咨询与建议

限定检索结果

文献类型

  • 234 篇 会议
  • 7 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 244 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 188 篇 工学
    • 161 篇 计算机科学与技术...
    • 108 篇 软件工程
    • 53 篇 控制科学与工程
    • 43 篇 信息与通信工程
    • 20 篇 电气工程
    • 17 篇 生物工程
    • 13 篇 机械工程
    • 13 篇 电子科学与技术(可...
    • 12 篇 安全科学与工程
    • 11 篇 生物医学工程(可授...
    • 9 篇 建筑学
    • 7 篇 动力工程及工程热...
    • 7 篇 土木工程
    • 4 篇 交通运输工程
    • 4 篇 网络空间安全
  • 55 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 50 篇 理学
    • 27 篇 数学
    • 20 篇 生物学
    • 11 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 6 篇 系统科学
  • 13 篇 法学
    • 10 篇 社会学
    • 3 篇 法学
  • 7 篇 医学
    • 7 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 6 篇 药学(可授医学、理...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 5 篇 农学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 军事学

主题

  • 16 篇 network security
  • 14 篇 security
  • 11 篇 informatics
  • 10 篇 computer securit...
  • 10 篇 authentication
  • 8 篇 information tech...
  • 8 篇 information secu...
  • 5 篇 internet of thin...
  • 5 篇 face detection
  • 5 篇 computational mo...
  • 5 篇 protocols
  • 5 篇 artificial intel...
  • 5 篇 intelligent syst...
  • 4 篇 intrusion detect...
  • 3 篇 scalability
  • 3 篇 data security
  • 3 篇 quantum computin...
  • 3 篇 big data
  • 3 篇 bandwidth
  • 3 篇 educational inst...

机构

  • 3 篇 moscow state uni...
  • 3 篇 beijing electron...
  • 3 篇 center for agro-...
  • 3 篇 don state techni...
  • 2 篇 jiangsu prov sup...
  • 2 篇 shandong institu...
  • 2 篇 cuny/ college of...
  • 2 篇 department of co...
  • 2 篇 institute of agr...
  • 2 篇 the national eng...
  • 2 篇 school of automa...
  • 2 篇 mapua university
  • 2 篇 natioal universi...
  • 2 篇 college of logis...
  • 2 篇 cuny college of ...
  • 2 篇 konstantin presl...
  • 2 篇 aviation securit...
  • 2 篇 wenzhou-kean uni...
  • 2 篇 a.k. choudhury s...
  • 2 篇 east china jiaot...

作者

  • 5 篇 agaian s.
  • 5 篇 voronin v.
  • 4 篇 zelensky a.
  • 3 篇 semenishchev e.
  • 3 篇 ahsan abdullah
  • 3 篇 wu jian
  • 2 篇 sundaram b. bara...
  • 2 篇 takano s
  • 2 篇 ketcham mahasak
  • 2 篇 du wencai
  • 2 篇 kalloniatis chri...
  • 2 篇 yuan huang
  • 2 篇 kordov krasimir
  • 2 篇 yang yang
  • 2 篇 pu zhang
  • 2 篇 s. takano
  • 2 篇 ogiela marek r.
  • 2 篇 zhang yan
  • 2 篇 karthika p.
  • 2 篇 chaki nabendu

语言

  • 244 篇 英文
检索条件"任意字段=3rd International Symposium on Intelligent Information Technology and Security Informatics"
244 条 记 录,以下是1-10 订阅
排序:
3rd international symposium on intelligent information technology and security informatics, IITSI 2010
3rd International Symposium on Intelligent Information Techn...
收藏 引用
2010 international symposium on intelligent information technology and security informatics, IITSI 2010
The proceedings contain 176 papers. The topics discussed include: a small world network based grid resource discovery mechanism;a quay crane assignment approach for berth allocation problem in container terminal;perfo...
来源: 评论
Data Privacy and security in Healthcare Systems Using Blockchain: A Review
Data Privacy and Security in Healthcare Systems Using Blockc...
收藏 引用
international symposium on Advanced Computing and Communication (ISACC)
作者: Bijit Barman Satyajit Sarmah Dept. of Information Technology Gauhati University Guwahati India
In healthcare, blockchain can enable secure and transparent management of electronic medical records (EMRs), enabling shared connectivity and data security across different representatives or stakeholders while preser... 详细信息
来源: 评论
A Review of Signature Schemes for Enhanced information Retrieval and Privacy in Blockchain Systems
A Review of Signature Schemes for Enhanced Information Retri...
收藏 引用
international symposium on Advanced Computing and Communication (ISACC)
作者: Mustak Sheikh Chandan Kalita Department of Information Technology Gauhati University Guwahati India
Blockchain technology has revolutionised data sharing and storage by offering decentralised, impenetrable solutions in a variety of fields. But because of its intrinsic transparency, there are serious privacy issues, ... 详细信息
来源: 评论
Generative Adversarial Networks for Synthetic Data Generation in Privacy-Preserving Health informatics
Generative Adversarial Networks for Synthetic Data Generatio...
收藏 引用
international symposium on Advanced Computing and Communication (ISACC)
作者: Vineet Kumar Hassan Safi Ahmed M. Shailaja B Karthikeyan Malik Bader Alazzam R Saravanakumar Symbiosis Centre for Management Studies Pune Symbiosis International (Deemed University) Pune Maharashtra India Department of Biomedical Engineering Al-Farahidi University Baghdad Iraq Department of DataScience MallaReddy University Hyderabad Telangana India Department of CSE KPR Institute of Engineering and Technology Coimbatore India Faculty of Information Technology Jadara University Irbid Jordan Department of ECE Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India
Privacy preserving health informatics deals with the problem of how to obtain informative analysis from the health-related information while ensuring that the privacy of individuals is protected. This paper presents t... 详细信息
来源: 评论
Low Resolution Deepfake Face Detection using Multi-Scale Discrete Cosine Transform and Vision Transformer
Low Resolution Deepfake Face Detection using Multi-Scale Dis...
收藏 引用
international symposium on Advanced Computing and Communication (ISACC)
作者: Main Uddin Zhangjie Fu Xiang Zhang Abu Bakor Hayat Arnob School of Computer Science Nanjing University of Information Science and Technology Nanjing China School of Artificial Intelligence Nanjing University of Information Science and Technology Nanjing China
Deepfake technology uses generative adversarial networks to produce highly authentic counterfeit images and videos, which raises a significant global security concern by disseminating fake information through online p... 详细信息
来源: 评论
A Proactive Approach for Securing VANETs Against Gray-Hole Attacks
A Proactive Approach for Securing VANETs Against Gray-Hole A...
收藏 引用
international symposium on Advanced Computing and Communication (ISACC)
作者: Arunkumar M Janaranjani M Pavithra K Dept of Information Technology IFET College of Engineering Villupuram TamilNadu
VANETs are embedded in roads to improve the safety attributes and efficiency of traffic movement due to real-time communication from vehicles to roadside infrastructures. However, VANET is very susceptible to security... 详细信息
来源: 评论
RSA Performance and Low Hamming Weight Small Prime Public Exponent
RSA Performance and Low Hamming Weight Small Prime Public Ex...
收藏 引用
international symposium on Advanced Computing and Communication (ISACC)
作者: Soram Ranbir Santosh Sharma Kongbrailatpam Haobijam Jina Devi Takhellambam Sonamani Naorem Natasha Sapam Jitu Manipur Institute of Technology Manipur University Imphal National Institute of Electronics and Information Technology TS Paul Manipur Women’s College Imphal
When it comes to cryptography, RSA is one of the most used algorithms. It is still cryptographically secure when signing data over the internet. A study carried out on 582 servers (including 253 financial servers) by ... 详细信息
来源: 评论
A Hybrid Framework for Secure Group Communication Using Quantum-Classical Cryptography and Reinforcement Learning
A Hybrid Framework for Secure Group Communication Using Quan...
收藏 引用
international symposium on Advanced Computing and Communication (ISACC)
作者: P.S Renisha Bhawana Rudra Department of Information Technology National Institute of Technology Surathkal Karnataka India
This research work describes a framework for secured and effective way of group interaction incorporating classical cryptography and quantum communication technique. This framework employs a classical cryptographic me... 详细信息
来源: 评论
Comprehensive security Analysis and Threat Mitigation Strategies for Software-Defined Networking (SDN) Environments
Comprehensive Security Analysis and Threat Mitigation Strate...
收藏 引用
international symposium on Advanced Computing and Communication (ISACC)
作者: Ajit Karki Raktim Deb School of Information Technology The ICFAI University Sikkim Gangtok India School of Science and Technology The ICFAI University Tripura Agartala India
Software Defined Networking (SDN) is a new networking standard that significantly reduces the complexity of network administration tasks. SDN is considered a networking breakthrough. Additionally, it provides a flexib... 详细信息
来源: 评论
Towards finding Hybrid Machine Learning Models for detection of IoT Botnets
Towards finding Hybrid Machine Learning Models for detection...
收藏 引用
international symposium on Advanced Computing and Communication (ISACC)
作者: Richy Laskar Rakesh Das Rahnak Laskar Samarjit Das Meghna Dasgupta Bachelor of Technology in Computer Science and Engineering The Assam Royal Global University Guwahati Assam Royal School of Information Technology The Assam Royal Global University Guwahati Assam Royal School of Engineering Technology The Assam Royal Global University Guwahati Assam
The rapid expansion of Internet of Things (IoT) devices has significantly increased their vulnerability to cyber-attacks, with IoT botnets posing a critical threat by enabling distributed denial-of-service (DDoS) atta... 详细信息
来源: 评论