咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是221-230 订阅
排序:
The back/forward sweep-based power flow method for distribution networks with DGs
The back/forward sweep-based power flow method for distribut...
收藏 引用
Workshop on Power Electronics and Intelligent Transportation System, PEITS
作者: Limei Zhang Wei Tang Honghao Guan College of Information and Electrical Engineering China Agricultural University Beijing China College of Information Science & Technology Agricultural University of Hebei Baoding China
Power system deregulation and the shortage of transmission capacities have led to increased interests in distributed generation sources (DGs). The high penetration of distributed generation (DG) units at the distribut... 详细信息
来源: 评论
distributed detection in wireless sensor networks  08
Distributed detection in wireless sensor networks
收藏 引用
7th IEEE/ACIS international conference on computer and Information Science in Conjunction with 2nd IEEE/ACIS international Workshop on e-Activity
作者: Cheng, Sheng-Tzong Li, Szu-Yun Chen, Chia-Mei Natl Chung Cheng Univ Dept Comp Sci & Informat Engn Tainan 70101 Taiwan Natl Sun Yat Sen Univ Dept Informat Management Kaohsiung Taiwan
Wireless sensor networks (WSNs) usually are applied in military systems, surveillance systems, etc. Since WSNs always are deployed in open environments, the security mechanisms in WSNs are very important. Although the... 详细信息
来源: 评论
Secure Ubiquitous Health Monitoring System
收藏 引用
2nd international conference on Network-Based Information systems (NBiS 2008)
作者: Durresi, Arjan Durresi, Mimoza Barolli, Leonard Indiana Univ Purdue Univ Indianapolis IN 46202 USA Fukuoka Inst Technol Fukuoka Japan
We propose a distributed and secure system that enables global & ubiquitous health monitoring. The biomedical data, collected by wearable sensors will be transmitted using cell phones towards the corresponding Hea... 详细信息
来源: 评论
Lightweight, distributed key agreement protocol for wireless sensor networks
Lightweight, distributed key agreement protocol for wireless...
收藏 引用
2nd IEEE international conference on Secure System Integration and Reliability Improvement, SSIRI 2008
作者: Lin, Che-Cheng Shieh, Shiuhpyng Lin, Jia-Chun Department of Computer Science National Chiao Tung University Hsinchu Taiwan
Secure key establishment is a fundamental security service in wireless sensor networks. It enables sensor nodes to secure their communications from malicious eavesdropping or tampering. However, due to restricted comp... 详细信息
来源: 评论
Rating agencies interoperation for peer-to-peer online transactions
Rating agencies interoperation for peer-to-peer online trans...
收藏 引用
2nd international conference on Emerging security Information, systems and Technologies, SECURWARE 2008
作者: Ion, Mihaela Koshutanski, Hristo Hoyer, Volker Telesca, Luigi CREATE-NET Via alia Cascata 56/D Povo-Trento Italy Computer Science Department University of Malaga Spain University of St. Gallen Switzerland
In current peer-to-peer systems users interact with unknown services and users for the purpose of online transactions such as file sharing and trading of commodities. Peer-to-Peer reputation systems allow users to ass... 详细信息
来源: 评论
N2N: A layer two peer-to-peer VPN
N2N: A layer two peer-to-peer VPN
收藏 引用
2nd international conference on Autonomous Infrastructure, Management and security
作者: Deri, Luca Andrews, Richard Ntop Org Pisa Italy Symstream Technol Melbourne Vic Australia
The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by enormous and heterogeneous economic in... 详细信息
来源: 评论
2nd international Symposium on Network-Centric Ubiquitous systems, NCUS 2006, 2nd international Workshop on security in Ubiquitous Computing systems, SecUbiq 2006, 2nd international Workshop on RFID and Ubiquitous Sensor networks, USN 2006, 1st international Workshop on Trustworthiness, Reliability and services in Ubiquitous and Sensor networks, TRUST 2006, 1st international Workshop on Embedded Software Optimization, ESO 2006 and 1st international Workshop on Multimedia Solution and the Assurance in the Ubiquitous Information systems, MSA 2006 held in conjunction with the IFIP international conference on Embedded and Ubiquitous Computing, EUC 2006
收藏 引用
28th IFIP WG 6.1 international conference on Formal Techniques for Networked and distributed systems, FORTE 2008
The proceedings contain 23 papers. The special focus in this conference is on NCUS 2006 Symposium. The topics include: Adaptive router promotion in ad-hoc networks;a utility-based auction cooperation incentive mechani...
来源: 评论
Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP systems
Secure SIP: A Scalable Prevention Mechanism for DoS Attacks ...
收藏 引用
2nd international conference on Principles, systems and Applications of IP Telecommunications (IPTComm 2008)
作者: Ormazabal, Gaston Nagpal, Sarvesh Yardeni, Eilon Schulzrinne, Henning Columbia Univ Verizon Labs New York NY 10027 USA Columbia Univ Dept Comp Sci Columbia MD USA
Traditional perimeter security solutions cannot cope with the complexity of VoIP protocols at carrier-class performance. We implemented a large-scale, rule-based SIP-aware application-layer-firewall capable of detecti... 详细信息
来源: 评论
Automatic Adaptation and Analysis of SIP Headers Using Decision Trees
Automatic Adaptation and Analysis of SIP Headers Using Decis...
收藏 引用
2nd international conference on Principles, systems and Applications of IP Telecommunications (IPTComm 2008)
作者: Hess, Andrea Nussbaumer, Michael Hlavacs, Helmut Hummel, Karin Anna Univ Vienna Dept Distributed & Multimedia Syst A-1080 Vienna Austria
Software implementing open standards like SIP evolves over time, and often during the first years of deployment, products are either immature or do not implement the whole standard but rather only it subset. As a resu... 详细信息
来源: 评论
An IMS Based Mobile Podcasting Architecture Supporting Multicast/Broadcast Delivery
An IMS Based Mobile Podcasting Architecture Supporting Multi...
收藏 引用
2nd international conference on Principles, systems and Applications of IP Telecommunications (IPTComm 2008)
作者: Cartas, Rodolfo Kampmann, Markus Perkuhn, Heiko Espino, Juan Miguel Ericsson Res Ericsson Allee 1 D-52134 Herzogenrath Germany Rhein Westfal TH Aachen Commun & Distributed Syst D-52062 Aachen Germany
Podcasting is an automatic content distribution mechanism that has gained popularity in the last couple of years. It differs from traditional vertical integrated media distribution such as Radio and Television in that... 详细信息
来源: 评论