咨询与建议

限定检索结果

文献类型

  • 418 篇 会议
  • 19 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 439 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 203 篇 工学
    • 188 篇 计算机科学与技术...
    • 76 篇 软件工程
    • 62 篇 电气工程
    • 33 篇 控制科学与工程
    • 32 篇 信息与通信工程
    • 17 篇 安全科学与工程
    • 16 篇 网络空间安全
    • 12 篇 电子科学与技术(可...
    • 12 篇 交通运输工程
    • 7 篇 生物工程
    • 6 篇 机械工程
    • 6 篇 石油与天然气工程
    • 5 篇 土木工程
    • 3 篇 建筑学
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 力学(可授工学、理...
    • 2 篇 仪器科学与技术
  • 45 篇 管理学
    • 39 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 10 篇 图书情报与档案管...
  • 41 篇 理学
    • 24 篇 数学
    • 10 篇 物理学
    • 8 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 3 篇 化学
  • 11 篇 法学
    • 6 篇 法学
    • 5 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 2 篇 军事学

主题

  • 84 篇 security
  • 64 篇 computational in...
  • 58 篇 computational mo...
  • 29 篇 training
  • 28 篇 artificial intel...
  • 21 篇 intrusion detect...
  • 21 篇 data security
  • 19 篇 computer securit...
  • 19 篇 data models
  • 18 篇 deep learning
  • 18 篇 feature extracti...
  • 17 篇 network security
  • 16 篇 information secu...
  • 16 篇 testing
  • 15 篇 computer archite...
  • 15 篇 data mining
  • 15 篇 machine learning
  • 14 篇 internet of thin...
  • 14 篇 neural networks
  • 14 篇 protocols

机构

  • 6 篇 university of ch...
  • 4 篇 doctoral school ...
  • 4 篇 chinese academy ...
  • 4 篇 keleti károly fa...
  • 3 篇 college of compu...
  • 3 篇 beijing electron...
  • 3 篇 department of co...
  • 3 篇 peng cheng labor...
  • 3 篇 institute of inf...
  • 3 篇 dalhousie univer...
  • 3 篇 doctoral school ...
  • 3 篇 department of co...
  • 3 篇 national univers...
  • 3 篇 obuda univ docto...
  • 2 篇 university of ot...
  • 2 篇 department of co...
  • 2 篇 virginia tech bl...
  • 2 篇 sama partners tu...
  • 2 篇 school of comput...
  • 2 篇 faculty of infor...

作者

  • 5 篇 a. nur zincir-he...
  • 5 篇 dipankar dasgupt...
  • 4 篇 dasgupta dipanka...
  • 4 篇 nur zincir-heywo...
  • 4 篇 abielmona rami
  • 3 篇 tick andrea
  • 3 篇 andrea tick
  • 3 篇 malcolm i. heywo...
  • 3 篇 kadena esmeralda
  • 3 篇 alexander h. lev...
  • 3 篇 banati anna
  • 2 篇 kail eszter
  • 2 篇 gilles duc
  • 2 篇 siket mate
  • 2 篇 jean berger
  • 2 篇 denes-fazakas le...
  • 2 篇 jia yan
  • 2 篇 rajnai zoltan
  • 2 篇 levente kovács
  • 2 篇 michael barlow

语言

  • 419 篇 英文
  • 17 篇 其他
  • 3 篇 中文
检索条件"任意字段=IEEE Symposium on Computational Intelligence in Security and Defense Applications"
439 条 记 录,以下是31-40 订阅
排序:
Recent reputation-based security approaches for VANETs  8
Recent reputation-based security approaches for VANETs
收藏 引用
8th International Artificial intelligence and Data Processing symposium, IDAP 2024
作者: Abasikeles-Turgut, Ipek İskenderun Technical University Department of Computer Engineering Hatay Turkey
One of the important problems of the February 6, 2023, Kahramanmaraş earthquake was those unexpected road blockages due to instantaneous congestion and disaster-related damage caused by forced changes in vehicle route... 详细信息
来源: 评论
From n to n+x: A Novel Open World Traffic Classification Framework Based on Multiple Classifiers Ensemble  22
From n to n+x: A Novel Open World Traffic Classification Fra...
收藏 引用
22nd ieee International symposium on Parallel and Distributed Processing with applications, ISPA 2024
作者: Liu, Kaixing Wang, Fei Chen, Shuhui National University of Defense Technology College of Computer Changsha China
Application-level traffic classification is a critical component in network management and security. In recent years, intelligent classification methods have been proven effective, especially for encrypted network tra... 详细信息
来源: 评论
A Review of Advancements and applications of Pre-Trained Language Models in Cybersecurity  12
A Review of Advancements and Applications of Pre-Trained Lan...
收藏 引用
12th International symposium on Digital Forensics and security, ISDFS 2024
作者: Liu, Zefang School of Computational Science and Engineering Georgia Institute of Technology Atlanta United States
In this paper, we delve into the transformative role of pre-trained language models (PLMs) in cybersecurity, offering a comprehensive examination of their deployment across a wide array of cybersecurity tasks. Beginni... 详细信息
来源: 评论
Efficient erasure-coded multi-data block update methods for heterogeneous storage environments  22
Efficient erasure-coded multi-data block update methods for ...
收藏 引用
22nd ieee International symposium on Parallel and Distributed Processing with applications, ISPA 2024
作者: Wang, Hengyu Wei, Bing Luo, Ning Chen, Qian Wu, Yi Zhang, Shudong Zhou, Lijuan Hainan University School of Cyberspace Security Hainan China Hainan University School of International Communication and Arts Hainan China
Erasure-coded storage systems can achieve highly reliable data storage with low storage overhead. However, updating data blocks necessitates updating parity blocks, and updating multiple data blocks incurs heavy I/O a... 详细信息
来源: 评论
DMSA: Decentralized and Multi-keyword Selective Data Sharing and Acquisition  22
DMSA: Decentralized and Multi-keyword Selective Data Sharing...
收藏 引用
22nd ieee International symposium on Parallel and Distributed Processing with applications, ISPA 2024
作者: Lin, Moheng Shi, Peichang Fu, Xiang Jiang, Feng Yi, Guodong National University of Defense Technology National Key Laboratory of Parallel and Distributed Computing College of Computer Science Changsha410073 China Xiangjiang Lab Changsha410073 China
Blockchain technology has been extensively uti-lized in decentralized data-sharing applications, with the immutability of blockchain providing a witness for the circulation of data. However, current blockchain data-sh... 详细信息
来源: 评论
Cyber security Issues in the Industrial applications of Digital Twins
Cyber Security Issues in the Industrial Applications of Digi...
收藏 引用
2023 ieee symposium Series on computational intelligence, SSCI 2023
作者: Siddique, Sunzida Haque, Mohd Ariful Rifat, Rakib Hossain George, Roy Shujaee, Khalil Gupta, Kishor Datta Daffodil International University Computer Science and Engineering Dhaka Bangladesh Clark Atlanta University Cyber Physical Systems AtlantaGA United States Brac University Computer Science and Engineering Dhaka Bangladesh
Transformative developments have been brought in across several industries. Digital twin technologies are one of them. This revolutionary innovation has enhanced efficiency, optimized production, and elevated product ... 详细信息
来源: 评论
Quantum-Resistant security for Healthcare Data: Integrating Lamport n-Times Signatures Scheme with Blockchain Technology
Quantum-Resistant Security for Healthcare Data: Integrating ...
收藏 引用
2024 International Conference on Artificial intelligence and Quantum Computation-Based Sensor applications, ICAIQSA 2024
作者: Das, Sujan Mondal, Somnath Golder, Shib Shankar Sutradhar, Sharabani Bose, Rajesh Mondal, Haraprasad Deloitte Consulting LLP ChicagoIL60606 United States Ernst & Young ChicagoIL60606 United States Brainware University Department of Computational Sciences West Bengal India JIS University Department of Computer Science & Engineering West Bengal India Dibrugarh University Assam Dibrugarh786004 India
Medical data is highly sensitive and valuable, making it a prime target for cybercriminals who increasingly seek to exploit patient health records and genetic information. While traditional encryption methods like RSA... 详细信息
来源: 评论
A Distributed Multi-User Access Control Middleware for Critical applications
A Distributed Multi-User Access Control Middleware for Criti...
收藏 引用
2023 ieee symposium Series on computational intelligence, SSCI 2023
作者: Williams, Alexander Roy, Arunava Dasgupta, Dipankar Center for Information Assurance University of Memphis United States
We present a novel access control middleware for distributed multi-user review. The system uses a fuzzy inference system trained on real world access control rules to evaluate and select reviewers as an extension to a... 详细信息
来源: 评论
A High-performance Hardware Accelerator for Genome Alignment  22
A High-performance Hardware Accelerator for Genome Alignment
收藏 引用
22nd ieee International symposium on Parallel and Distributed Processing with applications, ISPA 2024
作者: Liao, Haoyu Li, Yuan Wang, Qiang Lai, Mingche Su, Hui Li, Ziwen Qi, Xingyun National University of Defense Technology School of Computer Science Changsha China
Genome alignment is a vital process in genome sequencing and bio-informatics research. It entails aligning short DNA sequence fragments (usually tens to hundreds of base pairs) with a reference genome sequence, uncove... 详细信息
来源: 评论
Tipcc: TEE-based Integrity Protection of Consortium Blockchain Contracts  22
Tipcc: TEE-based Integrity Protection of Consortium Blockcha...
收藏 引用
22nd ieee International symposium on Parallel and Distributed Processing with applications, ISPA 2024
作者: Guan, Zihao Ding, Yan Wang, Wei Wang, Chuang Guo, Yufeng Liu, Yongpeng Feng, Liaoliao National University of Defense Technology School of Computer Changsha China Phytium Technology Co. Ltd. Changsha China
Secure execution of smart contracts on consortium blockchains is essential. Existing solutions commonly use trusted execution environments (TEEs) to ensure isolated and confidential contract execution, enhancing secur... 详细信息
来源: 评论