咨询与建议

限定检索结果

文献类型

  • 1,955 篇 会议
  • 21 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 1,980 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,427 篇 工学
    • 1,258 篇 计算机科学与技术...
    • 567 篇 软件工程
    • 376 篇 电气工程
    • 332 篇 信息与通信工程
    • 117 篇 控制科学与工程
    • 83 篇 网络空间安全
    • 76 篇 安全科学与工程
    • 46 篇 机械工程
    • 42 篇 生物工程
    • 36 篇 动力工程及工程热...
    • 33 篇 仪器科学与技术
    • 29 篇 石油与天然气工程
    • 28 篇 电子科学与技术(可...
    • 28 篇 环境科学与工程(可...
    • 28 篇 生物医学工程(可授...
    • 26 篇 交通运输工程
    • 23 篇 建筑学
  • 206 篇 管理学
    • 151 篇 管理科学与工程(可...
    • 75 篇 图书情报与档案管...
    • 65 篇 工商管理
  • 204 篇 理学
    • 102 篇 数学
    • 48 篇 生物学
    • 28 篇 系统科学
    • 26 篇 统计学(可授理学、...
    • 24 篇 大气科学
  • 52 篇 法学
    • 24 篇 法学
    • 22 篇 社会学
  • 50 篇 医学
    • 39 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 34 篇 公共卫生与预防医...
  • 20 篇 经济学
  • 14 篇 教育学
  • 4 篇 农学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 673 篇 cloud computing
  • 230 篇 security
  • 78 篇 servers
  • 75 篇 cloud security
  • 71 篇 encryption
  • 67 篇 internet of thin...
  • 56 篇 big data
  • 54 篇 cryptography
  • 52 篇 authentication
  • 52 篇 privacy
  • 51 篇 data privacy
  • 49 篇 computational mo...
  • 44 篇 network security
  • 42 篇 computer archite...
  • 40 篇 virtualization
  • 38 篇 edge computing
  • 37 篇 data security
  • 36 篇 monitoring
  • 35 篇 access control
  • 35 篇 real-time system...

机构

  • 11 篇 edinburgh napier...
  • 10 篇 nanjing univ inf...
  • 9 篇 nanjing univ inf...
  • 8 篇 nanjing univ inf...
  • 7 篇 pace univ dept c...
  • 7 篇 nanjing univ aer...
  • 7 篇 beijing universi...
  • 4 篇 computer science...
  • 4 篇 maharishi school...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 school of cybers...
  • 4 篇 school of comput...
  • 4 篇 institute of inf...
  • 4 篇 bosch banglore
  • 4 篇 dept. of compute...
  • 4 篇 south china univ...
  • 4 篇 china of limited...
  • 4 篇 school of comput...
  • 4 篇 zhengzhou inform...

作者

  • 12 篇 qiu meikang
  • 11 篇 liu qi
  • 10 篇 liu xiaodong
  • 8 篇 li bo
  • 7 篇 meikang qiu
  • 7 篇 li jing
  • 6 篇 gai keke
  • 6 篇 linge nigel
  • 5 篇 keke gai
  • 5 篇 segundo moisés t...
  • 5 篇 luis enrique maf...
  • 4 篇 yang yang
  • 4 篇 wang wei
  • 4 篇 hui zhao
  • 4 篇 han zhijie
  • 4 篇 rong chunming
  • 4 篇 marwan mbarek
  • 4 篇 kartit ali
  • 4 篇 wang xin
  • 4 篇 zhang yu

语言

  • 1,784 篇 英文
  • 193 篇 其他
  • 21 篇 中文
  • 1 篇 土耳其文
检索条件"任意字段=3rd International Conference on Cloud Computing and Security, ICCCS 2017"
1980 条 记 录,以下是1-10 订阅
排序:
3rd international conference on cloud computing and security, icccs 2017
3rd International Conference on Cloud Computing and Security...
收藏 引用
3rd international conference on cloud computing and security, icccs 2017
The proceedings contain 48 papers. The special focus in this conference is on cloud computing and security. The topics include: Coverless text information hiding method using the frequent words distance;Improved STDM ...
来源: 评论
3rd international conference on cloud computing and security, icccs 2017
3rd International Conference on Cloud Computing and Security...
收藏 引用
3rd international conference on cloud computing and security, icccs 2017
The proceedings contain 48 papers. The special focus in this conference is on cloud computing and security. The topics include: Coverless text information hiding method using the frequent words distance;Improved STDM ...
来源: 评论
3rd international conference on Smart computing and Cyber security—Strategic Foresight, security Challenges and Innovation, SMARTCYBER 2023
3rd International Conference on Smart Computing and Cyber Se...
收藏 引用
3rd international conference on Smart computing and Cyber security—Strategic Foresight, security Challenges and Innovation, SMARTCYBER 2023
The proceedings contain 49 papers. The special focus in this conference is on Smart computing and Cyber security—Strategic Foresight, security Challenges and Innovation. The topics include: A Comparative Analysis of ...
来源: 评论
3rd international conference on computing Science, Communication and security, COMS2 2022
3rd International Conference on Computing Science, Communica...
收藏 引用
3rd international conference on computing Science, Communication and security, COMS2 2022
The proceedings contain 22 papers. The special focus in this conference is on computing Science, Communication and security. The topics include: Energy Efficient Allocation of Resources in NOMA Based (MU-HCRN) with Pe...
来源: 评论
3rd international conference on security and Privacy in New computing Environments, SPNCE 2020
3rd International Conference on Security and Privacy in New ...
收藏 引用
3rd international conference on security and Privacy in New computing Environments, SPNCE 2020
The proceedings contain 31 papers. The special focus in this conference is on security and Privacy in New computing Environments. The topics include: Forward Secure Searchable Encryption with Conjunctive-Keyword Suppo...
来源: 评论
Proceedings on 2018 IEEE 3rd international conference on computing, Communication and security, icccs 2018
Proceedings on 2018 IEEE 3rd International Conference on Com...
收藏 引用
3rd IEEE international conference on computing, Communication and security, icccs 2018
The proceedings contain 44 papers. The topics discussed include: benchmarking datasets for anomaly-based network intrusion detection: KDD CUP 99 alternatives;comparison of algorithm in foreign exchange rate prediction...
来源: 评论
Proceedings - 4th IEEE international conference on Big Data security on cloud, BigDatasecurity 2018, 4th IEEE international conference on High Performance and Smart computing, HPSC 2018 and 3rd IEEE international conference on Intelligent Data and security, IDS 2018
Proceedings - 4th IEEE International Conference on Big Data ...
收藏 引用
4th IEEE international conference on Big Data security on cloud, BigDatasecurity 2018, 4th IEEE international conference on High Performance and Smart computing, HPSC 2018 and 3rd IEEE international conference on Intelligent Data and security, IDS 2018
The proceedings contain 51 papers. The topics discussed include: secure similar document detection: optimized computation using the Jaccard coefficient;fast activation function approach for deep learning based online ...
来源: 评论
Zero Trust Network Access (ZTNA) Architecture: A Novel Perspective to cloud security  3rd
Zero Trust Network Access (ZTNA) Architecture: A Novel Persp...
收藏 引用
3rd international conference on Network security and Blockchain Technology
作者: Das, Priyanka Ray, Sangram Govil, Mahesh Chandra Natl Inst Technol Sikkim Dept Comp Sci & Engn Ravangla 737139 Sikkim India
cloud computing is the development drift of the IT industry. This modern cloud computing has grabbed remarkable attention in recent days owing to its high-quality on-demand service accessibility and flexible nature. I... 详细信息
来源: 评论
Exploring cloud security Challenges: An In-depth Analysis of Emerging Threats and Mitigation Strategies  3
Exploring Cloud Security Challenges: An In-depth Analysis of...
收藏 引用
3rd international conference on Disruptive Technologies, ICDT 2025
作者: Kirti Galgotias university Greater Noida India
cloud computing has revolutionized the way organizations store, process, and manage data. However, the increasing reliance on cloud services raises significant security concerns. This paper explores the critical chall... 详细信息
来源: 评论
cloud-Block: An Integrated cloud and Blockchain using Secure cloud computing  3
Cloud-Block: An Integrated Cloud and Blockchain using Secure...
收藏 引用
3rd international conference on Automation, computing and Renewable Systems, ICACRS 2024
作者: Srinivas, B. Rao, K. Nageswara NRI Institute of Technology India DEPT of CSE NRI Institute of Technology India
cloud computing is a domain that provides data storage services using a cloud server. cloud also provides data processing, security, and integrity. Recently, cloud service providers (CSP) have required high-end securi... 详细信息
来源: 评论