咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是51-60 订阅
排序:
Internet of Things-Based Middleware Against Cyber-Attacks on Smart Homes using Software-Defined Networking and Deep Learning  2
Internet of Things-Based Middleware Against Cyber-Attacks on...
收藏 引用
2nd international conference on Computational Methods in Science and Technology, ICCMST 2021
作者: Tawfik, Mohammed Al-Zidi, Nasser M. Alsellami, Belal Al-Hejri, Aymen M. Nimbhore, Sunil Dr. Babasaheb Ambedkar Marathwada University Department of Computer Science & It Aurangabad India Albaydha University Faculty of Administrative and Computer Sciences Albaydha Yemen
Internet of Things (IoT) devices are expected to number about 3.5 billion by 2023.;a tremendous amount of Internet of Things (IoT) data that is generating (IoT) devices is estimated to exceed 79.4 zettabytes by 2025. ... 详细信息
来源: 评论
A review of cyber securities in smart grid technology  2
A review of cyber securities in smart grid technology
收藏 引用
2nd international conference on Computation, Automation and Knowledge Management, ICCAKM 2021
作者: Kawoosa, Asif Iqbal Prashar, Deepak Lovely Professional University Department of Computer Applications Punjab India
A Smart Grid (SG) is an electrical infrastructure much like legacy power grid with scalable and pervasive two-way communications, timely control capabilities, large scale integration of distributed resources and effic... 详细信息
来源: 评论
Classification of Internet of Things Cybersecurity Attacks Using a Hybrid Deep Learning Approach  2nd
Classification of Internet of Things Cybersecurity Attacks U...
收藏 引用
2nd international conference on Innovations of Intelligent Informatics, Networking and Cybersecurity, 3INC 2024
作者: Kareem, Eman Karkawi Manaa, Mehdi Ebady Department of Information Networks College of IT University of Babylon Babylon Iraq Intelligent Medical Systems Department College of Sciences Al-Mustaqbal University Babylon51001 Iraq College of Information Technology University of Babylon Babylon Iraq
IoT devices play an integral part of our digital life today, yet pose significant security risks. These risks allow attackers to carry out various cyberattacks, mainly distributed denial of service (DDoS) attacks. To ... 详细信息
来源: 评论
Comparative Analysis of Communication Protocols in Blockchain-IoT systems for Optimizing IoT Data Flow Efficiency
Comparative Analysis of Communication Protocols in Blockchai...
收藏 引用
Advanced Innovations in Smart Cities (ICAISC), international conference on
作者: Mnar Alnaghes Hong Shen School of Computer Science University of Adelaide Adelaide Australia
The Internet of Things (IoT) is considered an evolving technology, consisting of different types of connected devices that have sensors, specialized hardware, and software. However, considerable challenges related to ... 详细信息
来源: 评论
IA&AI: Interference Analysis in Multi-core Embedded AI systems  2nd
IA&AI: Interference Analysis in Multi-core Embedded AI Syst...
收藏 引用
2nd international conference on Data Science and Artificial Intelligence, DSAI 2024
作者: Oliveira, Afonso Moreira, Gonçalo Costa, Diogo Pinto, Sandro Gomes, Tiago Centro ALGORITMI/LASI Universidade do Minho Braga Portugal
Significant advances in Artificial Intelligence (AI) over the past decade have opened new aisles of exploration for industries such as automotive and industrial robotics, leading to the widespread adoption of AI. To m... 详细信息
来源: 评论
security for Wireless Sensor networks : Bibliometric Analysis
Security for Wireless Sensor Networks : Bibliometric Analysi...
收藏 引用
Computing, Analytics and networks (Indo-Taiwan ICAN), Indo – Taiwan 2nd international conference on
作者: Durga Shankar Baggam Shalli Rani Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Computer Science & Engineering Gandhi Engineering College(GECBhubaneswar) Odisha India
Wireless sensor networks are mostly popular in a wide variety of applications and is used without any restrictions, that leads to serious security implications. Major concerns are localization, security, data aggregat... 详细信息
来源: 评论
Wireless network security technology and application in colleges and universities
Wireless network security technology and application in coll...
收藏 引用
The 2nd international conference on distributed Sensing and Intelligent systems (ICDSIS 2021)
作者: W. Wang G. Wang X. He Z. Guo Z. Lin Z. Wang Airport Management College Guangzhou Civil Aviation College Guangzhou 510403 Guangdong China
The rapid development of computer technology has penetrated into all areas of people's work and life. At the same time, with the rapid development of wireless network technology, colleges and universities have bec... 详细信息
来源: 评论
DDoS Attack Detection in IoT networks Using Deep Learning Models Combined with Random Forest as Feature Selector  2nd
DDoS Attack Detection in IoT Networks Using Deep Learning Mo...
收藏 引用
2nd international conference on Advances in Cyber security, ACeS 2020
作者: Farukee, Minhaz Bin Shabit, M. S. Zaman Haque, Md. Rakibul Sattar, A. H. M. Sarowar Department of Computer Science and Engineering Rajshahi University of Engineering and Technology Rajshahi Bangladesh
Due to the major advancements and finesse earned in technology, the internet and communication fields have seen a ground-breaking breakthrough by incorporating themselves with "things" which as a result have... 详细信息
来源: 评论
6g access network for intelligent internet of healthcare things: Opportunity, challenges, and research directions  2nd
6g access network for intelligent internet of healthcare thi...
收藏 引用
2nd international conference on Trends in Computational and Cognitive Engineering, TCCE 2020
作者: Kaiser, M. Shamim Zenia, Nusrat Tabassum, Fariha Mamun, Shamim Al Rahman, M. Arifur Islam, Md. Shahidul Mahmud, Mufti Institute of Information Technology Jahangirngar University Savar Dhaka1342 Bangladesh Department of EECE Military Institute of Science and Technology Dhaka Bangladesh Department of Physics Jahangirngar University Savar Dhaka1342 Bangladesh Department of Computer Science Nottingham Trent University NottinghamNG11 8NS United Kingdom
The Internet of Healthcare Things (IoHT) demands massive and smart connectivity, huge bandwidth, lower latency with ultra-high data rate and better quality of healthcare experience. Unlike the 5G wireless network, the... 详细信息
来源: 评论
distributed Trust-Based Monitoring Approach for Fog/Cloud networks  1
收藏 引用
2nd international conference on Computing, Communications and Data Engineering (CCODE)
作者: Ben Daoud, Wided Meddeb-Makhlouf, Amel Zarai, Faouzi Obaidat, Mohammad S. Univ Sfax NTSCom Res Unit ENETCOM Sfax Tunisia Nazarbayev Univ Dept ECE Astana Kazakhstan Univ Jordan Amman Jordan
The fog computing paradigm presents an extension of the cloud computing in order to more ensure the requirements of Internet of things (IoT). Hence, the growth of fog-IoT system and their openness to their socioeconom... 详细信息
来源: 评论