咨询与建议

限定检索结果

文献类型

  • 302 篇 会议
  • 2 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 305 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 190 篇 工学
    • 177 篇 计算机科学与技术...
    • 140 篇 软件工程
    • 35 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 24 篇 电气工程
    • 22 篇 生物工程
    • 15 篇 安全科学与工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 交通运输工程
    • 7 篇 化学工程与技术
    • 7 篇 网络空间安全
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 5 篇 建筑学
  • 63 篇 理学
    • 33 篇 数学
    • 24 篇 生物学
    • 17 篇 统计学(可授理学、...
    • 7 篇 化学
    • 7 篇 系统科学
    • 6 篇 物理学
  • 36 篇 管理学
    • 23 篇 管理科学与工程(可...
    • 15 篇 工商管理
    • 15 篇 图书情报与档案管...
  • 35 篇 法学
    • 26 篇 社会学
    • 10 篇 法学
  • 8 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
    • 6 篇 公共卫生与预防医...
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 4 篇 教育学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 17 篇 cybersecurity
  • 14 篇 network security
  • 13 篇 internet of thin...
  • 10 篇 social networkin...
  • 9 篇 machine learning
  • 9 篇 security
  • 8 篇 deep learning
  • 6 篇 cyber security
  • 6 篇 cyber physical s...
  • 5 篇 computer crime
  • 5 篇 risk management
  • 5 篇 market research
  • 4 篇 cyber attacks
  • 4 篇 support vector m...
  • 4 篇 automation
  • 4 篇 computer securit...
  • 4 篇 authentication
  • 4 篇 malware
  • 4 篇 artificial intel...
  • 4 篇 accuracy

机构

  • 9 篇 school of cyber ...
  • 5 篇 school of cyber ...
  • 4 篇 china electric p...
  • 4 篇 tifac-core in cy...
  • 4 篇 institute of fun...
  • 4 篇 faculty of infor...
  • 3 篇 state grid labor...
  • 3 篇 state key labora...
  • 3 篇 computer archite...
  • 3 篇 school of comput...
  • 3 篇 univ glasgow sch...
  • 3 篇 department of co...
  • 3 篇 china industrial...
  • 3 篇 qingpu power sup...
  • 2 篇 state key labora...
  • 2 篇 muroran institut...
  • 2 篇 graphic era deem...
  • 2 篇 state grid hunan...
  • 2 篇 the mitre corpor...
  • 2 篇 hunan key labora...

作者

  • 4 篇 yang pei
  • 4 篇 rajawat anand si...
  • 4 篇 goyal s.b.
  • 4 篇 peng lin
  • 3 篇 lakshmy k.v.
  • 3 篇 qiao junfeng
  • 3 篇 zhou aihua
  • 3 篇 amritha p.p.
  • 3 篇 solanki ram kuma...
  • 3 篇 english rosanne
  • 3 篇 pan sen
  • 3 篇 maguire joseph
  • 2 篇 wazzeh mohamad
  • 2 篇 ding wei
  • 2 篇 ouertani aymen
  • 2 篇 wei ding
  • 2 篇 wijesinghe w.a.s...
  • 2 篇 huang chenhong
  • 2 篇 vinoshan t.
  • 2 篇 jathushan v.

语言

  • 279 篇 英文
  • 26 篇 其他
检索条件"任意字段=7th Cyber Security in Networking Conference, CSNet 2023"
305 条 记 录,以下是1-10 订阅
排序:
2023 7th cyber security in networking conference, csnet 2023
2023 7th Cyber Security in Networking Conference, CSNet 2023
收藏 引用
7th cyber security in networking conference, csnet 2023
the proceedings contain 40 papers. the topics discussed include: adaptive, multi-factor authentication as a service for web applications;a benchmark of graph augmentations for contrastive learning-based network attack...
来源: 评论
Program 2023 7th cyber security in networking conference (csnet)
Program 2023 7th Cyber Security in Networking Conference (CS...
收藏 引用
cyber security in networking conference (csnet)
来源: 评论
Mirage: cyber Deception against Autonomous cyber Attacks  7
Mirage: Cyber Deception against Autonomous Cyber Attacks
收藏 引用
7th cyber security in networking conference, csnet 2023
作者: Kouremetis, Michael Alford, Ron Lawrence, Dean The Mitre Corporation
As the capabilities of cyber adversaries continue to evolve, now in parallel to the explosion of maturing and publicly-available artificial intelligence (AI) technologies, cyber defenders may reasonably wonder when cy... 详细信息
来源: 评论
MCM-CASR: Novel Alert Correlation Framework for cyber Attack Scenario Reconstruction Based on NLP, NER, and Semantic Similarity  7
MCM-CASR: Novel Alert Correlation Framework for Cyber Attack...
收藏 引用
7th cyber security in networking conference, csnet 2023
作者: Diakhame, Mouhamadou Lamine Diallo, Cherif Mejri, Mohamed Gaston Berger University Lacca Lab Saint Louis Senegal Université Laval QuébecG1V 0A6 Canada
cyber attack scenario reconstruction plays a crucial role in understanding and mitigating security breaches. In this paper, we propose a novel framework that leverages Natural Language Processing (NLP), specifically N... 详细信息
来源: 评论
An Efficient Intrusion Detection Framework in Software-Defined networking for cyber security Applications  5th
An Efficient Intrusion Detection Framework in Software-Defin...
收藏 引用
5th International conference on Soft Computing and Signal Processing, ICSCSP 2022
作者: Sandhya Vani, Meruva Durga Devi, Rajupudi Mandru, Deena Babu Department of Information Technology Malla Reddy Engineering College Hyderabad500100 India
the board of directors and mixed media mining strategies are excited about further research and development of the organization's traffic processes. Relying on a unified, programmable controller, security has rece... 详细信息
来源: 评论
Smart Home IoT Communication Protocols and Advances in their security and Interoperability  7
Smart Home IoT Communication Protocols and Advances in their...
收藏 引用
7th cyber security in networking conference, csnet 2023
作者: Holguin, Ismael Errapotu, Sai Mounika University of Texas at El Paso Department of Electrical and Computer Engineering El PasoTX79968 United States
Advances in sensor and communication technologies have transformed traditional homes into smart homes, equipped with sensors and actuators for various functionalities like smart lighting, temperature control, irrigati... 详细信息
来源: 评论
security-Oriented Network Intent Placement using Particle Swarm Optimization  7
Security-Oriented Network Intent Placement using Particle Sw...
收藏 引用
7th cyber security in networking conference, csnet 2023
作者: Landeau, Gabriel Avgeris, Marios Leivadeas, Aris Lambadaris, Ioannis Department of Software and It Engineering Montréal Canada Carleton University Department of Systems and Computer Engineering Ottawa Canada
As the network infrastructure grows, its configuration and service provisioning become a tedious process. Accordingly, new paradigms have emerged, such as the Intent-Based networking (IBN), that envision the automatio... 详细信息
来源: 评论
Graph-Based Attack Path Discovery for Network security  7
Graph-Based Attack Path Discovery for Network Security
收藏 引用
7th cyber security in networking conference, csnet 2023
作者: Meng, Qiaoran Wang, Huilin Oo, Nay Lim, Hoon Wei Johannes Schatz, Benedikt Sikdar, Biplab National University of Singapore Singapore Singapore Ncs Cyber Special Ops-R&D Singapore Singapore
Enterprise network systems are confronted with an escalating threat landscape, requiring timely and effective attack detection and mitigation of the risk of potential financial losses and system damages. However, exis... 详细信息
来源: 评论
Adversarial security and Differential Privacy in mmWave Beam Prediction in 6G networks  7
Adversarial Security and Differential Privacy in mmWave Beam...
收藏 引用
7th cyber security in networking conference, csnet 2023
作者: Krishna, Ghanta Sai Supriya, Kundrapu Singh, Sanskar Baidya, Sabur Iiit Naya Raipur Department of Computer Science India University of Louisville Department of Computer Science and Engineering KY United States
In the forthcoming era of 6G, the mmWave communication is envisioned to be used in dense user scenarios with high bandwidth requirements, that necessitate efficient and accurate beam prediction. Machine learning (ML) ... 详细信息
来源: 评论
An Efficient Explainable Artificial Intelligence (XAI)-based Framework for a Robust and Explainable IDS  8
An Efficient Explainable Artificial Intelligence (XAI)-based...
收藏 引用
8th cyber security in networking conference
作者: Nugraha, Beny Jnanashree, Abhishek Venkatesh Bauschert, thomas Tech Univ Chemnitz Chair Commun Networks Chemnitz Germany
Artificial Intelligence (AI)-based Intrusion Detection Systems (IDS) significantly advance network security by leveraging Machine Learning (ML) and Deep Learning (DL) for highly accurate and dynamic cyber threat detec... 详细信息
来源: 评论