咨询与建议

限定检索结果

文献类型

  • 16,755 篇 会议
  • 710 册 图书
  • 69 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 17,535 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,392 篇 工学
    • 9,751 篇 计算机科学与技术...
    • 7,046 篇 软件工程
    • 4,070 篇 信息与通信工程
    • 1,520 篇 电气工程
    • 1,504 篇 控制科学与工程
    • 948 篇 生物工程
    • 906 篇 电子科学与技术(可...
    • 874 篇 网络空间安全
    • 791 篇 动力工程及工程热...
    • 671 篇 安全科学与工程
    • 604 篇 生物医学工程(可授...
    • 509 篇 机械工程
    • 397 篇 交通运输工程
    • 359 篇 光学工程
    • 358 篇 仪器科学与技术
  • 3,527 篇 理学
    • 1,813 篇 数学
    • 1,024 篇 生物学
    • 697 篇 物理学
    • 550 篇 统计学(可授理学、...
    • 428 篇 系统科学
    • 287 篇 化学
  • 2,577 篇 管理学
    • 1,782 篇 管理科学与工程(可...
    • 983 篇 图书情报与档案管...
    • 793 篇 工商管理
  • 912 篇 法学
    • 616 篇 社会学
    • 305 篇 法学
  • 775 篇 医学
    • 550 篇 临床医学
    • 532 篇 基础医学(可授医学...
    • 507 篇 公共卫生与预防医...
  • 307 篇 经济学
    • 303 篇 应用经济学
  • 195 篇 文学
  • 193 篇 农学
  • 141 篇 教育学
  • 82 篇 军事学
  • 7 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 1,336 篇 security
  • 856 篇 cloud computing
  • 655 篇 internet of thin...
  • 568 篇 authentication
  • 435 篇 computer communi...
  • 431 篇 wireless communi...
  • 386 篇 computational mo...
  • 375 篇 protocols
  • 348 篇 wireless sensor ...
  • 330 篇 5g mobile commun...
  • 329 篇 deep learning
  • 299 篇 cryptography
  • 297 篇 privacy
  • 289 篇 computer archite...
  • 254 篇 servers
  • 248 篇 information syst...
  • 248 篇 real-time system...
  • 233 篇 artificial intel...
  • 232 篇 machine learning
  • 227 篇 scalability

机构

  • 76 篇 chitkara univers...
  • 45 篇 department of co...
  • 39 篇 department of co...
  • 36 篇 university of ch...
  • 35 篇 school of cyber ...
  • 33 篇 karnataka bangal...
  • 29 篇 institute of inf...
  • 28 篇 school of comput...
  • 27 篇 science and tech...
  • 23 篇 school of comput...
  • 23 篇 shandong provinc...
  • 22 篇 graphic era deem...
  • 22 篇 lovely professio...
  • 22 篇 university of el...
  • 20 篇 chitkara centre ...
  • 20 篇 school of comput...
  • 20 篇 galgotias univer...
  • 17 篇 department of co...
  • 17 篇 pune
  • 16 篇 school of inform...

作者

  • 19 篇 wang lei
  • 19 篇 kukreja vinay
  • 19 篇 wang wei
  • 16 篇 zhang lei
  • 16 篇 yang yang
  • 15 篇 shiva mehta
  • 15 篇 liu xin
  • 13 篇 anjali t.
  • 13 篇 li yang
  • 13 篇 satvik vats
  • 13 篇 zhang yan
  • 12 篇 liu yang
  • 11 篇 jui c.c.h.
  • 11 篇 oshima a.
  • 11 篇 tsuda r.
  • 11 篇 jianying zhou
  • 11 篇 kim j.h.
  • 11 篇 bergman d.r.
  • 11 篇 allen m.
  • 11 篇 matsuyama t.

语言

  • 16,813 篇 英文
  • 657 篇 其他
  • 110 篇 中文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
检索条件"任意字段=5th International Conference on Computing Science, Communication and Security"
17535 条 记 录,以下是1-10 订阅
排序:
5th international conference on computing science, communication and security, COMS2 2024
5th International Conference on Computing Science, Communica...
收藏 引用
5th international conference on computing science, communication and security, COMS2 2024
the proceedings contain 31 papers. the special focus in this conference is on computing science, communication and security. the topics include: Osmotic computing-Based Task Offloading: A Fuzzy Logic-Based Approach;Tr...
来源: 评论
Performance Analysis of IoT Network over 5G communication  5th
Performance Analysis of IoT Network over 5G Communication
收藏 引用
5th international conference on computing science, communication and security
作者: Sanvika, V. Singh, Indrasen Chandra, Madala Poorna Reddy, Joshith Vellore Inst Technol Sch Elect Engn Vellore 632014 Tamil Nadu India
With faster connection speeds, the new age of digital reality is facilitated by faster network technology. the result is a modern technology called the Internet of things (IoT) that requires extensive internet connect... 详细信息
来源: 评论
A Comprehensive Review of Soft computing Enabled Techniques for IoT security: State-of-the-Art and Challenges Ahead  5th
A Comprehensive Review of Soft Computing Enabled Techniques ...
收藏 引用
5th international conference on Data science, Machine Learning and Applications
作者: Parabrahmachari, Sriram Narayanasamy, Srinivasan Sathyabama Inst Sci & Technol Dept Comp Sci & Engn Chennai 600119 Tamil Nadu India Rajalakshmi Engn Coll Dept Comp Sci & Engn Chennai 600119 Tamil Nadu India
In the past ten years, the Internet of things (IoT) has become a massive force in our daily lives, providing countless smart services that have improved human existence. Nevertheless, the increased availability and ra... 详细信息
来源: 评论
Catalan's Conjecture and Elliptic Curve Cryptography (CCECC) Algorithm for Enhancing Data security During Data Transmission in MANET  5th
Catalan's Conjecture and Elliptic Curve Cryptography (CCECC)...
收藏 引用
5th international conference on computing science, communication and security
作者: Pauline, D. Eben Angel Womens Christian Coll Chennai India
security plays a major role in the processes of secured storage and secured data transmission in MANET due to the huge volume of users and their data. Moreover, MANET provides distributed services to their clients and... 详细信息
来源: 评论
Detection and Prevention of Black Hole Attack and Sybil Attack in Vehicular Ad Hoc Networks  5th
Detection and Prevention of Black Hole Attack and Sybil Atta...
收藏 引用
5th international conference on computing science, communication and security
作者: Yadav, Dhananjay Chaubey, Nirbhay Kumar Gujarat Technol Univ Ahmadabad India Ganpat Univ Mehsana Gujarat India
Intelligent Transportation Systems can play a valuable role in providing traffic control, road safety, and communications among vehicles. Vehicular Ad Hoc Network (VANET) is a network useful for providing communicatio... 详细信息
来源: 评论
Cloud Load Balancing through the Cloud Armor in HTTP Load Balancer  5th
Cloud Load Balancing Through the Cloud Armor in HTTP Load Ba...
收藏 引用
5th international conference on Data science, Machine Learning and Applications
作者: Prashanth, Mallellu Sai Karnati, Ramesh Velpuru, Muni Sekhar Reddy, H. Venkateshwara Vardhaman Coll Engn Dept Comp Sci & Engn Hyderabad India Vardhaman Coll Engn Dept Informat Technol Hyderabad India
the combination of an HTTP Load Balancer and Cloud Armor in cloud computing environments provides a robust solution for ensuring high availability and security for web applications. An HTTP Load Balancer distributes i... 详细信息
来源: 评论
Osmotic computing-Based Task Offloading: A Fuzzy Logic-Based Approach  5th
Osmotic Computing-Based Task Offloading: A Fuzzy Logic-Based...
收藏 引用
5th international conference on computing science, communication and security
作者: Neha, Benazir Panda, Sanjaya Kumar Sahu, Pradip Kumar Veer Surendra Sai Univ Technol Burla Odisha India Natl Inst Technol Warangal Telangana India
the swift expansion of the information technology (IT) industry has led to a surge in compute-intensive and latency-sensitive applications. While cloud computing can satiate the demands of such applications, its centr... 详细信息
来源: 评论
Design of Performance Enhanced Approximate Multiplier for Image Processing Applications  5th
Design of Performance Enhanced Approximate Multiplier for Im...
收藏 引用
5th international conference on computing science, communication and security
作者: Sivanandam, K. Sathana, R. M Kumarasamy Coll Engn Dept Elect & Commun Engn Karur Tamil Nadu India
Precise is most appropriate in scenarios where errors are hard to make, such processing mixed material and signs. Loose registering produces noticeable and quicker results with less power usage, especially for arithme... 详细信息
来源: 评论
Convergence of Blockchain and Iot  5th
Convergence of Blockchain and Iot
收藏 引用
5th international conference on Data science, Machine Learning and Applications
作者: Gopichand, G. Aleti, Rajashekar Tarini, Ranjana R. Tallam, Rahul Yenigandla, Venislaus Ashish Vellore Inst Technol Vellore Tamil Nadu India
A network of commonplace physical things with electronic parts, such as sensors, processors, and wireless communication modules is referred to as the "Internet of things" (IoT). they can communicate with one... 详细信息
来源: 评论
Technical Concepts on Cloud security and Privacy Using Deep Learning Techniques and Hybridized Encryption  5th
Technical Concepts on Cloud Security and Privacy Using Deep ...
收藏 引用
5th international conference on Data science, Machine Learning and Applications
作者: Rajchandar, K. Madanan, Mukesh Sastry, R. V. L. S. N. Saxena, Monika SR Univ Sch CS & AI Warangal Telangana India Dhofar Univ Dept Comp Sci Salalah Oman GIET Univ Sch Comp Sci & Engn Gunupur Orisha India Banasthali Vidyapith Dept Comp Sci Banasthali India
the current research questions that are raising concern security in cloud computing. Cloud storage is replacing traditional data storage in numerous companies because it provides instant knowledge of data from any loc... 详细信息
来源: 评论