咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是61-70 订阅
排序:
5th international Workshop on security of Industrial Control systems and Cyber-Physical systems, CyberICPS 2019, the 3rd international Workshop on security and Privacy Requirements Engineering, SECPRE 2019, the 1st international Workshop on security, Privacy, Organizations, and systems Engineering, SPOSE 2019, and the 2nd international Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in conjunction with the 24th European Symposium on Research in computer security, ESORICS 2019
5th International Workshop on Security of Industrial Control...
收藏 引用
5th international Workshop on security of Industrial Control systems and Cyber-Physical systems, CyberICPS 2019, the 3rd international Workshop on security and Privacy Requirements Engineering, SECPRE 2019, the 1st international Workshop on security, Privacy, Organizations, and systems Engineering, SPOSE 2019, and the 2nd international Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in conjunction with the 24th European Symposium on Research in computer security, ESORICS 2019
The proceedings contain 27 papers. The special focus in this conference is on security of Industrial Control systems and Cyber-Physical systems. The topics include: ADIoT 2019 preface;anomaly detection for industrial ...
来源: 评论
A Blockchain-Based distributed Authentication and Dynamic Group Key Agreement Protocol  2nd
A Blockchain-Based Distributed Authentication and Dynamic Gr...
收藏 引用
2nd international conference on Blockchain and Trustworthy systems, Blocksys 2020
作者: Xu, Zisang Li, Feng Tan, Minfu Zhang, Jixin Computer and Communication Engineer Institute Changsha University of Science and Technology ChangshaHunan410114 China Big data development and Research Center Guangzhou College of Technology and Business Guangzhou528138 China School of Computer Science Hubei University of Technology WuhanHubei430068 China
With the rapid development of mobile networks, there are more and more application scenarios that require group communication. Group communication can transmit messages to all group members with minimal resources. The... 详细信息
来源: 评论
Innovative Secure Authentication Interface for Hadoop Cluster Using DNA Cryptography: A Practical Study  1
收藏 引用
2nd international conference on Soft Computing and Signal Processing, ICSCSP 2019
作者: Balaraju, J. Prasada Rao, P.V.R.D. Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Guntur VaddeswaramAndhra Pradesh522502 India
Big data (BD) handling is a vital task in today’s world where huge amount of data is circulated within a distributed network. To handle BD, Hadoop is being widely used by various organizations, as Hadoop supports bot... 详细信息
来源: 评论
distributed Denial of Service Attack Detection using Naïve Bayes and K-Nearest Neighbor for Network Forensics  2
Distributed Denial of Service Attack Detection using Naïve ...
收藏 引用
2nd international conference on Innovative Mechanisms for Industry Applications, ICIMIA 2020
作者: Kachavimath, Amit V. Nazare, Shubhangeni Vijay Akki, Sheetal S. KLE Technological University Master of Computer Applications Hubli Karnataka India
The detection of anomaly traffic has become one of the principal directions in the field of network security intending to identify the attacks based on the specific deviations of the captured traffic. The cybercrime r... 详细信息
来源: 评论
Internet of Things-Based Middleware Against Cyber-Attacks on Smart Homes using Software-Defined Networking and Deep Learning
Internet of Things-Based Middleware Against Cyber-Attacks on...
收藏 引用
Computational Methods in Science & Technology (ICCMST), international conference on
作者: Mohammed Tawfik Nasser M. Al-Zidi Belal Alsellami Aymen M. Al-Hejri Sunil Nimbhore Dr. Babasaheb Ambedkar Marathwada University Aurangabad India Faculty of Administrative and Computer Sciences Albaydha University Albaydha Yemen
Internet of Things (IoT) devices are expected to number about 3.5 billion by 2023.; a tremendous amount of Internet of Things (IoT) data that is generating (IoT) devices is estimated to exceed 79.4 zettabytes by 2025.... 详细信息
来源: 评论
2nd international conference on Blockchain and Trustworthy systems, Blocksys 2020
2nd International Conference on Blockchain and Trustworthy S...
收藏 引用
2nd international conference on Blockchain and Trustworthy systems, Blocksys 2020
The proceedings contain 53 papers. The special focus in this conference is on Blockchain and Trustworthy systems. The topics include: A Blockchain-Based distributed Authentication and Dynamic Group Key Agreement Proto...
来源: 评论
Exploiting MQTT-SN for distributed Reflection Denial-of-Service Attacks  11th
Exploiting MQTT-SN for Distributed Reflection Denial-of-Serv...
收藏 引用
11th international Workshop on Biological Knowledge Discovery from Data, BIOKDD 2020, the 4th international Workshop on Cyber-security and Functional Safety in Cyber-Physical systems, IWCFS 2020, the 2nd international Workshop on Machine Learning and Knowledge Graphs, MLKgraphs2019, held at the 31st international conference on Database and Expert systems Applications, DEXA 2020
作者: Sochor, Hannes Ferrarotti, Flavio Ramler, Rudolf Software Competence Center Hagenberg GmbH Softwarepark 21 Hagenberg4232 Austria
distributed Denial-of-Service attacks are a dramatically increasing threat to Internet-based services and connected devices. In the form of reflection attacks they are abusing other systems to perform the actual attac... 详细信息
来源: 评论
Information security:A review of information security issues and techniques  2
Information Security:A review of information security issues...
收藏 引用
2nd international conference on computer Applications and Information security (ICCAIS)
作者: Alkhudhayr, Fatimah Alfarraj, Shouq Aljameeli, Buthina Elkhdiri, Salim Qassim Univ IT Dept BIND Res Grp Coll Comp Qasim Saudi Arabia
Currently, corporations are more into using distributed systems and relying on networks and communication facilities for transmitting critical and important information that needs to be secured. Therefore, protecting ... 详细信息
来源: 评论
A Review of Cyber Securities in Smart Grid Technology
A Review of Cyber Securities in Smart Grid Technology
收藏 引用
international conference on Computation, Automation and Knowledge Management (ICCAKM)
作者: Asif Iqbal Kawoosa Deepak Prashar Lovely Professional University Punjab India
A Smart Grid (SG) is an electrical infrastructure much like legacy power grid with scalable and pervasive two-way communications, timely control capabilities, large scale integration of distributed resources and effic... 详细信息
来源: 评论
Analysis and Mitigation of DDoS Flooding Attacks in Software Defined networks  2nd
Analysis and Mitigation of DDoS Flooding Attacks in Software...
收藏 引用
2nd international conference on Innovative Computing and Communication, ICICC 2019
作者: Samta, Rajni Sood, Manu Department of Computer Science H.P. University Shimla India
To analyze and evaluate the securityof the latest network architectures like Software Defined Network (SDN) architectures is a significant step in protecting these against various security threats. The security of SDN... 详细信息
来源: 评论