咨询与建议

限定检索结果

文献类型

  • 18,257 篇 会议
  • 84 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 18,388 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,580 篇 工学
    • 11,248 篇 计算机科学与技术...
    • 5,825 篇 软件工程
    • 3,288 篇 信息与通信工程
    • 3,084 篇 电气工程
    • 1,552 篇 控制科学与工程
    • 952 篇 网络空间安全
    • 702 篇 安全科学与工程
    • 463 篇 生物工程
    • 431 篇 动力工程及工程热...
    • 427 篇 交通运输工程
    • 366 篇 电子科学与技术(可...
    • 342 篇 仪器科学与技术
    • 313 篇 机械工程
    • 261 篇 石油与天然气工程
    • 260 篇 生物医学工程(可授...
    • 253 篇 环境科学与工程(可...
  • 2,208 篇 管理学
    • 1,766 篇 管理科学与工程(可...
    • 720 篇 图书情报与档案管...
    • 606 篇 工商管理
  • 1,904 篇 理学
    • 886 篇 数学
    • 515 篇 生物学
    • 279 篇 统计学(可授理学、...
    • 256 篇 系统科学
    • 240 篇 化学
  • 786 篇 法学
    • 530 篇 社会学
    • 286 篇 法学
  • 444 篇 医学
    • 322 篇 公共卫生与预防医...
    • 286 篇 临床医学
    • 270 篇 基础医学(可授医学...
  • 260 篇 经济学
    • 260 篇 应用经济学
  • 82 篇 教育学
  • 81 篇 文学
  • 60 篇 农学
  • 45 篇 军事学
  • 9 篇 艺术学
  • 1 篇 历史学

主题

  • 5,365 篇 cloud computing
  • 2,896 篇 security
  • 950 篇 privacy
  • 855 篇 internet of thin...
  • 852 篇 servers
  • 609 篇 computational mo...
  • 561 篇 encryption
  • 548 篇 computer archite...
  • 529 篇 data privacy
  • 520 篇 cloud security
  • 496 篇 authentication
  • 463 篇 access control
  • 431 篇 big data
  • 416 篇 cryptography
  • 372 篇 protocols
  • 354 篇 monitoring
  • 315 篇 machine learning
  • 312 篇 edge computing
  • 307 篇 data security
  • 302 篇 intrusion detect...

机构

  • 256 篇 institute of inf...
  • 246 篇 school of cyber ...
  • 178 篇 univ chinese aca...
  • 136 篇 chinese acad sci...
  • 96 篇 chinese academy ...
  • 71 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 45 篇 chitkara univers...
  • 41 篇 chinese acad sci...
  • 36 篇 school of cyber ...
  • 35 篇 university of ch...
  • 32 篇 southeast univ s...
  • 29 篇 beihang univ sch...
  • 28 篇 pace univ dept c...
  • 26 篇 key laboratory o...
  • 26 篇 college of compu...
  • 24 篇 school of comput...
  • 24 篇 school of comput...
  • 23 篇 school of cyber ...
  • 22 篇 xidian univ sch ...

作者

  • 33 篇 xiong gang
  • 26 篇 li zhen
  • 25 篇 wang wei
  • 23 篇 ma jianfeng
  • 20 篇 yang yang
  • 19 篇 zou deqing
  • 18 篇 wang ping
  • 18 篇 ko ryan k. l.
  • 18 篇 meikang qiu
  • 17 篇 gaopeng gou
  • 17 篇 hariri salim
  • 17 篇 varadharajan vij...
  • 17 篇 wang guojun
  • 17 篇 vijay varadharaj...
  • 16 篇 wang liming
  • 16 篇 reich christoph
  • 16 篇 liu yang
  • 15 篇 dan meng
  • 15 篇 zhang yuqing
  • 15 篇 keke gai

语言

  • 17,566 篇 英文
  • 763 篇 其他
  • 65 篇 中文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"任意字段=IEEE International Conference on Cyber Security and Cloud Computing"
18388 条 记 录,以下是11-20 订阅
排序:
Proceedings - 2023 ieee 9th international conference on Big Data security on cloud, ieee international conference on High Performance and Smart computing, and ieee international conference on Intelligent Data and security, BigDatasecurity-HPSC-IDS 2023
Proceedings - 2023 IEEE 9th International Conference on Big ...
收藏 引用
9th ieee international conference on Big Data security on cloud, 9th ieee international conference on High Performance and Smart computing and 9th ieee international conference on Intelligent Data and security, BigDatasecurity-HPSC-IDS 2023
The proceedings contain 35 papers. The topics discussed include: a survey of weakly-supervised semantic segmentation;privacy analysis of federated learning via dishonest servers;a new method of construction of permuta...
来源: 评论
2023 ieee international conference on Dependable, Autonomic and Secure computing, international conference on Pervasive Intelligence and computing, international conference on cloud and Big Data computing, international conference on cyber Science and Technology Congress, DASC/PiCom/CBDCom/cyberSciTech 2023
2023 IEEE International Conference on Dependable, Autonomic ...
收藏 引用
2023 ieee international conference on Dependable, Autonomic and Secure computing, 2023 international conference on Pervasive Intelligence and computing, 2023 international conference on cloud and Big Data computing, 2023 international conference on cyber Science and Technology Congress, DASC/PiCom/CBDCom/cyberSciTech 2023
The proceedings contain 174 papers. The topics discussed include: analyzing the effects of driving experience on backing maneuvers based on data collected by eye-tracking devices;recommendation algorithm based on soci...
来源: 评论
Proceedings of the 2022 ieee international conference on Dependable, Autonomic and Secure computing, international conference on Pervasive Intelligence and computing, international conference on cloud and Big Data computing, international conference on cyber Science and Technology Congress, DASC/PiCom/CBDCom/cyberSciTech 2022
Proceedings of the 2022 IEEE International Conference on Dep...
收藏 引用
20th ieee international conference on Dependable, Autonomic and Secure computing, 20th ieee international conference on Pervasive Intelligence and computing, 7th ieee international conference on cloud and Big Data computing, 2022 ieee international conference on cyber Science and Technology Congress, DASC/PiCom/CBDCom/cyberSciTech 2022
The proceedings contain 185 papers. The topics discussed include: wearable IMU based gait quality quantitative evaluation method;quantum computing approach for energy optimization in a prosumer community;raising citiz...
来源: 评论
Proceedings - 2022 ieee 8th international conference on Big Data security on cloud, ieee international conference on High Performance and Smart computing, and ieee international conference on Intelligent Data and security, BigDatasecurity/HPSC/IDS 2022
Proceedings - 2022 IEEE 8th International Conference on Big ...
收藏 引用
8th ieee international conference on Big Data security on cloud, 8th ieee international conference on High Performance and Smart computing, and 8th ieee international conference on Intelligent Data and security, BigDatasecurity/HPSC/IDS 2022
The proceedings contain 39 papers. The topics discussed include: an insider threat detection method based on heterogeneous graph embedding;predicting relations in sg-cim model based on graph structure and semantic inf...
来源: 评论
A factual study on hybrid multi cloud cyber security threats and proposed methodologies to enable cyber resilience  10
A factual study on hybrid multi cloud cyber security threats...
收藏 引用
10th ieee international conference on Electronics, computing and Communication Technologies (ieee CONECCT)
作者: Mishra, Atul Sarat, Parvathy Afza, Roohi SAP LABS India Private Ltd Discrete Ind Bengaluru India
A hybrid multi cloud integrates infrastructure components of on-premises, private, and public cloud sources into one centralized, distributed computing environment. Hybrid multi cloud security must operate at all leve... 详细信息
来源: 评论
Detecting covert channels in cloud access control policies using Large Language Models
Detecting covert channels in cloud access control policies u...
收藏 引用
4th ieee Annual international conference on cyber security and Resilience (ieee CSR)
作者: Karmarkar, Hrishikesh Joshi, Vaibhavi Venkatesh, R. TCS Res Mumbai India TCS Res Pune India
In the realm of cloud computing, the task of configuring access control policies is a critical aspect of ensuring security of cloud resources. However, policy configuration remains a complex task with a high cognitive... 详细信息
来源: 评论
An AI-aware Orchestration Framework for cloud-based LLM Workloads  10
An AI-aware Orchestration Framework for Cloud-based LLM Work...
收藏 引用
ieee 10th international conference on Edge computing and Scalable cloud (ieee EdgeCom) / 11th ieee international conference on cyber security and cloud computing (ieee CScloud)
作者: Ye, Zi Ying, Ruoyu Shanghai Jiao Tong Univ UM SJTU Joint Intitute Shanghai Peoples R China Intel Software & Adv Technol Grp Dept Cloud Software Engn Shanghai Peoples R China
Large Language Models (LLMs), such as ChatGPT and Bard, have revolutionized the entire industry with their extraordinary power, and gained traction in the cloud community. Deploying LLM workloads in cloud has become i... 详细信息
来源: 评论
cloud computing security: Threats and Mitigation Strategies
Cloud Computing Security: Threats and Mitigation Strategies
收藏 引用
2024 ieee international conference on Signal Processing and Advance Research in computing, SPARC 2024
作者: Sharma, Chetna Sharma, Chandani Institute of Computer Technology & Business Management Maharishi Markandeshwar University Haryana Mullana Ambala India
Information Technology plays a pivotal role in the modern business landscape, facilitating efficient operations and communication. However, the increasing reliance on IT systems also exposes organizations to various s... 详细信息
来源: 评论
A Cost-effective Automation Method of Massive Vulnerabilities Analysis and Remediation Based on cloud Native  22
A Cost-effective Automation Method of Massive Vulnerabilitie...
收藏 引用
ieee 22nd international conference on Trust, security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Hu, Tian Zhuang, Shangyuan Sun, Jiyan Liu, Yinlong Ma, Wei Wang, Hongchao Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China
With the rapid development of the cutting edge cloud computing technology, millions of vulnerabilities have been identified, there is a growing concern that organizations should devote plenty of time and lots of resou... 详细信息
来源: 评论
Efficient Privacy-Preserving Spatial Data Query in cloud computing
收藏 引用
ieee TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 2024年 第1期36卷 122-136页
作者: Miao, Yinbin Yang, Yutao Li, Xinghua Wei, Linfeng Liu, Zhiquan Deng, Robert H. Xidian Univ Sch Cyber Engn Xian 710071 Peoples R China Xidian Univ Sch Cyber Engn State Key Lab Integrated Serv Networks Xian 710071 Peoples R China Minist Educ Engn Res Ctr Big Data Secur Xian 710071 Peoples R China Jinan Univ Sch Cyber Secur Guangzhou 510632 Peoples R China Jinan Univ Coll Cyber Secur Guangzhou 510632 Peoples R China Singapore Management Univ Sch Informat Syst Singapore 178902 Singapore
With the rapid development of geographic location technology and the explosive growth of data, a large amount of spatial data is outsourced to the cloud server for reducing the local high storage and computing burdens... 详细信息
来源: 评论