咨询与建议

限定检索结果

文献类型

  • 25,085 篇 会议
  • 288 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 25,379 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,687 篇 工学
    • 13,175 篇 计算机科学与技术...
    • 7,081 篇 软件工程
    • 5,259 篇 电气工程
    • 4,668 篇 信息与通信工程
    • 2,782 篇 控制科学与工程
    • 1,449 篇 机械工程
    • 1,365 篇 电子科学与技术(可...
    • 983 篇 动力工程及工程热...
    • 953 篇 安全科学与工程
    • 921 篇 生物工程
    • 872 篇 石油与天然气工程
    • 862 篇 仪器科学与技术
    • 833 篇 材料科学与工程(可...
    • 718 篇 交通运输工程
    • 685 篇 环境科学与工程(可...
    • 667 篇 网络空间安全
    • 590 篇 生物医学工程(可授...
    • 479 篇 土木工程
  • 4,797 篇 理学
    • 2,401 篇 数学
    • 1,098 篇 生物学
    • 993 篇 物理学
    • 761 篇 统计学(可授理学、...
    • 677 篇 系统科学
    • 493 篇 化学
  • 3,537 篇 管理学
    • 2,575 篇 管理科学与工程(可...
    • 1,118 篇 图书情报与档案管...
    • 1,045 篇 工商管理
  • 774 篇 法学
    • 494 篇 社会学
  • 655 篇 医学
    • 522 篇 临床医学
  • 488 篇 经济学
    • 482 篇 应用经济学
  • 333 篇 教育学
  • 216 篇 农学
  • 103 篇 军事学
  • 61 篇 文学
  • 33 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 1,141 篇 security
  • 598 篇 network security
  • 537 篇 internet of thin...
  • 387 篇 deep learning
  • 374 篇 neural networks
  • 287 篇 intrusion detect...
  • 259 篇 wireless sensor ...
  • 226 篇 authentication
  • 224 篇 reliability
  • 181 篇 big data
  • 181 篇 monitoring
  • 177 篇 accuracy
  • 169 篇 blockchain
  • 159 篇 feature extracti...
  • 158 篇 data security
  • 158 篇 computer archite...
  • 156 篇 wireless communi...
  • 154 篇 simulation
  • 152 篇 safety
  • 151 篇 network topology

机构

  • 49 篇 beijing key labo...
  • 43 篇 china electric p...
  • 37 篇 chitkara univers...
  • 24 篇 beijing univ pos...
  • 24 篇 china elect powe...
  • 23 篇 north china elec...
  • 21 篇 institute of inf...
  • 20 篇 tianjin universi...
  • 18 篇 chongqing univer...
  • 18 篇 university of el...
  • 17 篇 wuhan university...
  • 16 篇 maharishi school...
  • 16 篇 college of elect...
  • 15 篇 state key labora...
  • 15 篇 nari group corpo...
  • 14 篇 centre for inter...
  • 14 篇 state grid corpo...
  • 14 篇 uttaranchal inst...
  • 13 篇 chinese acad sci...
  • 13 篇 school of inform...

作者

  • 27 篇 wang lei
  • 27 篇 wang jing
  • 23 篇 liu yang
  • 19 篇 liu jun
  • 18 篇 zhang lei
  • 18 篇 li tao
  • 18 篇 yang yang
  • 17 篇 yang jun
  • 17 篇 li li
  • 17 篇 wang wei
  • 16 篇 li xin
  • 16 篇 wang ping
  • 15 篇 li yang
  • 15 篇 liu qi
  • 14 篇 zhang tao
  • 14 篇 chen bing
  • 14 篇 li zhen
  • 13 篇 wang kai
  • 13 篇 wang tao
  • 12 篇 lei wang

语言

  • 24,729 篇 英文
  • 545 篇 其他
  • 165 篇 中文
  • 3 篇 土耳其文
  • 2 篇 西班牙文
  • 1 篇 葡萄牙文
检索条件"任意字段=3rd International Conference on Network and System Security"
25379 条 记 录,以下是1-10 订阅
排序:
3rd international conference on network security and Blockchain Technology, ICNSBT 2024
3rd International Conference on Network Security and Blockch...
收藏 引用
3rd international conference on network security and Blockchain Technology, ICNSBT 2024
The proceedings contain 32 papers. The special focus in this conference is on network security and Blockchain Technology. The topics include: Exploring the Limits of Classical Random Number Generation and...
来源: 评论
Proceedings of 2024 3rd international conference on Cryptography, network security and Communication Technology, CNSCT 2024
Proceedings of 2024 3rd International Conference on Cryptogr...
收藏 引用
3rd international conference on Cryptography, network security and Communication Technology, CNSCT 2024
The proceedings contain 110 papers. The topics discussed include: experimental design of Intranet penetration for anti-virus traffic characterization;software-define cloud-edge collaborative defense architecture again...
来源: 评论
ICNSER 2022 - 3rd international conference on Industrial Control network and system Engineering Research
ICNSER 2022 - 3rd International Conference on Industrial Con...
收藏 引用
3rd international conference on Industrial Control network and system Engineering Research, ICNSER 2022
The proceedings contain 17 papers. The topics discussed include: on the equilibrium points for a discrete system of two fractional-type difference equations;predication of 400kA aluminum electrolytic cell output based...
来源: 评论
3rd international conference on Machine Learning, Image Processing, network security and Data Sciences, MIND 2021
3rd International Conference on Machine Learning, Image Proc...
收藏 引用
3rd international conference on Machine Learning, Image Processing, network security and Data Sciences, MIND 2021
The proceedings contain 68 papers. The special focus in this conference is on Machine Learning, Image Processing, network security and Data Sciences. The topics include: Analyzing Wearable Data for Diagnosing COVID-19...
来源: 评论
Evaluation and Prediction of Power Information network security Situation Based on Data Fusion  24
Evaluation and Prediction of Power Information Network Secur...
收藏 引用
3rd international conference on Cryptography, network security and Communication Technology (CNSCT)
作者: Zhang, Xiaolu Cui, Lei Shen, Wuqiang Guangdong Power Grid Co Ltd Informat Ctr Guangzhou 510030 Guangdong Peoples R China
In contemporary society, our everyday routines and industrial output are intricately linked to the availability of essential energy resources. Thus, ensuring the sustained and secure functioning of the power system is... 详细信息
来源: 评论
Analysis of the Construction of Enterprise Financial Performance Appraisal system Based on Fuzzy Neural network  24
Analysis of the Construction of Enterprise Financial Perform...
收藏 引用
3rd international conference on Cryptography, network security and Communication Technology (CNSCT)
作者: Bai, Huimin Shanghai Univ Shanghai Peoples R China
This paper introduces a corporate financial performance evaluation system based on fuzzy neural networks. After presenting the fundamental theories of neural networks, it provides a detailed description of the constru... 详细信息
来源: 评论
BONPR: A network Protocol Recognizer for Bitstream  24
BONPR: A Network Protocol Recognizer for Bitstream
收藏 引用
3rd international conference on Cryptography, network security and Communication Technology (CNSCT)
作者: Han, Xiangqian Qingdao Jimo Dist human resources & Social Secur Qingdao Peoples R China
with the development of network technology, the number of network applications increases rapidly, public network protocols and private network protocols are booming, which puts forward higher requirements for the iden... 详细信息
来源: 评论
Research on the Optimization Strategy of Command and Control system Based on Complex network Theory  24
Research on the Optimization Strategy of Command and Control...
收藏 引用
3rd international conference on Cyber security, Artificial Intelligence and Digital Economy (CSAIDE)
作者: Li, Tengda Wang, Gang Du, Chong Fu, Qiang Liu, Xiangyu Air Force Engn Univ Air & Missile Def Coll Xian 710051 Shaanxi Peoples R China
To deeply analyze the characterization and destruction resistance of the command and control (C2) system, based on the complex network theory, a model of the C2 system is established. The network model of the C2 syste... 详细信息
来源: 评论
Design of network security protection network architecture for intelligent networked vehicles  24
Design of network security protection network architecture f...
收藏 引用
3rd international conference on Cyber security, Artificial Intelligence and Digital Economy (CSAIDE)
作者: Gao, Xiaoping Pan, Yue Li, Jinjin Ji, Tao Yuan, Yin Liu, Zhengnan Anhui Inst Informat Engn Wuhu 241199 Anhui Peoples R China
The network architecture design scheme of network security protection for intelligent connected vehicles is based on the functional performance and implementation scheme of each functional domain of the vehicle. The k... 详细信息
来源: 评论
Research on Computer network security Technology Based on CNN Algorithm  24
Research on Computer Network Security Technology Based on CN...
收藏 引用
3rd international conference on Cryptography, network security and Communication Technology (CNSCT)
作者: Wei, Zhang Lanzhou Resources & Environm Vocat & Tech Univ Lanzhou Gansu Peoples R China
Computer network security is an important issue faced in today's Internet era, and traditional security techniques can no longer meet the complex and changing network attacks and threats. In this paper, based on t... 详细信息
来源: 评论