咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是41-50 订阅
排序:
Cryptographic Ledger for Cyber security in Smart Grid
Cryptographic Ledger for Cyber Security in Smart Grid
收藏 引用
international conference on Edge Computing and Applications (ICECAA)
作者: Elanchezhiyan E K. Kalaiselvi D. Banumathy Department of Networking and Communications Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamilnadu Department of Computer Science and Engineering Paavai Engineering College Namakkal Tamilnadu
In addition to the physical security of energy networks, cyber security is essential to protecting these systems as well. Cyber threats can stem from malicious hackers who have infiltrated the networks to gain unautho...
来源: 评论
An Integrated Rule-Based and Machine Learning Technique for Efficient DoS Attack Detection in WSN
An Integrated Rule-Based and Machine Learning Technique for ...
收藏 引用
Disruptive Technologies (ICDT), international conference on
作者: Shalini Swami Pushpa Singh Sansar Singh Chauhan Department of Computer Science GL Bajaj Institute of Technology and Management Greater Noida UP
Wireless Sensor networks (WSNs) are highly distributed, lightweight nodes, deployed in large numbers to monitor systems. Because of the nature of wireless, there are various challenges for security and threats. An eff...
来源: 评论
Depth Analysis on Recognition and Prevention of DDoS Attacks via Machine Learning and Deep Learning Strategies in SDN
Depth Analysis on Recognition and Prevention of DDoS Attacks...
收藏 引用
Self Sustainable Artificial Intelligence systems (ICSSAS), international conference on
作者: Pranay Yadav Nishchol Mishra Sanjeev Sharma School of Information Technology (SoIT) Rajiv Gandhi Proudyogiki Vishwavidyalaya Bhopal M.P INDIA
Recent years have witnessed the exponential growth of global digitization. Similarly, the rise in distributed Denial of Service (DDoS) attacks continues unabated. DDoS is a significant threat to network security in th... 详细信息
来源: 评论
The Role of IoT in Enhancing Wireless Sensor Network Applications: A Comprehensive Analysis
The Role of IoT in Enhancing Wireless Sensor Network Applica...
收藏 引用
Emerging Trends in Engineering and Medical Sciences (ICETEMS), international conference on
作者: Sonia Singh Neha Gupta School of Computer Applications Manav Rachna International Institute of Research & Studies Faridabad India
WSNs are a system of spatially distributed sensors that sense some environmental phenomena and communicate the information without wires to a central system. Now, integration with the IoT further strengthens WSNs in a... 详细信息
来源: 评论
Analyzing the Attacks on Blockchain Technologies  2nd
Analyzing the Attacks on Blockchain Technologies
收藏 引用
2nd international conference on Machine Learning, Advances in Computing,Renewable Energy and communication, MARC 2020
作者: Vats, Vinay Kumar Katarya, Rahul Department of Computer Science & Engineering Delhi Technological University Shahbad Daulatpur Delhi110042 India
Blockchain technology has gained significant interest because of a wide variety of possible uses. It was first developed as a Bitcoin cryptocurrency but has since been used in many other business and non-business appl... 详细信息
来源: 评论
Intelligent network traffic analysis: leveraging machine learning for enhanced cybersecurity
Intelligent network traffic analysis: leveraging machine lea...
收藏 引用
2nd international conference on Pervasive Computing Advances and Applications (PerCAA 2024)
作者: Seema Kaloria Rakesh Kumar Saxena Deshraj Bairwa Faculty of Computer Science & Engineering Poornima University Jaipur Rajasthan India
Network traffic analysis is one of the necessary processes through which there can be monitoring, securing, and optimizing network operations. It is hard for this approach to notice some unknown or evolving kinds of s...
来源: 评论
1D CNN Based Model for Detection of DDoS Attack
1D CNN Based Model for Detection of DDoS Attack
收藏 引用
Device Intelligence, Computing and Communication Technologies, (DICCT), international conference on
作者: Padmavathy C Mahalakshmi A Vadivel R Rajat Kumawat Ritam Dutta Bhaskar Roy Nilanjan Dutta Computer Science and Engineering Sri Ramakrishna Engineering College Coimbatore India Computer Science and Engineering B.N.M Institute of Technology Bangalore India Computer Science and Engineering Poornima University Jaipur India Artificial Intelligence & Machine Learning Asansol Engineering College Asansol India Electronics & Comm. Engineering Asansol Engineering College Asansol India
As the technology behind informatics systems has improved, the Internet of Things (IoT) has grown in significance and application. IoT applications are becoming more popular as a result of the expansion of IoT enabler... 详细信息
来源: 评论
A Comprehensive Study on Blockchain: Transforming the World
A Comprehensive Study on Blockchain: Transforming the World
收藏 引用
Innovation in Technology (INOCON), IEEE international conference for
作者: Sujata Negi Thakur Sudhanshu Maurya Bhupesh Rawat Department of Computer Science & Engineering Graphic Era Hill University Haldwani Campus Nainital India School of Computing Graphic Era Hill University Bhimtal Campus Nainital India
We are going towards digitization, and while discussing it, “money” is the most common word that comes to everyone’s mind. We have “Bitcoins” to support this. The Blockchain, a shared ledger system, allows for th... 详细信息
来源: 评论
Seagull-optimized Deep Convolutional Neural Network for Detecting distributed Denial of Service Attack in Cloud Computing
Seagull-optimized Deep Convolutional Neural Network for Dete...
收藏 引用
Self Sustainable Artificial Intelligence systems (ICSSAS), international conference on
作者: Yogesh B. Sanap Pushpalata G. Aher Computer Science and Engineering Sandip University Nashik Sandip University Nashik Maharashtra
Due to the enormous benefits and applications of cloud computing, there is a lot of interest from researchers on cloud computing. The most significant security risk associated with cloud computing is insider distribut... 详细信息
来源: 评论
DDoS Attack Intrusion Detection System with CNN and LSTM Hybridization
DDoS Attack Intrusion Detection System with CNN and LSTM Hyb...
收藏 引用
Sustainable Computing and Smart systems (ICSCSS), international conference on
作者: V Poornachander Konga Sathish Kumar Sripelli Jagadish Department of Computer science and Applications Government Degree College (Autonomous) Narsampet Warangal Telangana Department of Computer Science & Engineering Chaitanya (Deemed to be) University Hanamkonda Telangana Dept of CS & AI SR University Ananthasagar Telangana
distributed Denial of service (DDoS) threats are among the most harmful events to network security. DDoS attacks are considered among the most common types of network attacks. When servers get attacked by these attack... 详细信息
来源: 评论