咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 293 篇 英文
  • 14 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是251-260 订阅
排序:
Defeat the Network Attack by using Active networks approach
Defeat the Network Attack by using Active Networks approach
收藏 引用
international conference on Information and Communication Technologies: From Theory to Applications, ICTTA
作者: A. Eddaoui A. Mezrioui Département Informatique FSTM Mohammedia Morocco Département Informatique INPT Rabat Morocco
The revolution of Internet brings new security risk like attacks against networks. distributed denial of service shows such feature clearly. Existing attack defense approaches, such as intrusion detection systems, are... 详细信息
来源: 评论
Fighting Intrusions in Wireless LANs: A Need for the Reference Model
Fighting Intrusions in Wireless LANs: A Need for the Referen...
收藏 引用
IEEE/IFIP international conference in Central Asia on Internet (ICI)
作者: A. Pakstas S. Salekzamankhani B. Virdee Department of Computing Communications Technology and Mathematics London Metropolitan University London UK
A traditional way to improve security of wired computer network can be achieved by applying access control policies to the front door of network. However these policies may be not sufficient and effective any more whe... 详细信息
来源: 评论
A Reactive Architecture for IP Traceback
A Reactive Architecture for IP Traceback
收藏 引用
international conference on Information and Communication Technologies: From Theory to Applications, ICTTA
作者: A. Fadlallah A. Serhrouchni Computer Science and Network Department Ecole Nationale Supérieure des TéIécommunications Paris France
The rising threat of cyber attacks makes the IP traceback problem very relevant to today's Internet security. Numerous approaches have been proposed to support IP traceability. They can be divided into proactive a... 详细信息
来源: 评论
System security track chair's message
收藏 引用
2nd international conference on distributed Computing and Internet Technology
作者: Ray, I Colorado State Univ Ft Collins CO 80523 USA
The objectives of the System security track of the 2nd international conference on distributed Computing and Internet Technology were to discuss in depth the current state of the research and practice in computer secu... 详细信息
来源: 评论
MAC layer security of 802.15.4-compliant networks
MAC layer security of 802.15.4-compliant networks
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Mišić, Vojislav B. Fung, Jun Mišić, Jelena Department of Computer Science University of Manitoba Winnipeg Man. Canada
The paper discusses security issues of networks compliant with the recent IEEE 802.15.4 standard for low rate WPANs. A number of vulnerabilities at the MAC and PHY layer are identified, and a number of possible attack... 详细信息
来源: 评论
security and trust Assurances for smart environments
Security and trust Assurances for smart environments
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Naqvi, Syed Riguidel, Michel Paris France
Smart sensor networks increasingly become viable solutions to many challenging problems and will successively be employed in many areas in the near future. However, deploying a new technology without security and trus... 详细信息
来源: 评论
distributed computing track chair's message
收藏 引用
2nd international conference on distributed Computing and Internet Technology
作者: Sen, A Arizona State Univ Tempe AZ 85287 USA
The distributed Computing track of ICDCIT 2005 received 181 papers. Based on the review by the members of the Program Committee, 16 full and 9 short papers were selected for inclusion in the proceedings of the confere... 详细信息
来源: 评论
A distributed certificate revocation scheme based on one-way hash chain for wireless ad hoc networks
A distributed certificate revocation scheme based on one-way...
收藏 引用
2005 2nd international conference on Mobile Technology, Applications and systems
作者: Li, Jingfeng Zhu, Yuefei Pan, Heng Liu, Shengli Institute of Information Engineering Information Engineering University Zhengzhou 450002 China Institute of Electronic Technology Information Engineering University Zhengzhou 450004 China
In contrast with conventional wired networks, ad-hoc networks are characterized by the lack of a centralized administration and any fixed network infrastructure. Public Key Infrastructure (PKI) is a natural choice for... 详细信息
来源: 评论
An efficient key management scheme in hierarchical sensor networks
An efficient key management scheme in hierarchical sensor ne...
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Chen, Xiao Drissi, Jawad Dept. of Computer Science Texas State University San Marcos TX 78666
Recent advances in micro-electro-mechanical systems technology,wireless communications and digital electronics have enabled the development of sensor networks, in which a large number of sensor nodes collaborate to mo... 详细信息
来源: 评论
A study of safety applications in vehicular networks
A study of safety applications in vehicular networks
收藏 引用
2nd IEEE international conference on Mobile Ad-hoc and Sensor systems, MASS 2005
作者: Merlin, Christophe J. Heinzelman, Wendi B. Department of Electrical and Computer Engineering University of Rochester Rochester NY University of Rochester Rochester NY 14627 United States
Car crashes claim the lives of more than 100,000 people every year in the US alone. Forming ad-hoc networks among vehicles traveling on a highway can be very helpful to avoid such deadly accidents and pile-ups. In thi... 详细信息
来源: 评论