient and resource-saving. Mobility causes frequent changes in the topology, which leads to inappropriate routing. One way to reduce traffic is to divide the network into c... 详细信息
来源: 评论
A computational model of XACML-based access control management in distributed networks
收藏 引用
10th conference on Computability in Europe, CiE 2014
作者: Lázár, Katalin Anna Faculty of Informatics Eötvös Loránd University Pazmany Peter setany 1/C 1117 - Budapest Hungary
In this paper, we propose a novel approach to enforcing eXtensible Access Control Markup Language (XACML) policy specifications in distributed environments. Our approach is based on a formal language theoretic constru... 详细信息
来源: 评论
Networked systems - Second international conference, NETYS 2014, Revised Selected Papers
Networked Systems - Second International Conference, NETYS 2...
收藏 引用
2nd international conference on Networked systems, NETYS 2014
The proceedings contain 27 papers. The topics discussed include: communication without repudiation: the unanswered question;leader election in rings with homonyms;disjoint-access parallelism does not entail scalabilit...
来源: 评论
A low-resource and scalable strategy for segment partitioning of many-core nano networks  14
A low-resource and scalable strategy for segment partitionin...
收藏 引用
2nd ACM international Workshop on Many-Core Embedded systems, MES 2014, Held in Conjunction with the 41st international Symposium on computer Architecture, ISCA 2014
作者: Catania, Vincenzo Mineo, Andrea Monteleone, Salvatore Patti, Davide DIEEI University of Catania V.le A. Doria 6 Catania Italy
In this work we introduce the design and implementation of DiSR, a distributed approach to topology discovery and defectmapping in nanoscale network-on-chip scenario. We first describe the conceptual elements and the ... 详细信息
来源: 评论
Proceedings - 2014 IEEE international conference on Cloud Engineering, IC2E 2014
Proceedings - 2014 IEEE International Conference on Cloud En...
收藏 引用
2nd IEEE international conference on Cloud Engineering, IC2E 2014
The proceedings contain 90 papers. The topics discussed include: agentless cloud-wide streaming of guest file system updates;benchmarking the performance impact of transport layer security in cloud database systems;be...
来源: 评论
M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet
M-SRS: Secure and Trustworthy Mobile Service Review System B...
收藏 引用
2nd IFIP TC5/8 international conference on ICT-EurAsia
作者: Jiang, Tao Chen, Xiaofeng Li, Jin Ma, Jianfeng Xidian Univ State Key Lab Integrated Serv Networks ISN Xian Peoples R China Guangzhou Univ Sch Comp Sci Guangzhou Peoples R China
The scope of services has skyrocketed to such an extent that it is necessary for the service consumers to quickly understand the quality of a service provided by different vendors through Service Review systems (SRS).... 详细信息
来源: 评论
Exploring local service allocation in community networks  10
Exploring local service allocation in community networks
收藏 引用
2014 10th IEEE international conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2014
作者: Vega, Davide Meseguer, Roc Cabrera, Guillem Marquès, Joan Manuel Computer Architecture Department Universitat Politècnica de Catalunya - BarcelonaTech C/ Jordi Girona 1-3 Barcelona08034 Spain Internet Interdisciplinary Institute Universitat Oberta de Catalunya C/ Roc Boronat 117 Barcelona08018 Spain
Community Cloud computing is a new trend on cloud computing that aims to build service infrastructures upon Wireless Community networks taking advantage of underused community physical resources. Service allocation pr... 详细信息
来源: 评论