咨询与建议

限定检索结果

文献类型

  • 385 篇 会议
  • 7 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 396 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 265 篇 工学
    • 238 篇 计算机科学与技术...
    • 148 篇 软件工程
    • 67 篇 信息与通信工程
    • 65 篇 电气工程
    • 46 篇 控制科学与工程
    • 15 篇 生物工程
    • 14 篇 动力工程及工程热...
    • 13 篇 安全科学与工程
    • 12 篇 仪器科学与技术
    • 11 篇 机械工程
    • 10 篇 交通运输工程
    • 10 篇 环境科学与工程(可...
    • 9 篇 电子科学与技术(可...
    • 8 篇 建筑学
    • 7 篇 材料科学与工程(可...
    • 7 篇 生物医学工程(可授...
    • 7 篇 网络空间安全
  • 69 篇 理学
    • 33 篇 数学
    • 17 篇 生物学
    • 13 篇 系统科学
    • 9 篇 统计学(可授理学、...
    • 8 篇 物理学
    • 8 篇 大气科学
  • 53 篇 管理学
    • 39 篇 管理科学与工程(可...
    • 20 篇 工商管理
    • 17 篇 图书情报与档案管...
  • 19 篇 法学
    • 12 篇 法学
    • 9 篇 社会学
  • 8 篇 农学
  • 8 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
  • 6 篇 经济学
  • 2 篇 教育学

主题

  • 67 篇 internet of thin...
  • 42 篇 cloud computing
  • 24 篇 internet
  • 13 篇 computer archite...
  • 12 篇 distributed comp...
  • 12 篇 edge computing
  • 10 篇 computer science
  • 10 篇 security
  • 10 篇 web and internet...
  • 9 篇 resource managem...
  • 9 篇 real-time system...
  • 9 篇 protocols
  • 9 篇 fog computing
  • 9 篇 distributed data...
  • 8 篇 application soft...
  • 8 篇 costs
  • 8 篇 mobile computing
  • 7 篇 scalability
  • 7 篇 data privacy
  • 7 篇 software enginee...

机构

  • 5 篇 college of techn...
  • 5 篇 sr university de...
  • 4 篇 chitkara univers...
  • 4 篇 school of comput...
  • 3 篇 nitte meenakshi ...
  • 3 篇 uttaranchal inst...
  • 3 篇 dept. of cs geor...
  • 3 篇 school of electr...
  • 3 篇 department of co...
  • 2 篇 department of op...
  • 2 篇 department of cs...
  • 2 篇 state grid econo...
  • 2 篇 school of geomat...
  • 2 篇 department of cs...
  • 2 篇 peking univ shen...
  • 2 篇 panimalar engine...
  • 2 篇 college of compu...
  • 2 篇 kiet school of m...
  • 2 篇 international un...
  • 2 篇 graduate school ...

作者

  • 3 篇 pareek piyush ku...
  • 3 篇 yi pan
  • 2 篇 jianhua sun
  • 2 篇 ding runwei
  • 2 篇 shu-ching wang
  • 2 篇 h. le
  • 2 篇 rahul jagtap
  • 2 篇 sonia
  • 2 篇 sudhakar k.
  • 2 篇 himanshu
  • 2 篇 runwei ding
  • 2 篇 a. simmonds
  • 2 篇 chauhan rahul
  • 2 篇 gyankamal chhaje...
  • 2 篇 wang shun-sheng
  • 2 篇 kwei-jay lin
  • 2 篇 dineshkumar r.
  • 2 篇 wang meng
  • 2 篇 yan kuo-qin
  • 2 篇 liu fang

语言

  • 382 篇 英文
  • 14 篇 其他
  • 3 篇 中文
检索条件"任意字段=3rd International Conference on Distributed Computing and Internet Technology, ICDCIT 2006"
396 条 记 录,以下是11-20 订阅
排序:
Towards finding Hybrid Machine Learning Models for detection of IoT Botnets
Towards finding Hybrid Machine Learning Models for detection...
收藏 引用
international Symposium on Advanced computing and Communication (ISACC)
作者: Richy Laskar Rakesh Das Rahnak Laskar Samarjit Das Meghna Dasgupta Bachelor of Technology in Computer Science and Engineering The Assam Royal Global University Guwahati Assam Royal School of Information Technology The Assam Royal Global University Guwahati Assam Royal School of Engineering Technology The Assam Royal Global University Guwahati Assam
The rapid expansion of internet of Things (IoT) devices has significantly increased their vulnerability to cyber-attacks, with IoT botnets posing a critical threat by enabling distributed denial-of-service (DDoS) atta... 详细信息
来源: 评论
FedSimRep: A Federated Learning Method Based on Data Representation Selection  25
FedSimRep: A Federated Learning Method Based on Data Represe...
收藏 引用
Proceedings of the 2025 3rd international conference on Communication Networks and Machine Learning
作者: Falu Zhai Lu Wu Chunxiao Wang Tongyang Hao Shucang Zang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan Shandong China
As an emerging distributed technology, Federated learning enables model training while protecting privacy without sharing local data. However, the heterogeneity of geographic locations and devices leads to response de... 详细信息
来源: 评论
Deep Forest-Based Intrusion Detection System for Edge Intelligence Assisted Smart Homes  3rd
Deep Forest-Based Intrusion Detection System for Edge Intell...
收藏 引用
3rd international conference on computing, Communication and Learning, CoCoLe 2024
作者: Jakka, Aishwarya Rani, J. Vakala Budhathoki, Binay Swathi, Y. Jayanthi, M. University of Pittsburgh Pittsburgh United States CMR Institute of Technology Bengaluru India Lead Engineer Memoria Inc. Nepal Kathmandu India Gopalan College of Engineering Bengaluru India CMR University Bengaluru India
Edge computing has revolutionized distributed architectures, enabling workloads to be strategically positioned at the network’s edge, where data is generated and actions are initiated. This paradigm facilitates vario... 详细信息
来源: 评论
Identifying Application-Level distributed Denial-of-Service (DDoS) Attacks with Machine Learning (ML)  3rd
Identifying Application-Level Distributed Denial-of-Service ...
收藏 引用
3rd international conference on Advancements in Smart computing and Information Security, ASCIS 2024
作者: Yaqub, Muhammad Atif Mustafa, Muzzamil Chuhan, Saad Hussain Sattar, Basit Hasan, Muhammad Zulkifl Hussain, Muhammad Zunnurain Qaiser, Muhammad Saad Abdin, Zain ul Bilal, Afshan Ali, Jibran Department of Computer Science National College of Business Administration and Economics Lahore Pakistan Department of Artificial Intelligence University of Management and Technology Lahore Pakistan Faculty of IT and Computer Science University of Central Punjab Lahore Pakistan Department of Computer Science Bahria University Lahore Campus Lahore Pakistan Premier Systems Karachi Pakistan
The modern digital age has seen an exponential growth in internet penetration, which in turn has increased the probability of a denial-of-service attack. When an evil user launches a Denial of Service (DoS) attack, it... 详细信息
来源: 评论
Correlation Analysis of Tor Traffic Based on RAINBOW Scheme in Cloud computing Environment  3rd
Correlation Analysis of Tor Traffic Based on RAINBOW Schem...
收藏 引用
3rd international conference on Cyberspace Simulation and Evaluation, CSE 2024
作者: Xu, Haosheng Lu, Hui Peng, Jin Tian, Zhihong Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China Huangpu Research School of Guangzhou University Guangzhou510530 China
With the introduction and development of cloud computing technology, major internet companies gradually put their business services and huge amount of user data information in the cloud for processing and storage beca... 详细信息
来源: 评论
THE ARCHITECTURE OF AN INTELLIGENT VIRTUAL MATHEMATICAL SOFTWARE REPOSITORY SYSTEM
收藏 引用
MATHEMATICS AND COMPUTERS IN SIMULATION 1994年 第4-6期36卷 269-279页
作者: BOISVERT, RF Computing and Applied Mathematics Laboratory National Institute of Standards and Technology Gaithersburg MD 20899 USA
Much reusable software is available for solving routine mathematical and statistical problems. Unfortunately, locating this software is often quite difficult in current distributed computing environments. The Guide to... 详细信息
来源: 评论
Research on Information Security technology Based on Blockchain  3
Research on Information Security Technology Based on Blockch...
收藏 引用
3rd IEEE international conference on Cloud computing and Big Data Analysis (ICCCBDA)
作者: Liu, Liang Xu, Budong Shandong Normal Univ Jinan Shandong Peoples R China
Information security is the key to the development of modern internet technology. The distributed mechanism, decentralized mechanism, password mechanism and scripted mechanism of the Blockchain present a completely ne... 详细信息
来源: 评论
Towards a Load Balancing in a Three-level Cloud computing Network
Towards a Load Balancing in a Three-level Cloud Computing Ne...
收藏 引用
3rd IEEE international conference on Computer Science and Information technology (ICCSIT)
作者: Wang, Shu-Ching Yan, Kuo-Qin Liao, Wen-Pin Wang, Shun-Sheng Chaoyang Univ Technol Taichung Taiwan
Network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the internet. A new concept, cloud computing, uses low-power hosts to achieve high reliability. The cloud comp... 详细信息
来源: 评论
Fault Tolerant Consensus with Multiagent Systems for distributed Coordinated Control Algorithm in the Energy internet Network  3
Fault Tolerant Consensus with Multiagent Systems for Distrib...
收藏 引用
3rd international conference on Artificial Intelligence, Automation and Control Technologies (AIACT)
作者: Hsieh, Chung-Hung Chen, Yee Ming Yuan Ze Univ Tao Yuan Dept Ind Engn & Management Taoyuan Taiwan
The future power system can be considered as an aggregation of controllable distributed systems devices that coordinate with each other through the internet of Things (IoT), energy internet (EI) new paradigms arise. I... 详细信息
来源: 评论
An information divergence based approach to detect flooding DDoS attacks and Flash Crowds  3
An information divergence based approach to detect flooding ...
收藏 引用
3rd international conference on Applied and Theoretical computing and Communication technology (iCATccT)
作者: Kaur, Gursharanjeet Behal, Sunny Shifali SBS State Technical Campus Ferozepur Punjab India Ferozepur College of Engineering and Technology Ferozepur Punjab India
distributed Denial of Service (DDoS) attacks poses a severe threat to widely used internet-based services and applications. Currently, during in the technology era, the internet is the only real exigent that delivers ... 详细信息
来源: 评论