咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是191-200 订阅
排序:
A novel power balanced encryption scheme for secure information exchange in wireless sensor networks
A novel power balanced encryption scheme for secure informat...
收藏 引用
2nd international conference on Advances in Computing and Information Technology, ACITY-2012
作者: Mandal, Shanta Chaki, Rituparna Department of Computer Sc. and Engineering West Bengal University of Technology Salt lake Kolkata India
A lot of research on wireless sensor network is focused on field of performance, security and energy. Public key cryptography suffers from high computational complexity and overhead, when Symmetric key schemes can be ... 详细信息
来源: 评论
2nd international conference on computer Science and Information Technology, CCSIT 2012
2nd International Conference on Computer Science and Informa...
收藏 引用
2nd international conference on computer Science and Information Technology, CCSIT 2012
The proceedings contain 69 papers. The special focus in this conference is on computer Science and Information Technology. The topics include: Qualitative optimization of coupling parasitics and driver width in global...
来源: 评论
Research on cloud computing security problem and strategy
Research on cloud computing security problem and strategy
收藏 引用
international conference on Consumer Electronics, Communications and networks
作者: Wentao Liu Department of Computer and Information Engineering Wuhan Polytechnic University Wuhan Hubei China
The cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing, virtualization technology, utility computing and other computer technologies and it has more adv... 详细信息
来源: 评论
The trustworthy network based on intelligent business identification
The trustworthy network based on intelligent business identi...
收藏 引用
2nd international conference on Networking and distributed Computing, ICndC 2011
作者: Yin, Ansheng Zhang, Shunyi Institute of Information Network Technology Nanjing University of Posts and Telecommunications No.66 Xin Mofan Road Nanjing 210003 China
As networks have grown in size and complexity, the existing isolated add-on security systems of internet are confronting some serious challenges. This paper present some advices about the evolution and basic propertie... 详细信息
来源: 评论
Towards a mobile security & privacy simulator
Towards a mobile security & privacy simulator
收藏 引用
2nd IEEE international conference on Open systems, ICOS 2011
作者: Henne, Benjamin Szongott, Christian Smith, Matthew Distributed Computing and Security Group Leibniz Universität Hannover Hannover Germany
The proliferation and capabilities of mobile, networked devices is increasing rapidly and with this trend new threats to security and privacy are emerging at an alarming rate. The new threats are difficult to study an... 详细信息
来源: 评论
Measurement study on the end-to-end data transmission in motorways surveillance system using Wireless Ad Hoc Camera networks (WAHCN)
Measurement study on the end-to-end data transmission in mot...
收藏 引用
2nd international conference on Engineering and Industries, ICEI 2011
作者: Hassnawi, L.A. Ahmad, R.B. Yahya, Abid Elshaikh, M. Al-Rawi, Ali A. A. Ali, Z.G. Aljunid, S.A. School of Computer and Communication Engineering University Malaysia Perlis Malaysia
Camera-based surveillance is an important technology to monitor people, assets and places, for the applications of increasing physical security. Access to information services whilst on the move is becoming increasing... 详细信息
来源: 评论
Collaborative peer to peer defense mechanism for DDoS attacks
Collaborative peer to peer defense mechanism for DDoS attack...
收藏 引用
2nd international conference on Ambient systems, networks and Technologies, ANT-2011 and 8th international conference on Mobile Web Information systems, MobiWIS 2011
作者: Tariq, Usman Malik, Yasir Abdulrazak, Bessam Hong, Man Pyo Department of Information Systems College of Computer and Information Sciences Al-Imam Mohammed Ibn Saud Islamic University P.O. Box 5701 Riyadh 11432 Saudi Arabia Department of Computer Science University of Sherbrooke Sherbrooke QC Canada Digital Vaccinee and Internet Immune System Lab. Graduate School of Information and Communication Ajou University Suwon-si Gyeonggi-do Korea Republic of
distributed Denial of Service (DDoS) attacks are the most common and easiest attacks to propagate over internet. It causes a high degree of destruction to the network and systems resources. The destructive nature of D... 详细信息
来源: 评论
Advances in Computing, Communication and Control - international conference, ICAC3 2011, Proceedings
收藏 引用
2nd international conference on Advances in Computing, Communication and Control, ICAC3 2011
The proceedings contain 67 papers. The topics discussed include: modified trivial rejection criteria in Cohen-Sutherland line clipping algorithm;greedy views selection using size and query frequency;quantum-inspired d...
来源: 评论
Measurement study on the end-to-end data transmission in motorways surveillance system using Wireless Ad Hoc Camera networks (WAHCN)
Measurement study on the end-to-end data transmission in mot...
收藏 引用
international conference on Engineering and Industries (ICEI)
作者: L. A. Hassnawi R. B Ahmad Abid Yahya M. Elshaikh Ali A. A. Al-Rawi Z. G. Ali S. A. Aljunid School of Computer and Communication Engineering University Malaysia Perlis Malaysia
Camera-based surveillance is an important technology to monitor people, assets and places, for the applications of increasing physical security. Access to information services whilst on the move is becoming increasing... 详细信息
来源: 评论
snds: A distributed monitoring and protocol analysis system for wireless sensor network
SNDS: A distributed monitoring and protocol analysis system ...
收藏 引用
2nd international conference on networks security, Wireless Communications and Trusted Computing, NSWCTC 2010
作者: Kuang, Xin Shen, Jianhua Department of Computer Science and Technology East China Normal University Shanghai China
Monitoring a large-scale wireless sensor networks (WSN) is very difficult, not only because it is large and complex, much of difficulty comes from the lack of visual analysis tools. This paper describes snds (Sensor N... 详细信息
来源: 评论