咨询与建议

限定检索结果

文献类型

  • 4,457 篇 会议
  • 154 篇 期刊文献
  • 20 册 图书
  • 6 篇 学位论文

馆藏范围

  • 4,637 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,851 篇 工学
    • 2,047 篇 计算机科学与技术...
    • 1,102 篇 信息与通信工程
    • 910 篇 软件工程
    • 871 篇 电气工程
    • 610 篇 控制科学与工程
    • 181 篇 机械工程
    • 117 篇 电子科学与技术(可...
    • 116 篇 动力工程及工程热...
    • 102 篇 仪器科学与技术
    • 86 篇 交通运输工程
    • 62 篇 生物工程
    • 55 篇 航空宇航科学与技...
    • 48 篇 石油与天然气工程
    • 43 篇 安全科学与工程
    • 41 篇 生物医学工程(可授...
    • 37 篇 网络空间安全
    • 32 篇 材料科学与工程(可...
    • 32 篇 建筑学
  • 556 篇 理学
    • 264 篇 数学
    • 171 篇 物理学
    • 74 篇 系统科学
    • 72 篇 生物学
    • 62 篇 统计学(可授理学、...
  • 359 篇 管理学
    • 305 篇 管理科学与工程(可...
    • 106 篇 工商管理
    • 81 篇 图书情报与档案管...
  • 72 篇 医学
    • 63 篇 临床医学
  • 57 篇 法学
    • 30 篇 社会学
    • 27 篇 法学
  • 41 篇 经济学
    • 41 篇 应用经济学
  • 20 篇 教育学
  • 9 篇 文学
  • 7 篇 农学
  • 7 篇 军事学
  • 2 篇 艺术学

主题

  • 553 篇 internet
  • 475 篇 internet of thin...
  • 364 篇 control systems
  • 289 篇 ip networks
  • 284 篇 protocols
  • 281 篇 traffic control
  • 232 篇 telecommunicatio...
  • 221 篇 bandwidth
  • 205 篇 quality of servi...
  • 173 篇 throughput
  • 142 篇 routing
  • 133 篇 real-time system...
  • 126 篇 delay
  • 125 篇 network topology
  • 123 篇 web and internet...
  • 120 篇 performance eval...
  • 106 篇 computer archite...
  • 106 篇 performance anal...
  • 103 篇 network servers
  • 103 篇 communication sy...

机构

  • 9 篇 tsinghua univers...
  • 9 篇 northeastern uni...
  • 8 篇 sapienza univers...
  • 7 篇 chitkara univers...
  • 7 篇 univ naples fede...
  • 6 篇 univ napoli fede...
  • 6 篇 nanyang technol ...
  • 6 篇 china industrial...
  • 6 篇 department of co...
  • 5 篇 institute for th...
  • 5 篇 china electric p...
  • 5 篇 chinese acad sci...
  • 5 篇 univ massachuset...
  • 5 篇 univ naples fede...
  • 5 篇 department of in...
  • 5 篇 shanghai jiao to...
  • 5 篇 beijing jiaotong...
  • 5 篇 department of el...
  • 4 篇 institute for th...
  • 4 篇 inria

作者

  • 17 篇 melodia tommaso
  • 10 篇 polese michele
  • 9 篇 murata m
  • 9 篇 pescape antonio
  • 9 篇 obaidat mohammad...
  • 9 篇 tommaso melodia
  • 8 篇 d'oro salvatore
  • 7 篇 botta alessio
  • 6 篇 restuccia france...
  • 6 篇 huang chung-ming
  • 6 篇 basagni stefano
  • 6 篇 kim dong-seong
  • 6 篇 ventre giorgio
  • 5 篇 liu yang
  • 5 篇 kim jw
  • 5 篇 yang yang
  • 5 篇 michele polese
  • 5 篇 palmieri frances...
  • 5 篇 boukherouaa jama...
  • 5 篇 bonati leonardo

语言

  • 4,515 篇 英文
  • 88 篇 其他
  • 30 篇 中文
  • 2 篇 西班牙文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"任意字段=Conference on Internet Performance and Control of Network Systems II"
4637 条 记 录,以下是81-90 订阅
排序:
Analyses of Automated Malicious internet Traffic Using Open-Source Honeypots
Analyses of Automated Malicious Internet Traffic Using Open-...
收藏 引用
IEEE SoutheastCon conference
作者: Bythwood, Willie, iiI Bentley, Justin Vakilinia, Iman Univ North Florida Sch Comp Jacksonville FL 32224 USA
Nowadays a big portion of internet traffic is generated from malicious botnets targeting various network protocols. To control such a malicious traffic, it is important to analyse attackers' techniques for exploit... 详细信息
来源: 评论
Q-Soft: QoS-Aware Traffic Forwarding in Software-Defined Cyber-Physical systems
收藏 引用
IEEE internet OF THINGS JOURNAL 2022年 第12期9卷 9675-9682页
作者: Bera, Samaresh Misra, Sudip Saha, Niloy Sharif, Hamid Indian Inst Technol Kharagpur Dept Comp Sci & Engn Kharagpur 721302 W Bengal India Indian Inst Sci Dept Elect Commun Engn Bengaluru 560012 India Univ Nebraska Dept Elect & Comp Engn Lincoln NE 68588 USA
The next-generation cyber-physical systems (CPSs) with heterogeneous applications have diverse Quality-of-Service (QoS) requirements in terms of throughput, end-to-end latency, and packet drop reliability. To meet suc... 详细信息
来源: 评论
Resource Allocation Optimization in Local and Wide Area networks through Social network Integration  24
Resource Allocation Optimization in Local and Wide Area Netw...
收藏 引用
25th International conference on Distributed Computing and networking, ICDCN 2024
作者: Shrivastava, Sangya Thakur, Rahul Indian Institute of Technology Roorkee Uttarakhand Roorkee India
Modern cellular systems must accommodate millions of mobile devices, placing significant demands on network capacity and performance. The predominant technologies for internet connectivity are Wireless Fidelity (Wi-Fi... 详细信息
来源: 评论
DDOSHIELD-IoT: A Testbed for Simulating and Lightweight Detection of IoT Botnet DDoS Attacks  54
DDOSHIELD-IoT: A Testbed for Simulating and Lightweight Dete...
收藏 引用
54th Annual IEEE/IFIP International conference on Dependable systems and networks (DSN)
作者: De Vivo, Simona Obaidat, Islam Dai, Dong Liguori, Pietro Univ Naples Federico II Naples Italy Univ North Carolina Charlotte Charlotte NC USA
In the rapidly expanding realm of the internet of Things (IoT), the escalation of sophisticated cyber threats, particularly botnet Distributed Denial of Service (DDoS) attacks, highlights the importance of Intrusion D... 详细信息
来源: 评论
An Interface Development based on internet of Things Approach for Smart Predictive Maintenance implementation: Case of Diesel Engine
An Interface Development based on Internet of Things Approac...
收藏 引用
2024 International conference on Circuit, systems and Communication, ICCSC 2024
作者: Mounir, El Khiate Hassan, Samri Zineb, Znaidi Enset Mohammedia University Hassan Ii Laboratory M2S2I Casablanca Morocco
The effective functioning of diesel engines plays a crucial role in various industries, powering transportation, generators, and machinery. The emergence of smart maintenance strategies, combined with IOT (internet Of... 详细信息
来源: 评论
Method for Evaluating the Multi-factor Decision-Making Efficiency Based on Dynamic Bayesian network  20th
Method for Evaluating the Multi-factor Decision-Making Effic...
收藏 引用
20th Chinese Intelligent systems conference
作者: Zhang, Wen-Bo Yang, Jun-Feng Tong, Jia-Hui Li, Yue Beijing Electromech Engn Inst Natiomal Key Lab Complex Syst Control & Intellige Beijing Peoples R China
This research focuses on the problem of evaluating the effectiveness of equipment decision-making in uncertain multi-factors where multiple factors affect the decision-making process. To address this issue, the study ... 详细信息
来源: 评论
Impact of Sinkhole Attacks on IoT network Efficiency using Cooja  12
Impact of Sinkhole Attacks on IoT Network Efficiency using C...
收藏 引用
12th IEEE conference on systems, Process and control, ICSPC 2024
作者: Bin, Max Ling Wei Kamis, Noor Hisham Razak, Siti Fatimah Abdul Yogarayan, Sumendra Yassin, S.M.Warusia Mohamed S.M.M Abdullah, Mohd Fikri Azli Multimedia University Ayer Keroh Faculty of Information Science and Technology Melaka Malaysia Universiti Teknikal Malaysia Melaka Durian Tunggal Faculty of Information Technology and Communication Melaka Malaysia
The internet of Things (IoT) is considered one of the huge parts in the wireless world and IoT devices provide individuals with a lot of ease in their daily life activities. As technology today is growing at an unexpe... 详细信息
来源: 评论
Blockchain-Based Data Security Solutions for Autonomous Vehicles in IoVT  10
Blockchain-Based Data Security Solutions for Autonomous Vehi...
收藏 引用
10th International conference on Electrical Energy systems, ICEES 2024
作者: Mehta, Shiva Bhalla, Anubhav Chitkara University Institute of Engineering and Technology Chitkara University Centre for Research Impact & Outcome Punjab India Chitkara University Chitkara Centre for Research and Development Himachal Pradesh 174103 India
Therefore, the internet of Vehicular Things (IoT) is a subsystem of the internet of Things (IoT). This link enables complexity and the formation of application solutions like traffic control and predictive maintenance... 详细信息
来源: 评论
A Survey on the Development and Application of YOLOv5 in the internet of Things  12
A Survey on the Development and Application of YOLOv5 in the...
收藏 引用
12th IEEE International conference on Identification, Information and Knowledge in the internet of Things, iiKI 2024
作者: Mei, Liyao Zhang, Junyu Long, Teng School of information Engineering Beijing China
Deep learning plays a growing and crucial role on the internet of Things (IoT), especially in intelligent data analysis, decision support, and automation control. YOLOv5, as an efficient model for target detection in ... 详细信息
来源: 评论
Promises and Potential of BBRv3  25th
Promises and Potential of BBRv3
收藏 引用
25th Annual International conference on Passive and Active Measurement (PAM)
作者: Zeynali, Danesh Weyulu, Emilia N. Fathalli, Seifeddine Chandrasekaran, Balakrishnan Feldmann, Anja Max Planck Inst Informat Saarbrucken Germany Vrije Univ Amsterdam Amsterdam Netherlands
The Bottleneck-Bandwidth and Round-trip (BBR) congestion control algorithm was introduced by Google in 2016. Unlike prior congestion-control algorithms (CCAs), BBR does not rely on signals that are weakly correlated w... 详细信息
来源: 评论