咨询与建议

限定检索结果

文献类型

  • 4,461 篇 会议
  • 153 篇 期刊文献
  • 20 册 图书
  • 4 篇 学位论文

馆藏范围

  • 4,638 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,851 篇 工学
    • 2,046 篇 计算机科学与技术...
    • 1,103 篇 信息与通信工程
    • 910 篇 软件工程
    • 870 篇 电气工程
    • 610 篇 控制科学与工程
    • 181 篇 机械工程
    • 117 篇 电子科学与技术(可...
    • 116 篇 动力工程及工程热...
    • 102 篇 仪器科学与技术
    • 86 篇 交通运输工程
    • 62 篇 生物工程
    • 55 篇 航空宇航科学与技...
    • 48 篇 石油与天然气工程
    • 43 篇 安全科学与工程
    • 41 篇 生物医学工程(可授...
    • 37 篇 网络空间安全
    • 32 篇 材料科学与工程(可...
    • 32 篇 建筑学
  • 555 篇 理学
    • 264 篇 数学
    • 171 篇 物理学
    • 74 篇 系统科学
    • 72 篇 生物学
    • 62 篇 统计学(可授理学、...
  • 359 篇 管理学
    • 305 篇 管理科学与工程(可...
    • 107 篇 工商管理
    • 81 篇 图书情报与档案管...
  • 71 篇 医学
    • 62 篇 临床医学
  • 57 篇 法学
    • 30 篇 社会学
    • 27 篇 法学
  • 41 篇 经济学
    • 41 篇 应用经济学
  • 20 篇 教育学
  • 9 篇 文学
  • 7 篇 农学
  • 7 篇 军事学
  • 2 篇 艺术学

主题

  • 556 篇 internet
  • 475 篇 internet of thin...
  • 365 篇 control systems
  • 290 篇 ip networks
  • 287 篇 protocols
  • 282 篇 traffic control
  • 232 篇 telecommunicatio...
  • 221 篇 bandwidth
  • 206 篇 quality of servi...
  • 174 篇 throughput
  • 144 篇 routing
  • 135 篇 real-time system...
  • 128 篇 delay
  • 125 篇 network topology
  • 124 篇 web and internet...
  • 120 篇 performance eval...
  • 106 篇 computer archite...
  • 106 篇 performance anal...
  • 104 篇 network servers
  • 103 篇 communication sy...

机构

  • 9 篇 tsinghua univers...
  • 9 篇 northeastern uni...
  • 8 篇 sapienza univers...
  • 7 篇 chitkara univers...
  • 7 篇 univ naples fede...
  • 6 篇 univ napoli fede...
  • 6 篇 nanyang technol ...
  • 6 篇 china industrial...
  • 6 篇 department of co...
  • 5 篇 institute for th...
  • 5 篇 china electric p...
  • 5 篇 chinese acad sci...
  • 5 篇 univ massachuset...
  • 5 篇 univ naples fede...
  • 5 篇 department of in...
  • 5 篇 shanghai jiao to...
  • 5 篇 beijing jiaotong...
  • 5 篇 department of el...
  • 4 篇 institute for th...
  • 4 篇 inria

作者

  • 17 篇 melodia tommaso
  • 10 篇 polese michele
  • 9 篇 murata m
  • 9 篇 pescape antonio
  • 9 篇 obaidat mohammad...
  • 9 篇 tommaso melodia
  • 8 篇 d'oro salvatore
  • 7 篇 botta alessio
  • 6 篇 restuccia france...
  • 6 篇 huang chung-ming
  • 6 篇 basagni stefano
  • 6 篇 kim dong-seong
  • 6 篇 ventre giorgio
  • 5 篇 liu yang
  • 5 篇 kim jw
  • 5 篇 yang yang
  • 5 篇 michele polese
  • 5 篇 palmieri frances...
  • 5 篇 boukherouaa jama...
  • 5 篇 bonati leonardo

语言

  • 4,394 篇 英文
  • 210 篇 其他
  • 31 篇 中文
  • 2 篇 西班牙文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"任意字段=Conference on Internet Performance and Control of Network Systems II"
4638 条 记 录,以下是361-370 订阅
排序:
Research on IoT Device Fingerprint Recognition in Grid Power System Based on Few-Shot Learning  5
Research on IoT Device Fingerprint Recognition in Grid Power...
收藏 引用
2023 5th International conference on Artificial Intelligence and Computer Applications, ICAICA 2023
作者: Zhang, Liang Ge, Minhui Zou, Futai East Branch of State Grid Corporation of China Shanghai China Shanghai Jiao Tong University Shanghai China
IoT smart devices play a pivotal role in power grid systems, contributing to efficient monitoring and control. However, the diverse range of IoT device types and the scarcity of samples pose challenges for accurate de... 详细信息
来源: 评论
Ethernet Device Authentication via Physical Layer Fingerprinting
Ethernet Device Authentication via Physical Layer Fingerprin...
收藏 引用
IEEE SoutheastCon conference
作者: Suski, William Card, Christopher Few, Brian Appl Engn Concepts Inc Eldersburg MD 21784 USA
Device authentication is an important element of any strong defense-in-depth strategy for securing cyber-physical, industrial control, and other critical infrastructure systems. However, the current stable of solution... 详细信息
来源: 评论
Advanced Persistent Threats Detection based on Deep Learning Approach  6
Advanced Persistent Threats Detection based on Deep Learning...
收藏 引用
IEEE 6th International conference on Industrial Cyber-Physical systems (ICPS)
作者: Eke, Hope Nkiruka Petrovski, Andrei Robert Gordon Univ Sch Comp Aberdeen Scotland Natl Subsea Ctr Sch Comp Aberdeen Scotland
Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. APT is a sophisticated attack that masquerade their actions to navig... 详细信息
来源: 评论
Hierarchical Blockchain-based Resource Access control Architecture and Scheme for IoT Devices  96
Hierarchical Blockchain-based Resource Access Control Archit...
收藏 引用
IEEE 96th Vehicular Technology conference (VTC-Fall)
作者: Chai, Rong Jiang, Wenhang Yang, Xizheng Chongqing Univ Posts & Telecommun Sch Commun & Informat Engn Chongqing 400065 Peoples R China
Traditional access control schemes in internet of things (IoT) systems have long been faced with security problems such as single point of failure, data tampering and cross-domain access. In this paper, we study the a... 详细信息
来源: 评论
CP-ABE encryption over MQTT for an IoT system with Raspberry Pi  56
CP-ABE encryption over MQTT for an IoT system with Raspberry...
收藏 引用
56th Annual conference on Information Sciences and systems (CISS)
作者: Mendoza-Cardenas, Fredy Stiv Leon-Aguilar, Rai Luis Quiroz-Arroyo, Jose Univ Nacl Ingn Inst Nacl Invest & Capacitac Telecomunicac Lima Peru
Nowadays, the increasing number of devices deployed in IoT systems implementation and the requirement of preserving the integrity of data transported over the internet, demand the use of data encryption schemes. This ... 详细信息
来源: 评论
Power System Transient Stability Assessment Based on Graph Neural network with Interpretable Attribution Analysis  4
Power System Transient Stability Assessment Based on Graph N...
收藏 引用
4th International conference on Smart Power and internet Energy systems (SPIES)
作者: Gu, Sili Qiao, Ji Zhao, Zixuan Zhu, Qiongfeng Han, Fujia China Elect Power Res Inst Dept Artificial Intelligence Applicat Beijing Peoples R China
The power transient stability analysis is one of the basis for determining the control strategy of power system security and stability. Considering the influence of power grid topology on the transient stability of po... 详细信息
来源: 评论
Managing IoT Cyber-Security Using Programmable Telemetry and Machine Learning
Managing IoT Cyber-Security Using Programmable Telemetry and...
收藏 引用
2023 International conference on Artificial Intelligence and Smart Communication, AISC 2023
作者: Sutariya, Kamal Pramanik, Kundan Kumar Parul University Piet Department of Cse India Arka Jain University Department of Engg. & It India
internet of Things (IoT) devices that are purchased from a variety of suppliers & installed in significant amounts are subject to increasing cybersecurity vulnerabilities. Consequently, it has become more crucial ... 详细信息
来源: 评论
Secure internet-of-Things Communications: Joint Precoding and Power control
Secure Internet-of-Things Communications: Joint Precoding an...
收藏 引用
IEEE International conference on Communications (ICC)
作者: Oh, Mintaek Park, Jeonghun Choi, Jinseok Ulsan Natl Inst Sci & Technol Elect Engn Ulsan 44919 South Korea Kyungpook Natl Univ Coll IT Engn Daegu 41566 South Korea
In this paper, we consider a downlink internet-of-things (IoT) multiple-input multiple-output (MIMO) network wherein an access point (AP), multiple IoT users, and a single eavesdropper coexist. The eavesdropper attemp... 详细信息
来源: 评论
A Secure Deep Q-Reinforcement Learning Framework for network Intrusion Detection in IoT-Fog systems
A Secure Deep Q-Reinforcement Learning Framework for Network...
收藏 引用
2024 OPJU International Technology conference on Smart Computing for Innovation and Advancement in Industry 4.0, OTCON 2024
作者: Bebortta, Sujit Tripathy, Subhranshu Sekhar Sharma, Vandana Behera, Jnana Ranjan Nayak, Aishwarya Ravenshaw University Department of Computer Science Cuttack753003 India Kiit Deemed to Be University School of Computer Engineering Bhubaneswar751024 India Department of Computational Sciences Delhi NCR Campus India Kiit Deemed to Be University School of Electronics Bhubaneswar751024 India Driems University Department of Computer Sceince & Engineering Cuttack74022 India
IoT-Fog system security depends on intrusion detection system (IDS) since the growing number of internet-of-Things (IoT) devices has increased the attack surface for cyber threats. The dynamic nature of cyberattacks o... 详细信息
来源: 评论
Switching in the Rain: Predictive Wireless x-haul network Reconfiguration  23
Switching in the Rain: Predictive Wireless x-haul Network Re...
收藏 引用
2023 ACM SIGMETRICS International conference on Measurement and Modeling of Computer systems, SIGMETRICS 2023
作者: Kadota, Igor Jacoby, Dror Messer, Hagit Zussman, Gil Ostrometzky, Jonatan Columbia University New York United States Tel Aviv University Tel Aviv Israel
4G, 5G, and smart city networks often rely on microwave and millimeter-wave x-haul links. A major challenge associated with these high frequency links is their susceptibility to weather conditions. In particular, prec... 详细信息
来源: 评论