咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是31-40 订阅
排序:
Federated Learning in Malware Detection  28
Federated Learning in Malware Detection
收藏 引用
28th IEEE international conference on Emerging Technologies and Factory Automation, ETFA 2023
作者: Serpanos, Dimitrios Xenos, Georgios University of Patras Computer Technology Institute and Press DIOPHANTUS Dept. of Electrical and Computer Engineering Patras Greece University of Patras Campus Computer Technology Institute and Press DIOPHANTUS Patras Greece
Malware detection constitutes a fundamental step in safe and secure computational systems, including industrial systems and the Internet of Things (IoT). Modern malware detection is based on machine learning methods t... 详细信息
来源: 评论
Performance Analysis of DDoS Mitigation in Heterogeneous Environments  2
Performance Analysis of DDoS Mitigation in Heterogeneous Env...
收藏 引用
2nd international conference on Interdisciplinary Cyber Physical systems, ICPS 2022
作者: Verma, Amandeep Saha, Rahul Lovely Professional University School of Computer Science and Engineering India
computer and Vehicular networks, both are prone to multiple information security breaches because of many reasons like lack of standard protocols for secure communication and authentication. distributed Denial of Serv... 详细信息
来源: 评论
Intelligent transportation systems trusted user's security and privacy  2
Intelligent transportation systems trusted user's security a...
收藏 引用
2nd IEEE international conference on Interdisciplinary Approaches in Technology and Management for Social Innovation, IATMSI 2024
作者: Kaushik, Priyanka Rathore, Saurabh Pratap Singh Sachdeva, Lakshay Poonia, Minakshi Singh, Dipti Bir, Lovish CSE-APEX Chandigarh India Icapsr Management & Research New Delhi India Madhav Institute of Technology & Science Dept. of Eng. Math's & Computing Gwalior India Madhav University Dept. of Management Abu Road India
Standard encryption cannot be utilized in practical communications due to time and storage limits. Dedicated lane keeping (DRL) is a technique that helps self-driving cars navigate congested roads by keeping them in a... 详细信息
来源: 评论
Intrusion Detection System Using Ensemble Machine Learning in Cloud Environment  2nd
Intrusion Detection System Using Ensemble Machine Learning i...
收藏 引用
2nd international conference on Emerging Technologies and Intelligent systems, ICETIS 2022
作者: Manzoor, Saba Ahmad, Musheer Alhadawi, Hussam S. Department of Computer Engineering Jamia Millia Islamia New Delhi110025 India Department of Computer Techniques Engineering Dijlah University College Baghdad10011 Iraq College of Engineering University of Warith Al-Anbiyaa Karbala Iraq
Due to the expeditious evolution of advanced computing innovations, new organizational and operational strategies call for adoption. In the last few years, cloud computing has emerged and evolved as one such example t... 详细信息
来源: 评论
New Cloud Computing Authentication Based on Secure Hash Algorithm (SHA-3) and Lightweight Sosemanuk Algorithm  2nd
New Cloud Computing Authentication Based on Secure Hash Algo...
收藏 引用
2nd international conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Niaf, Jolan Rokan Kadhim, Aqeel Kamil Mohammed, Qutaiba Humadi Hoomod, Haider K. Salman, Muna Muhsen Iraqi Commission for Computers & Informatics Informatics Institute for Postgraduate Studies Baghdad Iraq Computer Techniques Engineering Department Imam Al-Kadhim College Baghdad Iraq College of Nursing University of Baghdad Baghdad Iraq College of Education Al-Mustansiriyah University Baghdad Iraq Ministry of Science and Technology Department of Information Technology Baghdad Iraq
The term "cloud computing" refers to a vast network of linked, virtually hosted, and easily updatable computer resources. That are capable of consisting of a number of different apps and offering a number of... 详细信息
来源: 评论
A Multistep Ahead Predictive Analysis of Crude Oil  2
A Multistep Ahead Predictive Analysis of Crude Oil
收藏 引用
2nd IEEE international conference on Blockchain and distributed systems security, ICBDS 2023
作者: Mohapatra, Srikanta Kumar Singh, Kamakhya Narayan Sarangi, Prakash Kumar Sahu, Premananda Mohanty, Jayashree Chitkara University Institute of Engineering and Technology Chitkara University Punjab India School Of Computer Application KIIT Deemed University Odisha India Hyderabad India School of Computer science and Engineering Lovely professional University Punjab India Chandigarh University Dept.of AIT-CSE Punjab Chandigarh Mohali India
The population is increasing in a rapid manner and the number of vehicles is increasing in the same ratio. Also, crude oils are very useful towards the energy needs in the industries. As a result, a day will come when... 详细信息
来源: 评论
ASBlock:An Agricultural based Supply Chain Management using Blockchain Technology  2
ASBlock:An Agricultural based Supply Chain Management using ...
收藏 引用
2nd international conference on Machine Learning and Data Engineering, ICMLDE 2023
作者: Panigrahi, Amrutanshu Pati, Abhilash Dash, Bibhu Sahoo, Ghanashyam Singh, Debabrata Dash, Manoranjan University Odisha India School of Computer and Information Science University of the Cumberlands Williamsburg United States Department of CSE GITA Autonomous College Odisha India University Odisha India University Odisha India
Blockchain is a distributed digital ledger technology that allows for the immutable and auditable logging of transactions without needing a central authority or centralized database. First introduced in 2008 as the te... 详细信息
来源: 评论
Ordering Services Modelling in Blockchain Platform for Food Supply Chain Management  2nd
Ordering Services Modelling in Blockchain Platform for Food ...
收藏 引用
2nd international conference on Emerging Trends in Expert Applications and security, ICETEAS 2023
作者: Deshmukh, Pratibha Avinash, Sharma Gonsai, Atul M. Sonawane, Sayas S. Khan, Taukir Bharati Vidyapeeth’s Institute of Management and Information Technology Maharashtra Navi Mumbai India HR Mullana-Ambala India Department of Computer Science Saurashtra University GJ Rajkot India
Blockchain technology (BCT) is widely used in various applications where different stakeholders of their own interest are coming together where they cooperate and coordinate in trustless decentralized environment. The... 详细信息
来源: 评论
Impacts of High Denisty Cloud Computing on Data Protection and security Management for 6G Networking
Impacts of High Denisty Cloud Computing on Data Protection a...
收藏 引用
Disruptive Technologies (ICDT), international conference on
作者: Vinay Mallikarjunaradhya Haritha Yennapusa Ranadeep Reddy Palle K. Suganyadevi Nidhi Gupta Legal Tech Platform Thomson Reuters Toronto Canada Department of Computer Science University of central Missouri Austin Texas USA Department of Computer Science University of Houston Austin Texas USA Department of ECE Sri Eshwar College of Engineering Coimbatore Tamil Nadu India Department of Computer Science and Engineering G.L. Bajaj Institute of Technology and Management Greater Noida India
Data protection and security management in the 6G era is a key challenge due to the emergence of high density cloud computing. The availability of high density cloud computing technologies creates a platform for massi...
来源: 评论
Comparing the Supersonic Cloud Computing Model to Enhance the Networking and security in Traditional Data Centers
Comparing the Supersonic Cloud Computing Model to Enhance th...
收藏 引用
Disruptive Technologies (ICDT), international conference on
作者: Ranadeep Reddy Palle Vinay Mallikarjunaradhya Haritha Yennapusa K. Suganyadevi Nidhi Gupta Department of Computer Science University of Houston Austin Texas USA Legal Tech Platform Thomson Reuters Toronto Canada Department of Computer Science University of central Missouri Austin Texas USA Department of ECE Sri Eshwar College of Engineering Coimbatore Tamil Nadu India Department of Computer Science and Engineering G.L. Bajaj Institute of Technology and Management Greater Noida India
The Comparing the supersonic cloud computing model to enhance the networking and security in Traditional Data Centers study aimed to analyse the differences between traditional data centers and cloud computing models....
来源: 评论