咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是181-190 订阅
排序:
Applying of network security situation awareness in smart substations
Applying of network security situation awareness in smart su...
收藏 引用
international conference on systems and Informatics (ICSAI)
作者: Wei Huang Yajuan Guo Ling Zhuang Qin Mei Xiaohai Xu Jiangsu Electric Power Research Institute Co. Ltd. Nanjing China
Applying of network security situation awareness in smart substations provides a high level view to understand the security situation of substations. After analyzing security threats faced by smart substations, this p... 详细信息
来源: 评论
security vulnerabilities in open source projects: An India perspective
Security vulnerabilities in open source projects: An India p...
收藏 引用
international conference of Information and Communication Technology (ICoICT)
作者: Krishnashree Achuthan Sreekutty SudhaRavi Renuka Kumar Raghu Raman Amrita Center for Cybersecurity Systems & Networks Kollam India Center for Research in Advanced Technologies for Education Kollam India
Educational and governmental organizations are heavy users of Free and Open Source Software (FOSS) due to the numerous economic advantages it offers. But because of the lack of formal notification of vulnerabilities i... 详细信息
来源: 评论
Impact of mobility on the performance of context-aware applications using floating content  2nd
Impact of mobility on the performance of context-aware appli...
收藏 引用
2nd international conference on Context-Aware systems and Applications, ICCASA 2013
作者: Ali, Shahzad Rizzo, Gianluca Marsan, Marco Ajmone Mancuso, Vincenzo Institute IMDEA Networks Madrid Spain Universidad Carlos III de Madrid Madrid Spain HES-SO Valais Sierre Switzerland Politecnico di Torino Torino Italy
The growth of mobile computing and the evolution of smart user devices are progressively driving applications towards "contextawareness", i.e., towards behaviors that change according to variations in contex... 详细信息
来源: 评论
Data security using serial commutative RSA CORE for multiple FPGA system
Data security using serial commutative RSA CORE for multiple...
收藏 引用
international conference on Devices, Circuits and systems (ICDCS)
作者: R. Ambika S. Ramachandran K. R. Kashwan Vinayaka Missions University Salem India Dept. of ECE S J B Institute of Technology Bangalore India Dept. of ECE Sona College of Technology Salem India
security systems play a vital role in protecting the important data in the organizations or multiple transceiver based communication systems and cryptography is one of the primary ways to protect the data. RSA algorit... 详细信息
来源: 评论
Dynamic Network Reconfiguration Algorithm
Dynamic Network Reconfiguration Algorithm
收藏 引用
2nd international conference on computer Science and Data Mining(ICCSDM’13);2nd international conference on Electronics and Wireless Communication(ICEWC’13);2nd international conference on Cryptography and Network security(ICCNS’13);2nd international conference on Mechanical and Materials Engineering(ICMME’13);2nd international conference on Literature,Finance and Marketing(ICLFM’13);2nd international conference on Transport Management(ICTM’13);2nd international conference on Civil and Geological systems(ICCGS’13);2nd international conference on Agriculture and Environment systems(ICAES’13);2nd international conference on Biological and Chemical Processes(ICBCP’13)
作者: Khalid kh. Sharaf Abu Baker El Merghane Alaqsa University Neelain University
Quality of service is a term widely used in the last recent years in the area of networks. The Qos generally describes the assurance of sufficiently low delay and packet loss for certain types of applications or traff... 详细信息
来源: 评论
Proactive mobile agent security: A new access control approach based on the risk analysis
Proactive mobile agent security: A new access control approa...
收藏 引用
2012 2nd international conference on Digital Information Processing and Communications, ICDIPC 2012
作者: Dhouib, Hedi Loukil, Adlen Ammari, Ahmed Chiheb Jemai, Abderrazek Tunis Tunisia
The progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. So, with today's complex, heterogeneous, and large networks, IT experts become more and more presse... 详细信息
来源: 评论
WSeH: Proposal for an adaptive monitoring framework for WSNs, with enhanced security and QoS support
WSeH: Proposal for an adaptive monitoring framework for WSNs...
收藏 引用
2012 2nd international conference on Digital Information and Communication Technology and it's Applications, DICTAP 2012
作者: Dadarlat, Vasile Department of Computer Science Technical University of Cluj-Napoca Cluj-Napoca Romania
Wireless sensor networks (WSN) are highly distributed self-organized systems, the associated research being growing at a tremendous pace, and targeting various application domains. The successful implementation of suc... 详细信息
来源: 评论
Research on cloud computing security problem and strategy
Research on cloud computing security problem and strategy
收藏 引用
2012 2nd international conference on Consumer Electronics, Communications and networks, CECNet 2012
作者: Liu, Wentao Department of Computer and Information Engineering Wuhan Polytechnic University Wuhan Hubei Province 430023 China
The cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing, virtualization technology, utility computing and other computer technologies and it has more adv... 详细信息
来源: 评论
Stealth and Semi-Stealth MITM Attacks, Detection and Defense in IPv4 networks
Stealth and Semi-Stealth MITM Attacks, Detection and Defense...
收藏 引用
2nd IEEE international conference on Parallel, distributed and Grid Computing (PDGC)
作者: Samineni, Naga Rohit Barbhuiya, Ferdous A. Nandi, Sukumar Indian Inst Technol Guwahati Dept Comp Sci & Engn Gauhati 781039 Assam India
A Man-In-The-Middle(MITM) attack is one of the most well known attack on the computer networks. Out of the several variations of MITM, Address Resolution Protocol(ARP) Spoofing/ Poisoning is widely used in packet inte... 详细信息
来源: 评论
SAFCM: A security-aware feedback control mechanism for distributed real-time embedded systems
SAFCM: A security-aware feedback control mechanism for distr...
收藏 引用
18th IEEE international conference on Embedded and Real-Time Computing systems and Applications, RTCSA 2012
作者: Ma, Yue Jiang, Wei Sang, Nan Pop, Paul School of Computer Science and Engineering University of Electronic Science and Technology of China China Informatics and Mathematical Modeling Department Technical University of Denmark DK-2800 Kongens Lyngby Denmark
distributed Real-time Embedded (DRE) systems are facing great challenges in networked, unpredictable and especially unsecured environments. In such systems, there is a strong need to enforce security on distributed co... 详细信息
来源: 评论