咨询与建议

限定检索结果

文献类型

  • 301 篇 会议
  • 4 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 309 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 209 篇 计算机科学与技术...
    • 152 篇 软件工程
    • 96 篇 信息与通信工程
    • 33 篇 控制科学与工程
    • 22 篇 电气工程
    • 13 篇 生物工程
    • 12 篇 机械工程
    • 12 篇 电子科学与技术(可...
    • 10 篇 动力工程及工程热...
    • 10 篇 生物医学工程(可授...
    • 10 篇 安全科学与工程
    • 7 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 5 篇 网络空间安全
    • 3 篇 材料科学与工程(可...
  • 62 篇 理学
    • 36 篇 数学
    • 14 篇 生物学
    • 9 篇 系统科学
    • 8 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 3 篇 地球物理学
  • 34 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 24 篇 法学
    • 17 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 农学

主题

  • 18 篇 computer network...
  • 17 篇 wireless sensor ...
  • 14 篇 internet of thin...
  • 12 篇 security
  • 11 篇 authentication
  • 10 篇 information secu...
  • 9 篇 computer archite...
  • 9 篇 monitoring
  • 9 篇 distributed comp...
  • 9 篇 telecommunicatio...
  • 8 篇 computer securit...
  • 8 篇 computer crime
  • 8 篇 servers
  • 8 篇 protocols
  • 8 篇 network security
  • 7 篇 cryptography
  • 6 篇 intrusion detect...
  • 6 篇 data security
  • 6 篇 access control
  • 6 篇 public key crypt...

机构

  • 3 篇 legal tech platf...
  • 2 篇 university of ho...
  • 2 篇 guangdong univer...
  • 2 篇 department of co...
  • 2 篇 department of el...
  • 2 篇 artificial intel...
  • 2 篇 department of co...
  • 2 篇 graphic era hill...
  • 2 篇 chitkara univers...
  • 2 篇 g.l. bajaj insti...
  • 2 篇 department of ec...
  • 2 篇 electronics & co...
  • 2 篇 department of co...
  • 2 篇 school of electr...
  • 2 篇 department of co...
  • 2 篇 computer science...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 university of ce...
  • 2 篇 school of comput...

作者

  • 2 篇 jian wang
  • 2 篇 wang jian
  • 2 篇 hammoudeh mohamm...
  • 2 篇 venugopal k.r.
  • 2 篇 ranadeep reddy p...
  • 2 篇 guo hui
  • 2 篇 patnaik lalit m.
  • 2 篇 lloret jaime
  • 2 篇 achuthan krishna...
  • 2 篇 srivastava anime...
  • 2 篇 onut iosif viore...
  • 2 篇 anon
  • 2 篇 ahmad musheer
  • 2 篇 haritha yennapus...
  • 2 篇 gupta nidhi
  • 2 篇 vinay mallikarju...
  • 2 篇 k. suganyadevi
  • 2 篇 von bochmann gre...
  • 2 篇 joosen wouter
  • 2 篇 mallikarjunaradh...

语言

  • 299 篇 英文
  • 8 篇 其他
  • 4 篇 中文
检索条件"任意字段=2nd International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014"
309 条 记 录,以下是81-90 订阅
排序:
IoT Standardisation - Challenges, Perspectives and Solution  18
IoT Standardisation - Challenges, Perspectives and Solution
收藏 引用
2nd international conference on Future networks and distributed systems (ICFndS)
作者: Saleem, Jibran Hammoudeh, Mohammad Raza, Umar Adebisi, Bamidele Ande, Ruth Manchester Metropolitan Univ Sch Engn Manchester Lancs England Manchester Metropolitan Univ Sch Comp Math & Digital Technol Manchester Lancs England
The success and widespread adoption of the Internet of Things (IoT) has increased many folds over the last few years. Industries, technologists and home users recognise the importance of IoT in their lives. Essentiall... 详细信息
来源: 评论
Optimisation of the Public Key Encryption Infrastructure for the Internet of Things  18
Optimisation of the Public Key Encryption Infrastructure for...
收藏 引用
2nd international conference on Future networks and distributed systems (ICFndS)
作者: Kelly, Daniel Hammoudeh, Mohammad Manchester Metropolitan Univ Sch Comp Math & Digital Technol Manchester M1 5GD Lancs England
The Internet of Things (IoT) faces unique security challenges due to its resource constrained devices. Limited processing, storage, memory and power of IoT objects do not support the deployment of advanced security pr... 详细信息
来源: 评论
Cyber security in Smart Grid: Challenges and Solutions
Cyber Security in Smart Grid: Challenges and Solutions
收藏 引用
international conference on Power and Embedded Drive Control (ICPEDC)
作者: Gowthamaraj Rajendran Harsha Vardhan Sathyabalu Meikandasivam Sachi Vijayakumar Devarajan School of Electrical Engineering Vellore Institute of Technology Vellore India
The conventional power grid has gone into transition and converted into what is called “smart grid The smart grid helps to bring reliability, monitoring, controllability, and efficiency. It provides a bidirectional f... 详细信息
来源: 评论
FRiCS: A Framework for Risk-driven Cloud Selection  2
FRiCS: A Framework for Risk-driven Cloud Selection
收藏 引用
2nd international Workshop on Multimedia Privacy and security (MPS)
作者: Arias-Cabarcos, Patricia Almenarez, Florina Diaz-Sanchez, Daniel Marin, Andres Univ Mannheim Mannheim Germany Univ Carlos III Madrid Madrid Spain
Our devices and interactions in a world where physical and digital realities are more and more blended, generate a continuum of multimedia data that needs to be stored, shared and processed to provide services that en... 详细信息
来源: 评论
2nd international Symposium on Cyber security Cryptography and Machine Learning, CSCML 2018
收藏 引用
2nd international Symposium on Cyber security Cryptography and Machine Learning, CSCML 2018
The proceedings contain 23 papers. The special focus in this conference is on Cyber security Cryptography and Machine Learning. The topics include: Secured Data Gathering Protocol for IoT networks;towards Building Act...
来源: 评论
Principles of Designing distributed Data Flow Control systems with High Resistance to Malicious Actions  2
Principles of Designing Distributed Data Flow Control System...
收藏 引用
2nd IEEE international conference on Control in Technical systems (CTS)
作者: Bekeneva, Yana A. Novikova, Evgenia S. Shorov, Andrey V. St Petersburg Electrotech Univ LETI Fac Comp Sci & Technol St Petersburg Russia
Nowadays one of the most important tasks in the field of network technologies is to ensure the data transmission, processing and storage security. In this paper, the idea of a new approach to the design of a distribut... 详细信息
来源: 评论
Theories, Techniques and Tools for Engineering Heterogeneous Railway networks  2nd
Theories, Techniques and Tools for Engineering Heterogeneous...
收藏 引用
2nd international conference on Reliability, Safety, and security of Railway systems (RSSRail)
作者: Stankaitis, Paulius Iliasov, Alexei Newcastle Univ Sch Comp Sci Newcastle Upon Tyne Tyne & Wear England
Modernising outdated national railway systems will be done gradually due to practical constraints thus creating network areas with different signalling systems. Formal methods have been successfully applied in the rai... 详细信息
来源: 评论
On the Performance of Key Pre-distribution for RPL-Based IoT networks  2nd
On the Performance of Key Pre-distribution for RPL-Based IoT...
收藏 引用
2nd EAI international conference on Interoperability in IoT (InterIoT) / 3rd EAI international conference on Safety and security in Internet of Things (SaSeIoT)
作者: El Hajjar, Ayman Roussos, George Paterson, Maura Birkbeck Univ London Dept Comp Sci & Informat Syst London England Birkbeck Univ London Dept Econ Math & Stat London England
A core ingredient of the Internet of Things (IoT) is the use of deeply embedded resource constrained devices, often connected to the Internet over Low Power and Lossy networks. These constraints compounded by the need... 详细信息
来源: 评论
A dual layer chaos triggered image cryptosystem  2
A dual layer chaos triggered image cryptosystem
收藏 引用
2nd international conference on Communication and Electronics systems, ICCES 2017
作者: Rajendran, Sujarani Doraipandian, Manivannan Department of Computer Science Srinivasa Ramanujan Centre SASTRA University Kumbakonam India School of Computing SASTRA University Thanjavur India
Secret communication can be achieved by utilizing different encryption methodologies. In current scenario, security for images required more attention, specifically when sensitive images are communicated over insecure... 详细信息
来源: 评论
Payload recognition and detection of Cross Site Scripting attack
Payload recognition and detection of Cross Site Scripting at...
收藏 引用
international conference on Anti-Cybercrime (ICACC)
作者: M. Ridwan Zalbina Tri Wanda Septian Deris Stiawan Moh. Yazid Idris Ahmad Heryanto Rahmat Budiarto Computer Engineering Dept Sriwijaya University Inderalaya Indonesia Faculty of Computing Universiti Teknologi Malaysia Johor Bharu Malaysia College of Computer Science & IT Albaha University Albaha Saudi Arabia
Web Application becomes the leading solution for the utilization of systems that need access globally, distributed, cost-effective, as well as the diversity of the content that can run on this technology. At the same ... 详细信息
来源: 评论