咨询与建议

限定检索结果

文献类型

  • 18,257 篇 会议
  • 84 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 18,388 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,580 篇 工学
    • 11,248 篇 计算机科学与技术...
    • 5,825 篇 软件工程
    • 3,288 篇 信息与通信工程
    • 3,084 篇 电气工程
    • 1,552 篇 控制科学与工程
    • 952 篇 网络空间安全
    • 702 篇 安全科学与工程
    • 463 篇 生物工程
    • 431 篇 动力工程及工程热...
    • 427 篇 交通运输工程
    • 366 篇 电子科学与技术(可...
    • 342 篇 仪器科学与技术
    • 313 篇 机械工程
    • 261 篇 石油与天然气工程
    • 260 篇 生物医学工程(可授...
    • 253 篇 环境科学与工程(可...
  • 2,208 篇 管理学
    • 1,766 篇 管理科学与工程(可...
    • 720 篇 图书情报与档案管...
    • 606 篇 工商管理
  • 1,904 篇 理学
    • 886 篇 数学
    • 515 篇 生物学
    • 279 篇 统计学(可授理学、...
    • 256 篇 系统科学
    • 240 篇 化学
  • 786 篇 法学
    • 530 篇 社会学
    • 286 篇 法学
  • 444 篇 医学
    • 322 篇 公共卫生与预防医...
    • 286 篇 临床医学
    • 270 篇 基础医学(可授医学...
  • 260 篇 经济学
    • 260 篇 应用经济学
  • 82 篇 教育学
  • 81 篇 文学
  • 60 篇 农学
  • 45 篇 军事学
  • 9 篇 艺术学
  • 1 篇 历史学

主题

  • 5,365 篇 cloud computing
  • 2,896 篇 security
  • 950 篇 privacy
  • 855 篇 internet of thin...
  • 852 篇 servers
  • 609 篇 computational mo...
  • 561 篇 encryption
  • 548 篇 computer archite...
  • 529 篇 data privacy
  • 520 篇 cloud security
  • 496 篇 authentication
  • 463 篇 access control
  • 431 篇 big data
  • 416 篇 cryptography
  • 372 篇 protocols
  • 354 篇 monitoring
  • 315 篇 machine learning
  • 312 篇 edge computing
  • 307 篇 data security
  • 302 篇 intrusion detect...

机构

  • 256 篇 institute of inf...
  • 246 篇 school of cyber ...
  • 178 篇 univ chinese aca...
  • 136 篇 chinese acad sci...
  • 96 篇 chinese academy ...
  • 71 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 45 篇 chitkara univers...
  • 41 篇 chinese acad sci...
  • 36 篇 school of cyber ...
  • 35 篇 university of ch...
  • 32 篇 southeast univ s...
  • 29 篇 beihang univ sch...
  • 28 篇 pace univ dept c...
  • 26 篇 key laboratory o...
  • 26 篇 college of compu...
  • 24 篇 school of comput...
  • 24 篇 school of comput...
  • 23 篇 school of cyber ...
  • 22 篇 xidian univ sch ...

作者

  • 33 篇 xiong gang
  • 26 篇 li zhen
  • 25 篇 wang wei
  • 23 篇 ma jianfeng
  • 20 篇 yang yang
  • 19 篇 zou deqing
  • 18 篇 wang ping
  • 18 篇 ko ryan k. l.
  • 18 篇 meikang qiu
  • 17 篇 gaopeng gou
  • 17 篇 hariri salim
  • 17 篇 varadharajan vij...
  • 17 篇 wang guojun
  • 17 篇 vijay varadharaj...
  • 16 篇 wang liming
  • 16 篇 reich christoph
  • 16 篇 liu yang
  • 15 篇 dan meng
  • 15 篇 zhang yuqing
  • 15 篇 keke gai

语言

  • 17,566 篇 英文
  • 763 篇 其他
  • 65 篇 中文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"任意字段=IEEE International Conference on Cyber Security and Cloud Computing"
18388 条 记 录,以下是31-40 订阅
排序:
Secure cloud computing: Mitigating Network Vulnerabilities  15
Secure Cloud Computing: Mitigating Network Vulnerabilities
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Gopal, Santhosh Kumar Mohammed, Abdul Sajid Sreeramulu, Madhusudhan Dasari Srinivasan, Dhamodharan Charlotte NC United States University of the Cumberlands Dept of School of Computer and Information Sciences KY United States American Express Dept of Cyber Security United States Sri Eshwar College of Engineering Department of Computer and Communication Engineering Tamil Nadu Coimbatore641202 India
As businesses increasingly depend on these cloud-based services, secure cloud computing is vital. There is no free way with the cloud network, and our information is susceptible to vulnerability. Mitigation strategies... 详细信息
来源: 评论
Enhancing security in EV Charging Systems: A Hybrid Detection and Mitigation Approach  15
Enhancing Security in EV Charging Systems: A Hybrid Detectio...
收藏 引用
15th ieee international conference on cloud computing Technology and Science, cloudCom 2024
作者: Dong, Huiyao Kotenko, Igor Itmo University Saint Petersburg Russia Laboratory of Computer Security Problems Saint Petersburg Russia
The rapid proliferation of electric vehicles (EVs) necessitates advanced charging infrastructure, which is increasingly reliant on cloud-based technologies and the Internet of Things (IoT). However, these systems are ... 详细信息
来源: 评论
Utilizing AWS cloud-Enhanced VPN and VPC Integration to Improve Data security and Access Control in Library Management Systems  2
Utilizing AWS Cloud-Enhanced VPN and VPC Integration to Impr...
收藏 引用
2nd international conference on Intelligent cyber Physical Systems and Internet of Things (ICoICI)
作者: Sahoo, Sasmita Swain, Adyasha Mohapatra, Sunil Kumar Pattanaik, Swarupa Senapati, Arpita Centurion Univ Technol & Management Dept Comp Sci & Engn Bhubaneswar India
Digital information exchange has become commonplace due to the growth of the internet and information technology breakthroughs. Academic institutions are placing a greater emphasis on developing digital campuses, of w... 详细信息
来源: 评论
Predictive Risk and Complexity Score Assessment Model for cloud computing
Predictive Risk and Complexity Score Assessment Model for Cl...
收藏 引用
2024 international conference on Advances in Data Engineering and Intelligent computing Systems, ADICS 2024
作者: Ayappan, Kavitha Mathana, J.M. Thangakumar, J. Hindustan Institute Of Technology & Science Chennai India
With the rapid growth in information technology and being called the Digital Era, it is very evident that no one can survive without internet or ICT advancements. The day-to-day life operations and activities are depe... 详细信息
来源: 评论
Ensuring the Resilience of cloud Platforms Based on cyber Immunity  27
Ensuring the Resilience of Cloud Platforms Based on Cyber Im...
收藏 引用
27th international conference on Soft computing and Measurements, SCM 2024
作者: Balyabin, Artyom A. Saint Petersburg Electrotechnical University 'LETI' Information Security Department Saint Petersburg Russia
This paper examines the problem of ensuring the resilience of cloud platforms under cyberattacks. It is proposed to use the principles of cyber immunity to provide information systems with the ability to detect both k... 详细信息
来源: 评论
Efficiency Meets security: A Delegated Transport Authentication Protocol for the cloud  11
Efficiency Meets Security: A Delegated Transport Authenticat...
收藏 引用
11th ieee international conference on cyber security and cloud computing, CScloud 2024
作者: Zhang, Hongbing Pan, Wei Gao, Zhiyuan Lu, Zhihui Liu, Yu Hou, Lingyu Feng, Jie Li, Jiawei Shanghai DaoCloud Network Technology Co. Ltd. Shanghai China Jiangsu Polytechnic College of Agriculture and Forestry Jurong China Suzhou Ruilisi Technology Ltd. Suzhou China School of Computer Science Fudan University Shanghai China Wangsu Science Technology Co. Ltd. Shanghai China
This paper presents a novel authentication method for proxy transmission via an intermediate server, focusing on low overhead for cloud gaming and online services. It improves data speed by optimizing authentication a... 详细信息
来源: 评论
Creating Smart security Along With AI for cloud-Based Internet of Land Transport  3
Creating Smart Security Along With AI for Cloud-Based Intern...
收藏 引用
international conference on Advances in computing, Communication and Applied Informatics (ACCAI)
作者: Vikrama, G. S. Sujatha, G. SRM Inst Sci & Technol Informat Secur & Cyber Forens Chennai Tamil Nadu India SRM Inst Sci & Technol Sch Comp Coll Engn & Technol Dept Networking & Commun Kattankulathur Tamil Nadu India
The Internet of Things is profitable to take a important influence on the transportation sector. Autonomous vehicles, also known as AVs, are being developed with the goal of making everyday tasks easier, such as carry... 详细信息
来源: 评论
Data Splitting based Double Layer Encryption for Secure Ciphertext Deduplication in cloud Storage  17
Data Splitting based Double Layer Encryption for Secure Ciph...
收藏 引用
ieee 17th international conference on cloud computing (ieee cloud)
作者: Tang, Xin Jin, Luchao Univ Int Relat Sch Cyber Sci & Engn Beijing Peoples R China
Ciphertext deduplication is an emerging technique to eliminate redundancy in cloud storage with data confidentiality guaranteed. However, the encryption key has to be synchronized among different owners of the same da... 详细信息
来源: 评论
Digital Watermarking Technology of Data Element Circulation Transaction  10
Digital Watermarking Technology of Data Element Circulation ...
收藏 引用
ieee 10th international conference on Edge computing and Scalable cloud (ieee EdgeCom) / 11th ieee international conference on cyber security and cloud computing (ieee CScloud)
作者: Cho, HsunFang Zhang, Li Jiang, Xiaozhen Fuzhou Univ Int Studies & Trade Sch Finance Dept Digital Econ Fuzhou Peoples R China
Data has become a key factor of production in the digital economy, exerting a broad and profound impact on China's economic development, social governance, and people's production and life styles. The circulat... 详细信息
来源: 评论
cyber Attack Detection using Secret Sharing Schemes  9
Cyber Attack Detection using Secret Sharing Schemes
收藏 引用
9th ieee international conference on Big Data security on cloud (BigDatasecurity) / 9th ieee international conference on High Performance and Smart computing (ieee HPSC) / 9th ieee international conference on Intelligent Data and security (ieee IDS)
作者: Chum, Chi Sing Wei, Xinzhou Zhang, Xiaowen CUNY Comp Sci Dept Grad Ctr New York NY 10016 USA CUNY Elect & Telecommun Dept New York City Coll Technol Brooklyn NY USA CUNY Comp Sci Dept Coll Staten Isl Staten Isl NY USA
We propose a model along with its algorithm, which can detect suspicious activities and safeguard sensitive information within a complicated infrastructure of an organization based on the secret sharing schemes. The m... 详细信息
来源: 评论