咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是231-240 订阅
排序:
The Research of frame and key technologies for Intrusion Detection System in IEEE 802.11-based Wireless Mesh networks
The Research of frame and key technologies for Intrusion Det...
收藏 引用
2nd international conference on Complex, Intelligent and Software Intensive systems (CISIS 2008)
作者: Hongjian Li Ming Xu Yi Li Department of Network Engineering School of Computer Science National University of Defense Technology Changsha China Staff Room of Automatization Technology Logistics and Engineering University Chongqing China
The architecture and characteristic of Wireless Mesh networks (WMN), as well as the significance of Intrusion Detection System (IDS) in its application were investigated Based on the embedded analyzing of IDS technolo... 详细信息
来源: 评论
Proceedings of DFMA 2006: 2ndinternational conference on distributed Frameworks for Multimedia Applications
Proceedings of DFMA 2006: 2ndInternational Conference on Dis...
收藏 引用
DFMA 2006 - 2nd international conference on distributed Frameworks for Multimedia Applications
The proceedings contain 34 papers. The topics discussed include: a novel radio link protocol for TCP throughput enhancement;multi-agent negotiation system using adaptive fuzzy logic in resource allocation;analysis of ... 详细信息
来源: 评论
QoS aware services discovery in a P2P grid environment
QoS aware services discovery in a P2P grid environment
收藏 引用
2007 2nd international conference on Pervasive Computing and Applications, ICPCA'07
作者: Stefano, Antonella Di Morana, Giovanni Zito, Daniele Dipartimento di Ingegneria Informatica e Telecomunicazioni Università di Catania Italy
In recent years, Grid systems and Peer to Peer networks are the most used solutions to achieve the same goal: sharing resources and services in heterogeneous, dynamic, distributed environments. Grid systems have well ... 详细信息
来源: 评论
On the penetration of business networks by P2P file sharing
On the penetration of business networks by P2P file sharing
收藏 引用
2nd international conference on Internet Monitoring and Protection, ICIMP 2007
作者: Lee, Kevin Hughes, Danny Walkerdine, James School of Computer Science University of Manchester Manchester M13 9PL United Kingdom Computing InfoLab.21 Lancaster University Lancaster LA1 4WA United Kingdom Isis Forensics PO Box 793 Lancaster LA1 9ED United Kingdom
P2P file-sharing poses a number of problems for system administrators including unpredictable network usage, increased vulnerability to security threats and the danger of legal action. Due to these problems, many busi... 详细信息
来源: 评论
Fusion of multi-modal credentials for authentication in digital identity management systems
Fusion of multi-modal credentials for authentication in digi...
收藏 引用
2nd international conference on Wireless Broadband and Ultra Wideband Communications, AusWireless 2007
作者: Phiri, Jackson Agbinya, Johnson I. Department of Computer Science University of the Western Cape South Africa University of Technology Sydney NSW Australia
The recent years have seen an increase in identity fraud and accessing online services when communication devices such as computers, mobile phones and card based credentials (e.g. credit cards) are involved. This has ... 详细信息
来源: 评论
Mitigating distributed denial-of-service attacks using network connection control charts  2
Mitigating distributed denial-of-service attacks using netwo...
收藏 引用
2nd international conference on Scalable Information systems, InfoScale 2007
作者: Wu, Qingtao Zhang, Haichao Pu, Jiexin Electronic Information Engineering College Henan University of Science and Technology Luoyang Henan Province China
In this paper, we present a simple, automated response model that utilizes the Shewhart's control charts based-on network connection to aid in handling DDoS attacks. This model is designed to prevent incoming traf... 详细信息
来源: 评论
A complete and efficient strategy based on Petri Net in automated trust negotiation  2
A complete and efficient strategy based on Petri Net in auto...
收藏 引用
2nd international conference on Scalable Information systems, InfoScale 2007
作者: He, Yan Zhu, Miaoliang College of Computer Science Zhejiang University Zhejiang Financial Profession College Hangzhou China
Traditional security model, where the identity of all possible requesting subjects must be pre-registered in advance, is not suitable for the distributed applications with strong real-time requirements, especially rec... 详细信息
来源: 评论
G-LeaSel: A Secure Multicast Model for Grid
G-LeaSel: A Secure Multicast Model for Grid
收藏 引用
international conference on Communication systems Software and Middleware (COMSWARE)
作者: Mary S. Vennila G. Vinoth C. Vinoth V. Sankaranarayanan Rhymend V. Uthariaraj Department of Computer Science Presidency College Chennai India Department of Information Technology Anna University Chennai India Tamil Virtual University Chennai India
Grid computing has been cited as one of the potential technologies that can offer mammoth computing power in the future. The greatness of grid technology lies in the efficient harnessing of idle resources of the distr... 详细信息
来源: 评论
Secure distributed Agreement Protocols for Information Assurance Applications
Secure Distributed Agreement Protocols for Information Assur...
收藏 引用
international conference on Communication systems Software and Middleware (COMSWARE)
作者: A. Sabbir K. Ravindran K. A. Kwiat University of Bangladesh Dhaka Bangladesh City College and Graduate Center City University of New York New York NY USA US Air Force Research Laboratory Rome NY USA
distributed agreement protocols among a group of application processes are often built upon atomic multicast message delivery guarantees. Issues arise however when agreement protocols are realized in Information Assur... 详细信息
来源: 评论
Computationally and Resource Efficient Group Key Agreement for Ad Hoc Sensor networks
Computationally and Resource Efficient Group Key Agreement f...
收藏 引用
international conference on Communication systems Software and Middleware (COMSWARE)
作者: Dungara Ram Choudhary Dev Anshul Suman Roy Chandra Shekhara Thejaswi AirTight Netwoks Pune India Tata Consultancy Services Limited Bangalore India Honeywell Technology Solutions Laboratory Private Limited Bangalore India Department of Electrical Engineering Arizona State University Tempe AZ USA
Secure and reliable group communication is an important aspect of security in distributed ad hoc sensor networks. Most sensors are built to be inexpensive, low power devices and consequently have limited computational... 详细信息
来源: 评论