咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是171-180 订阅
排序:
GDist-RIA crawler: A greedy distributed crawler for rich internet applications  1
收藏 引用
2nd international conference on Networked systems, NETYS 2014
作者: Mirtaheri, Seyed M. Von Bochmann, Gregor Jourdan, Guy-Vincent Onut, Iosif Viorel School of Electrical Engineering and Computer Science University of Ottawa Ottawa ON Canada Security AppScan Enterprise IBM 770 Palladium Dr Ottawa ON Canada
Crawling web applications is important for indexing, accessibility and security assessment. Crawling traditional web applications is an old problem, for which good and efficient solution are known. Crawling Rich Inter... 详细信息
来源: 评论
Changing faces: Identifying complex behavioural profiles
Changing faces: Identifying complex behavioural profiles
收藏 引用
2nd international conference on Human Aspects of Information security, Privacy, and Trust, HAS 2014 - Held as Part of 16th international conference on Human-computer Interaction, HCI international 2014
作者: Oatley, Giles Crick, Tom Department of Computing and Information Systems Cardiff Metropolitan University Cardiff CF5 2YB United Kingdom
There has been significant interest in the identification and profiling of insider threats, attracting high-profile policy focus and strategic research funding from governments and funding bodies. Recent examples attr... 详细信息
来源: 评论
Formal security verification of transport protocols for wireless sensor networks
收藏 引用
Advances in Intelligent systems and Computing 2014年 282卷 389-403页
作者: Ta, Vinh-Thong Dvir, Amit Buttyán, Levente INRIA CITI/INSA-Lyon Villeurbanne69621 France Laboratory of Cryptography and System Security Hungary MTA-BME Information Systems Research Group Magyar tudosok korutja 2 Budapest1117 Hungary Computer Science School The College of Management - Academic Studies Israel
In this paper, we address the problem of formal security verification of transport protocols for wireless sensor networks (WSN) that perform cryptographic operations. Analyzing this class of protocols is a difficult t... 详细信息
来源: 评论
Amalgamation of K-means Clustering Algorithm with Standard MLP and SVM Based Neural networks to Implement Network Intrusion Detection System
Amalgamation of K-means Clustering Algorithm with Standard M...
收藏 引用
2nd international conference on Advanced Computing, Networking and Informatics, ICACN 2014
作者: Chandrashekhar, A.M. Raghuveer, K. Department of Computer Science Sri Jayachamarajendra College of Engineering Mysore 570006 Karnataka India Mysore Karnataka 570008 India
Intrusion Detection systems (IDS) are becoming an essential component usually in network and data security weapon store. Since huge amount of existing off-line data and newly appearing network records that needs analy... 详细信息
来源: 评论
Malware detection in big data using fast pattern matching: A hadoop based comparison on GPU  2
Malware detection in big data using fast pattern matching: A...
收藏 引用
2nd international conference on Mining Intelligence and Knowledge Exploration, MIKE 2014
作者: Panigrahi, Chhabi Rani Tiwari, Mayank Pati, Bibudhendu Prasath, Rajendra Dept. of Information Technology C.V. Raman College of Engineering Bhubaneswar Odisha752 054 India Dept. of Computer Science and Engineering C.V. Raman College of Engineering Bhubaneswar Odisha752 054 India Business Information Systems University College Cork Cork Ireland
In big data environment, hadoop stores the data in distributed file systems called hadoop distributed file system and process the data using parallel approach. When the cloud users store unstructured data in cloud sto... 详细信息
来源: 评论
security analysis of distributed compressive sensing-based wireless sensor networks
Security analysis of distributed compressive sensing-based w...
收藏 引用
2nd international conference on Communications, Signal Processing, and systems, CSPS 2013
作者: Wu, Ji Liang, Qilian Zhang, Baoju Wu, Xiaorong Electrical Engineering University of Texas at Arlington 416 Yates St Arlington TX 76019 United States Physics and Electronic Information Tianjin Normal University Tianjin 300387 China
Due to limited energy and physical size of the sensor nodes, the conventional security mechanisms with high computation complexity are not feasible for wireless sensor networks (WSNs). In this paper, we propose a comp... 详细信息
来源: 评论
2nd international conference on Context-Aware systems and Applications, ICCASA 2013
2nd International Conference on Context-Aware Systems and Ap...
收藏 引用
2nd international conference on Context-Aware systems and Applications, ICCASA 2013
The proceedings contain 36 papers. The special focus in this conference is on Context-Aware systems and Applications. The topics include: A temporal description logic for resource-bounded rule-based context-aware agen...
来源: 评论
2nd international conference on Frontiers in Intelligent Computing: Theory and Applications, FICTA 2013
2nd International Conference on Frontiers in Intelligent Com...
收藏 引用
2nd international conference on Frontiers in Intelligent Computing: Theory and Applications, FICTA 2013
The proceedings contain 63 papers. The special focus in this conference is on Frontiers in Intelligent Computing. The topics include: Application of fuzzy c-means clustering for polymer data mining for making SAW elec...
来源: 评论
Multi-Q: Multiple Queries Optimization Based on MapReduce in Cloud  2
Multi-Q: Multiple Queries Optimization Based on MapReduce in...
收藏 引用
2nd international conference on Advanced Cloud and Big Data, CBD 2014
作者: Ding, Ding Dong, Fang Luo, Junzhou School of Computer Science and Engineering Southeast University Nanjing China
With the explosion of data in the past decade, big data is becoming a research hotspot in the information field. Many cloud-based distributed data processing platforms have been proposed to provide efficient and cost ... 详细信息
来源: 评论
A study of secured wireless sensor networks with XBee and Arduino
A study of secured wireless sensor networks with XBee and Ar...
收藏 引用
international conference on systems and Informatics (ICSAI)
作者: A. F. M. Sultanul Kabir Mollah Ahmed Shorif Hua Li Qian Yu Department of Mathematics and Computer Science University of Lethbridge Canada Department of Computer Science University of Regina Canada
In spite of extensive research on WSN for decades, it still has not slowed down in pace. Newer technologies like Internet of Things which focuses on detail information, WSN sought to be an integral part of this. In th... 详细信息
来源: 评论