咨询与建议

限定检索结果

文献类型

  • 25,094 篇 会议
  • 288 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 25,400 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,701 篇 工学
    • 13,199 篇 计算机科学与技术...
    • 7,091 篇 软件工程
    • 5,277 篇 电气工程
    • 4,708 篇 信息与通信工程
    • 2,804 篇 控制科学与工程
    • 1,451 篇 机械工程
    • 1,367 篇 电子科学与技术(可...
    • 986 篇 动力工程及工程热...
    • 950 篇 安全科学与工程
    • 920 篇 生物工程
    • 885 篇 石油与天然气工程
    • 862 篇 仪器科学与技术
    • 837 篇 材料科学与工程(可...
    • 717 篇 交通运输工程
    • 691 篇 网络空间安全
    • 685 篇 环境科学与工程(可...
    • 588 篇 生物医学工程(可授...
    • 479 篇 土木工程
  • 4,834 篇 理学
    • 2,440 篇 数学
    • 1,097 篇 生物学
    • 995 篇 物理学
    • 756 篇 统计学(可授理学、...
    • 676 篇 系统科学
    • 493 篇 化学
  • 3,546 篇 管理学
    • 2,566 篇 管理科学与工程(可...
    • 1,132 篇 图书情报与档案管...
    • 1,037 篇 工商管理
  • 770 篇 法学
    • 491 篇 社会学
  • 671 篇 医学
    • 519 篇 临床医学
  • 488 篇 经济学
    • 482 篇 应用经济学
  • 335 篇 教育学
  • 213 篇 农学
  • 103 篇 军事学
  • 61 篇 文学
  • 33 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 1,144 篇 security
  • 601 篇 network security
  • 538 篇 internet of thin...
  • 391 篇 deep learning
  • 375 篇 neural networks
  • 291 篇 intrusion detect...
  • 259 篇 wireless sensor ...
  • 226 篇 authentication
  • 223 篇 reliability
  • 181 篇 big data
  • 179 篇 monitoring
  • 177 篇 accuracy
  • 172 篇 blockchain
  • 159 篇 data security
  • 159 篇 feature extracti...
  • 158 篇 computer archite...
  • 155 篇 wireless communi...
  • 153 篇 simulation
  • 151 篇 safety
  • 151 篇 network topology

机构

  • 49 篇 beijing key labo...
  • 43 篇 china electric p...
  • 37 篇 chitkara univers...
  • 24 篇 beijing univ pos...
  • 24 篇 china elect powe...
  • 23 篇 north china elec...
  • 21 篇 institute of inf...
  • 20 篇 tianjin universi...
  • 18 篇 chongqing univer...
  • 18 篇 university of el...
  • 17 篇 wuhan university...
  • 16 篇 maharishi school...
  • 16 篇 college of elect...
  • 15 篇 state key labora...
  • 15 篇 nari group corpo...
  • 14 篇 centre for inter...
  • 14 篇 state grid corpo...
  • 14 篇 uttaranchal inst...
  • 13 篇 chinese acad sci...
  • 13 篇 school of inform...

作者

  • 27 篇 wang lei
  • 27 篇 wang jing
  • 23 篇 liu yang
  • 19 篇 liu jun
  • 18 篇 zhang lei
  • 18 篇 li tao
  • 18 篇 yang yang
  • 17 篇 yang jun
  • 17 篇 li li
  • 17 篇 wang wei
  • 16 篇 li xin
  • 16 篇 wang ping
  • 15 篇 li yang
  • 15 篇 liu qi
  • 14 篇 zhang tao
  • 14 篇 chen bing
  • 14 篇 li zhen
  • 13 篇 wang kai
  • 13 篇 wang tao
  • 12 篇 lei wang

语言

  • 24,713 篇 英文
  • 582 篇 其他
  • 142 篇 中文
  • 3 篇 土耳其文
  • 2 篇 西班牙文
  • 1 篇 葡萄牙文
检索条件"任意字段=3rd International Conference on Network and System Security"
25400 条 记 录,以下是1-10 订阅
排序:
3rd international conference on network security and Blockchain Technology, ICNSBT 2024
3rd International Conference on Network Security and Blockch...
收藏 引用
3rd international conference on network security and Blockchain Technology, ICNSBT 2024
The proceedings contain 32 papers. The special focus in this conference is on network security and Blockchain Technology. The topics include: Exploring the Limits of Classical Random Number Generation and...
来源: 评论
Intrusion Detection system for IoT security  3rd
Intrusion Detection System for IoT Security
收藏 引用
3rd international conference on network security and Blockchain Technology
作者: Das, Sudeshna Majumder, Abhishek Tripura Univ Comp Sci & Engn Dept Agartala India
Our everyday lives are getting increasingly connected with the Internet of Things, which presents serious worries about potential cybersecurity threats and the need for trustworthy solutions. Deep learning-based intru... 详细信息
来源: 评论
Research on quantum security in public network push-to-talk over cellular systems  24
Research on quantum security in public network push-to-talk ...
收藏 引用
3rd international conference on Signal Processing, Computer networks and Communications, SPCNC 2024
作者: Guo, Chen Su, Mohan China Mobile Group Device Co. Ltd. Beijing China
Push-to-talk over cellular (PoC) is a multicast half-duplex type of communication. However, modern cryptography faces potential threats posed by quantum computers. The objective of this study is to construct a secure ... 详细信息
来源: 评论
DPU-Enhanced network security Situation Awareness Model for New Power systems  24
DPU-Enhanced Network Security Situation Awareness Model for ...
收藏 引用
3rd international conference on Algorithms, Data Mining, and Information Technology, ADMIT 2024
作者: Hao, Jiakai Li, Yuting Bai, Haoyang Dong, Xu Wang, Han Xiao, Yitao State Grid Beijing Electric Power Company Beijing China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
As the development of new power systems progresses, the edge side exhibits emerging challenges such as diversified new network services, rapid extensions of access and local networks, and a dramatic increase in the nu... 详细信息
来源: 评论
Using Attention Layers to Accurately Detect Malicious Traffic for Internet of Things networks  3
Using Attention Layers to Accurately Detect Malicious Traffi...
收藏 引用
3rd international conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, IITCEE 2025
作者: Raghunathan, S. Jacintha, Anitha Dsouza Swetha, C.V. Bengaluru India
The networks of the Internet of Things are subject to fraudulent traffic now that day by day, the devices deployed are on the rise. We put forward in this paper an attention-enhanced neural network architecture-based ... 详细信息
来源: 评论
Lattice-Based Authentication Scheme for Smart Agriculture system  3rd
Lattice-Based Authentication Scheme for Smart Agriculture Sy...
收藏 引用
3rd international conference on network security and Blockchain Technology
作者: Soni, Lacchita Chandra, Harish Gupta, Daya Sagar MMM Unive Technol Dept Math & Sci Comp Gorakhpur 273010 Uttar Pradesh India Indian Inst Technol Dept Math Patna 801106 Bihar India
The Internet of Things (IoT) has revolutionized agriculture by optimizing resource usage and enabling real-time field monitoring, but its widespread adoption brings security challenges. The protection of sensitive agr... 详细信息
来源: 评论
Research on network security Intrusion Detection Based on Devnet  24
Research on Network Security Intrusion Detection Based on De...
收藏 引用
3rd international conference on Signal Processing, Computer networks and Communications, SPCNC 2024
作者: Zheng, Hao Sun, Dongxu Han, Xiao Zhang, Xiaohua Zhao, Yan Co. Ltd. Hebei Shijiazhuang China Guodian Hefeng Wind Power Development Co. Ltd. Liaoning Shenyang China School of Artificial Intelligence and Data Science Hebei University of Technology Tianjin China
With the promotion of industrial 4.0 and intelligent manufacturing, the network security of industrial control system becomes particularly important. In the face of new network attacks, the traditional intrusion detec... 详细信息
来源: 评论
BHealth: A Blockchain-Based Platform for Healthcare Data  3rd
BHealth: A Blockchain-Based Platform for Healthcare Data
收藏 引用
3rd international conference on network security and Blockchain Technology
作者: Patel, Parva Maheshbhai, Patel Yash Kamble, Sumeet Rana, Bhagya Patil, Shriniwas Parmar, Keyur S V Natl Inst Technol Surat India
There is a well-known trilemma in the blockchain: "A block-chain system can only at most have two of the following three features: decentralization, scalability, and security." In this article, we propose a ... 详细信息
来源: 评论
Real-Time Threat Management using Deep Q-Learning and Mininet  3
Real-Time Threat Management using Deep Q-Learning and Minine...
收藏 引用
3rd international conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Sivakumar, Amrutha Bhavya Reddy, G. Bhanot, Shreya Rajagopal, Shinu M. Prashanth, B.N. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India Department of Mechanical Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Bengaluru India
The research combines Deep Q-Learning(DQN) with a Mininet-based network simulation and Scapy intrusions detection system (IDS) for malicious traffic prioritizing. The RL agent continuously learns to act based on real-... 详细信息
来源: 评论
Microservices-based peer-to-peer security transmission protocol tailored for DPU  24
Microservices-based peer-to-peer security transmission proto...
收藏 引用
3rd international conference on Algorithms, Data Mining, and Information Technology, ADMIT 2024
作者: Li, Yuting Hao, Jiakai Dong, Zheng Piao, Tiangao Bai, Haoyang Shen, Tongbo State Grid Beijing Electric Power Company Beijing China Beijing University of Posts and Telecommunications Beijing China
Due to the limitations of their hardware and software capabilities, traditional industrial devices often cannot support new security features, thus creating potential security vulnerabilities and often proving inadequ... 详细信息
来源: 评论