咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是291-300 订阅
排序:
Agent-based distributed intrusion source identification
Agent-based distributed intrusion source identification
收藏 引用
2nd international conference on computer networks and Mobile Computing
作者: Wang, HJ Wang, RJ Wang, CR Gao, Y Northeastern Univ Sch Informat Sci & Engn Shenyang 110004 Peoples R China
Network-based intrusion has become a serious threat to networked information systems. Yet, the current network security mechanisms are passive in response to network-based intrusions. In order to hide their origins, i... 详细信息
来源: 评论
Active traffic analysis attacks and countermeasures
Active traffic analysis attacks and countermeasures
收藏 引用
2nd international conference on computer networks and Mobile Computing
作者: Fu, XW Graham, B Bettati, R Zhao, W Texas A&M Univ Dept Comp Sci College Stn TX 77843 USA
To explore mission-critical information, an adversary, using active traffic analysis attacks injects probing traffic into the victim network and analyzes the status of underlying payload traffic. Active traffic analys... 详细信息
来源: 评论
2nd international Workshop on Mathematical Methods, Models, and Architectures for computer Network security, MMM-ACNS 2003
收藏 引用
2nd international Workshop on Mathematical Methods, Models and Architectures for computer Network security, MMM-ACNS 2003
The proceedings contain 47 papers. The special focus in this conference is on Mathematical Models, Architectures for computer Network security, Intrusion Detection and Public Key Distribution. The topics include: A di...
来源: 评论
2nd international conference on ***@Internet, HSI 2003
收藏 引用
2nd international conference on Human.Society@Internet, HSI 2003
The proceedings contain 88 papers. The special focus in this conference is on Web Performance, Authentication, Social Issue, security, Document Access and Routing. The topics include: Mesh simplification for QOS contr...
来源: 评论
2nd international Workshop of Central and Eastern Europe on Multi-Agent systems, CEEMAS 2001
收藏 引用
2nd international Workshop of Central and Eastern Europe on Multi-Agent systems, CEEMAS 2001
The proceedings contain 35 papers. The special focus in this conference is on From Theory to Practice in Multi-Agent systems. The topics include: Network services in context of pervasive mobile internet;on ban logics ...
来源: 评论
2nd international Workshop on Electronic Commerce, WELCOM 2001
收藏 引用
2nd international Workshop on Electronic Commerce, WELCOM 2001 in conjunction with the 18th IEEE Symposium on Reliable and distributed systems, SRDS 2001
The proceedings contain 20 papers. The special focus in this conference is on Markets, security, Profiling and Business Interaction. The topics include: The next wave of internet-based applications;building comparison...
来源: 评论
2nd international Symposium on Agent systems and Applications and 4th international Symposium on Mobile Agents, ASA/MA 2000
2nd International Symposium on Agent Systems and Application...
收藏 引用
2nd international Symposium on Agent systems and Applications, ASA 2000 and 4th international Symposium on Mobile Agents, MA 2000
The proceedings contain 21 papers. The special focus in this conference is on Migration, security Issues of Mobile Agents, Applications, Mobile Agent Applications and Applications of Multi-agent systems. The topics in...
来源: 评论
A flexible IP active networks architecture  2
A flexible IP active networks architecture
收藏 引用
2nd international Working conference on Active networks, IWAN 2000
作者: Galis, Alex Plattner, Bernhard Smith, Jonathan M. Denazis, Spyros Moeller, Eckhard Guo, Hui Klein, Cornel Serrat, Joan Laarhuis, Jan Karetsos, George T. Todd, Chris University College London Torrington Place Department of Electrical and Electronic Engineering LondonWC1E 7JE United Kingdom The Swiss Federal Institute of Technology ETH Zurich Computer Engineering and Networks Laboratory ETH-Zentrum ZurichCH-8092 Switzerland University of Pennsylvania Department of CIS PhiladelphiaPA19104 United States Hitachi Europe Ltd Information and Telecommunication Laboratories 59 St Andrews Street CambridgeCB2 3BZ United Kingdom GMD- FOKUS Kaiserin-Augusta-Allee 31 BerlinD-10589 Germany Siemens ICN M RP 11 Hofmannstr. 51 MünchenD-81359 Germany KPN Research Dept Communications Architectures and open Systems P.O. Box 15000 GroningenAC9700 Netherlands Universitat Politècnica de Catalunya Dept Teoria del Senyal i Comunicacions ordi Girona 1-3 Barcelona08034 Spain National Technical University of Athens Telecommunications Laboratory Division of Electrical Engineering Zographou Athens15773 Greece
This paper presents the main concepts of the IST Project FAIN "Future Active IP networks" [10], a three-year collaborative research project, whose main task is to develop and validate an open, flexible, prog... 详细信息
来源: 评论
Optimal construction of unconditionally secure ID-based key sharing scheme for large-scale networks  2nd
收藏 引用
2nd international conference on Information and Communication security (ICICS 99)
作者: Hanaoka, G Nishioka, T Zheng, YL Imai, H Univ Tokyo Inst Ind Sci Dept 3 Minato Ku Tokyo 1068558 Japan Mitsubishi Elect Corp Informat Technol R&D Ctr Kamakura Kanagawa 2478501 Japan Monash Univ Peninsula Sch Comp & Informat Technol Melbourne Vic 3199 Australia
Efficient ID-based key sharing schemes are desired world-widely for secure communications on the Internet and other networks. The Key Predistiribution systems (KPS) are a large class of such key sharing schemes. The r... 详细信息
来源: 评论
2nd international conference on Information and Communication security, ICICS 1999
收藏 引用
2nd international conference on Information and Communication security, ICICS 1999
The proceedings contain 26 papers. The special focus in this conference is on Cryptanalysis and Language Based Approach to security. The topics include: international cryptography;reaction attacks against several publ...
来源: 评论