咨询与建议

限定检索结果

文献类型

  • 17,058 篇 会议
  • 732 册 图书
  • 72 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 17,863 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,581 篇 工学
    • 9,909 篇 计算机科学与技术...
    • 7,095 篇 软件工程
    • 4,197 篇 信息与通信工程
    • 1,613 篇 控制科学与工程
    • 1,605 篇 电气工程
    • 956 篇 生物工程
    • 955 篇 网络空间安全
    • 928 篇 电子科学与技术(可...
    • 848 篇 动力工程及工程热...
    • 696 篇 安全科学与工程
    • 613 篇 生物医学工程(可授...
    • 534 篇 机械工程
    • 420 篇 交通运输工程
    • 372 篇 仪器科学与技术
    • 364 篇 光学工程
  • 3,586 篇 理学
    • 1,837 篇 数学
    • 1,027 篇 生物学
    • 718 篇 物理学
    • 558 篇 统计学(可授理学、...
    • 429 篇 系统科学
    • 302 篇 化学
  • 2,669 篇 管理学
    • 1,858 篇 管理科学与工程(可...
    • 1,020 篇 图书情报与档案管...
    • 800 篇 工商管理
  • 957 篇 法学
    • 657 篇 社会学
    • 309 篇 法学
  • 791 篇 医学
    • 556 篇 临床医学
    • 538 篇 基础医学(可授医学...
    • 522 篇 公共卫生与预防医...
  • 349 篇 经济学
    • 345 篇 应用经济学
  • 195 篇 文学
  • 193 篇 农学
  • 144 篇 教育学
  • 84 篇 军事学
  • 7 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 1,372 篇 security
  • 873 篇 cloud computing
  • 669 篇 internet of thin...
  • 580 篇 authentication
  • 445 篇 computer communi...
  • 436 篇 wireless communi...
  • 394 篇 computational mo...
  • 377 篇 protocols
  • 354 篇 deep learning
  • 345 篇 5g mobile commun...
  • 331 篇 wireless sensor ...
  • 313 篇 cryptography
  • 307 篇 privacy
  • 297 篇 computer archite...
  • 273 篇 real-time system...
  • 254 篇 servers
  • 251 篇 artificial intel...
  • 248 篇 information syst...
  • 238 篇 scalability
  • 237 篇 machine learning

机构

  • 77 篇 chitkara univers...
  • 43 篇 department of co...
  • 38 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 university of ch...
  • 33 篇 karnataka bangal...
  • 28 篇 school of comput...
  • 27 篇 science and tech...
  • 24 篇 institute of inf...
  • 23 篇 school of comput...
  • 23 篇 shandong provinc...
  • 23 篇 university of el...
  • 22 篇 graphic era deem...
  • 22 篇 lovely professio...
  • 20 篇 chitkara centre ...
  • 20 篇 school of comput...
  • 20 篇 galgotias univer...
  • 19 篇 department of co...
  • 18 篇 school of cyber ...
  • 17 篇 pune

作者

  • 24 篇 wang wei
  • 19 篇 wang lei
  • 19 篇 kukreja vinay
  • 16 篇 zhang lei
  • 15 篇 shiva mehta
  • 15 篇 liu xin
  • 15 篇 yang yang
  • 13 篇 anjali t.
  • 13 篇 li yang
  • 13 篇 satvik vats
  • 12 篇 liu yang
  • 11 篇 jui c.c.h.
  • 11 篇 oshima a.
  • 11 篇 tsuda r.
  • 11 篇 jianying zhou
  • 11 篇 kim j.h.
  • 11 篇 bergman d.r.
  • 11 篇 allen m.
  • 11 篇 matsuyama t.
  • 11 篇 wong t.

语言

  • 14,214 篇 英文
  • 3,584 篇 其他
  • 176 篇 中文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
检索条件"任意字段=5th International Conference on Computing Science, Communication and Security"
17863 条 记 录,以下是4991-5000 订阅
排序:
26th international Symposium on Stabilization, Safety, and security of Distributed Systems, SSS 2024
26th International Symposium on Stabilization, Safety, and S...
收藏 引用
26th international Symposium on Stabilization, Safety, and security of Distributed Systems, SSS 2024
the proceedings contain 33 papers. the special focus in this conference is on Stabilization, Safety, and security of Distributed Systems. the topics include: Invited Paper: Gathering Oblivious Robots in the ...
来源: 评论
Does Volunteer Engagement Pay Off? An Analysis of User Participation in Online Citizen science Projects  1
收藏 引用
28th international conference on Collaboration Technologies and Social computing (CollabTech)
作者: Krukowski, Simon Amarasinghe, Ishari Felipe Gutierrez-Paez, Nicolas Hoppe, H. Ulrich RIAS Inst Duisburg Germany Univ Pompeu Fabra ICT Dept Barcelona Spain
An increasing number of Citizen science (CS) projects rely on digital technologies for data collection and processing as well as for the coordination and communication between participants. However, these projects rai... 详细信息
来源: 评论
Securing Smart Home IoT devices using Hyperledger Fabric
Securing Smart Home IoT devices using Hyperledger Fabric
收藏 引用
international conference on computing and Networking Technology (ICCNT)
作者: R Pranesh B Lalith Guptha K Aswinkumar B Pramoth K Abirami Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Coimbatore India
the rapid growth of Smart Home applications has broadened the scope for a wide range of security concerns. Blockchain technology, specifically Hyperledger Fabric, offers a promising solution. the proposed model explor... 详细信息
来源: 评论
Exploring the Role of Wireless communications in Industry 4.0: Enhancing Automation, Efficiency, and Scalability
Exploring the Role of Wireless Communications in Industry 4....
收藏 引用
Distributed computing and Electrical Circuits and Electronics (ICDCECE), IEEE international conference on
作者: Dhanraj Vikas Katkar BMS Department Johnson Controls Mumbai India
the advancement of wireless communications has catalyzed a paradigm shift in industrial environments, ushering in the era of Industry 4.0. this paper investigates the critical role wireless technologies play in suppor... 详细信息
来源: 评论
TensorTEE: Unifying Heterogeneous TEE Granularity for Efficient Secure Collaborative Tensor computing  24
TensorTEE: Unifying Heterogeneous TEE Granularity for Effici...
收藏 引用
29th ACM international conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2024
作者: Han, Husheng Zheng, Xinyao Wen, Yuanbo Hao, Yifan Feng, Erhu Liang, Ling Mu, Jianan Li, Xiaqing Ma, Tianyun Jin, Pengwei Song, Xinkai Du, Zidong Guo, Qi Hu, Xing SKLP Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Cambricon Technologies Beijing China Ipads Shanghai Jiao Tong University Shanghai China Peking University Beijing China University of Science and Technology of China Hefei China ZGC LAB Beijing China Shanghai Innovation Center for Processor Technologies SHIC Shanghai China Shanghai China
Heterogeneous collaborative computing with NPU and CPU has received widespread attention due to its substantial performance benefits. To ensure data confidentiality and integrity during computing, Trusted Execution En... 详细信息
来源: 评论
Semi-Supervised Federated Learning with non-IID Data: Algorithm and System Design  23
Semi-Supervised Federated Learning with non-IID Data: Algori...
收藏 引用
23rd IEEE international conference on High Performance computing and communications, 7th IEEE international conference on Data science and Systems, 19th IEEE international conference on Smart City and 7th IEEE international conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhang, Zhe Ma, Shiyao Nie, Jiangtian Wu, Yi Yan, Qiang Xu, Xiaoke Niyato, Dusit School of Data Science and Technology Heilongjiang University Harbin150080 China Cryptology and Network Security Laboratory of Heilongjiang University Harbin150080 China College of Information and Communication Engineering Dalian Minzu University China School of Computer Science and Engineering Nanyang Technological University Singapore WeBank Co. Ltd. China
Federated Learning (FL) allows edge devices (or clients) to keep data locally while simultaneously training a shared high-quality global model. However, current research is generally based on an assumption that the tr... 详细信息
来源: 评论
Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposal of a Novel Attack Strategy
Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposal...
收藏 引用
international conference on Contemporary computing and Informatics (IC3I)
作者: Hicham Amellal Salma El Hajjami Keshav Kaushik Gunjan Chhabra Suman Avdhesh Yadav Department of Computer Science Faculty of Science LabSIV Agadir Morocco School of Computer Sciences University of Petroleum and Energy Studies Dehradun Uttarakhand India Department of CSE Graphic Era Hill University Dehradun Uttarakhand India Department of Computer Science Amity School of Engineering and Technology Amity University Greater Noiida Uttar Pradesh India
Quantum Key Distribution (QKD) protocols theo- retically propose a high-security level based on the advantages of quantum computing. this paper analyze the security level of one of the most well-known QKD protocols, B...
来源: 评论
the Detection of Mirai Botnet Attack on the Internet of things (IoT) Device Using Support Vector Machine (SVM) Model  10
The Detection of Mirai Botnet Attack on the Internet of Thin...
收藏 引用
10th international conference on Information and communication Technology, ICoICT 2022
作者: Azhari, Revaldi Gilang Suryani, Vera Pahlevi, Rizka Reza Wardana, Aulia Arif School of Computing Telkom University Bandung Indonesia Doctoral School Information and Communication Technology Wroclaw University of Science and Technology Wroclaw Poland
there are various types of attacks on IoT devices, one of which is Mirai botnet that attacks a number of IoT devices such as web cameras, security cameras, and routers. Even it has caused internet downtime for the use... 详细信息
来源: 评论
Comparative security Analysis of Apple Pay and Google Wallet: Strengths, Weaknesses, and threats
Comparative Security Analysis of Apple Pay and Google Wallet...
收藏 引用
international conference on Radioelektronika
作者: Hosam Alamleh Sima Jafarikhah Baker Al Smadi Computer Science University of North Carolina Wilmington Wilmington North Carolina Computer Science Grambling State University Grambling Louisiana
Mobile payment platforms, such as Apple Pay and Google Wallet, have revolutionized financial transactions through Near Field communication (NFC), tokenization, and biometric authentication. Although both systems imple... 详细信息
来源: 评论
Deep Reinforcement Learning-Based Multi-Task Offloading Strategy in Mobile Edge computing
Deep Reinforcement Learning-Based Multi-Task Offloading Stra...
收藏 引用
Frontiers Technology of Information and Computer (ICFTIC), IEEE international conference on
作者: Yaxi Yang Chenwei Feng School ofOpto-electronic and Communication Engineering Xiamen University of Technology Xiamen China
In multi-vehicle road segments in telematics scenarios, individual vehicles often face limitations in processing many offloading tasks within a short timeframe. Mobile Edge computing is introduced to address this chal...
来源: 评论