咨询与建议

限定检索结果

文献类型

  • 418 篇 会议
  • 19 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 439 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 203 篇 工学
    • 188 篇 计算机科学与技术...
    • 76 篇 软件工程
    • 62 篇 电气工程
    • 33 篇 控制科学与工程
    • 32 篇 信息与通信工程
    • 17 篇 安全科学与工程
    • 16 篇 网络空间安全
    • 12 篇 电子科学与技术(可...
    • 12 篇 交通运输工程
    • 7 篇 生物工程
    • 6 篇 机械工程
    • 6 篇 石油与天然气工程
    • 5 篇 土木工程
    • 3 篇 建筑学
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 力学(可授工学、理...
    • 2 篇 仪器科学与技术
  • 45 篇 管理学
    • 39 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 10 篇 图书情报与档案管...
  • 41 篇 理学
    • 24 篇 数学
    • 10 篇 物理学
    • 8 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 6 篇 系统科学
    • 3 篇 化学
  • 11 篇 法学
    • 6 篇 法学
    • 5 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 2 篇 军事学

主题

  • 84 篇 security
  • 64 篇 computational in...
  • 58 篇 computational mo...
  • 29 篇 training
  • 28 篇 artificial intel...
  • 21 篇 intrusion detect...
  • 21 篇 data security
  • 19 篇 computer securit...
  • 19 篇 data models
  • 18 篇 deep learning
  • 18 篇 feature extracti...
  • 17 篇 network security
  • 16 篇 information secu...
  • 16 篇 testing
  • 15 篇 computer archite...
  • 15 篇 data mining
  • 15 篇 machine learning
  • 14 篇 internet of thin...
  • 14 篇 neural networks
  • 14 篇 protocols

机构

  • 6 篇 university of ch...
  • 4 篇 doctoral school ...
  • 4 篇 chinese academy ...
  • 4 篇 keleti károly fa...
  • 3 篇 college of compu...
  • 3 篇 beijing electron...
  • 3 篇 department of co...
  • 3 篇 peng cheng labor...
  • 3 篇 institute of inf...
  • 3 篇 dalhousie univer...
  • 3 篇 doctoral school ...
  • 3 篇 department of co...
  • 3 篇 national univers...
  • 3 篇 obuda univ docto...
  • 2 篇 university of ot...
  • 2 篇 department of co...
  • 2 篇 virginia tech bl...
  • 2 篇 sama partners tu...
  • 2 篇 school of comput...
  • 2 篇 faculty of infor...

作者

  • 5 篇 a. nur zincir-he...
  • 5 篇 dipankar dasgupt...
  • 4 篇 dasgupta dipanka...
  • 4 篇 nur zincir-heywo...
  • 4 篇 abielmona rami
  • 3 篇 tick andrea
  • 3 篇 andrea tick
  • 3 篇 malcolm i. heywo...
  • 3 篇 kadena esmeralda
  • 3 篇 alexander h. lev...
  • 3 篇 banati anna
  • 2 篇 kail eszter
  • 2 篇 gilles duc
  • 2 篇 siket mate
  • 2 篇 jean berger
  • 2 篇 denes-fazakas le...
  • 2 篇 jia yan
  • 2 篇 rajnai zoltan
  • 2 篇 levente kovács
  • 2 篇 michael barlow

语言

  • 419 篇 英文
  • 17 篇 其他
  • 3 篇 中文
检索条件"任意字段=IEEE Symposium on Computational Intelligence in Security and Defense Applications"
439 条 记 录,以下是81-90 订阅
排序:
Secure and Reliable Indoor Localization Based on Multitask Collaborative Learning for Large-Scale Buildings
收藏 引用
ieee INTERNET OF THINGS JOURNAL 2022年 第22期9卷 22291-22303页
作者: Wang, Chun Luo, Juan Liu, Xuan He, Xiangjian Hunan Univ Coll Comp Sci & Elect Engn Changsha 410082 Peoples R China Hunan Univ Hunan Xiangjiang Artificial Intelligence Acad Changsha 410082 Peoples R China Univ Technol Sydney Sch Elect & Data Engn Ultimo NSW 2007 Australia
Accurate and reliable indoor location estimate is crucial for many Internet-of-Things (IoT) applications in the era of smart buildings. However, the positioning accuracy and security of the existing positioning works ... 详细信息
来源: 评论
Cyber security Issues in the Industrial applications of Digital Twins
Cyber Security Issues in the Industrial Applications of Digi...
收藏 引用
ieee symposium Series on computational intelligence (SSCI)
作者: Sunzida Siddique Mohd Ariful Haque Rakib Hossain Rifat Roy George Khalil Shujaee Kishor Datta Gupta Computer Science and Engineering Daffodil International University Dhaka Bangladesh Cyber Physical Systems Clark Atlanta University Atlanta GA Computer Science and Engineering BRAC University Dhaka Bangladesh
Transformative developments have been brought in across several industries. Digital twin technologies are one of them. This revolutionary innovation has enhanced efficiency, optimized production, and elevated product ...
来源: 评论
DECEPT-CTI: A Framework for Enhancing Cyber Deception Strategies through NLP-based Extraction of CTI from Unstructured Reports  22
DECEPT-CTI: A Framework for Enhancing Cyber Deception Strate...
收藏 引用
22nd International symposium on Network Computing and applications, NCA 2024
作者: Sayari, Amal Rekhis, Slim Djemaiel, Yacine Mabrouk, Ali Mahouachi, Wiem LR11TIC04 Communication Networks and Security Research Lab. & LR11TIC02 Green and Smart Communication Systems Research Lab Tunisia SAMA PARTNERS Tunisia
In today’s dynamic threat landscape, organizations encounter significant challenges when dealing with the vast, evolving, unregulated landscape of cyber threat intelligence (CTI). Firstly, the verbosity of CTI resour... 详细信息
来源: 评论
Rallying Adversarial Techniques against Deep Learning for Network security
Rallying Adversarial Techniques against Deep Learning for Ne...
收藏 引用
ieee symposium Series on computational intelligence (ieee SSCI)
作者: Clements, Joseph Yang, Yuzhe Sharma, Ankur A. Hu, Hongxin Lao, Yingjie Clemson Univ Clemson SC 29634 USA Univ Buffalo Buffalo NY USA
Recent advances in artificial intelligence and the increasing need for robust defensive measures in network security have led to the adoption of deep learning approaches for network intrusion detection systems (NIDS).... 详细信息
来源: 评论
‘Parenting the Internet’ App: a Web Guardian for Protecting Neurodiverse Users Online
‘Parenting the Internet’ App: a Web Guardian for Protectin...
收藏 引用
International symposium on computational intelligence and Informatics
作者: Ryan Jones M A Hannan Bin Azhar School of Engineering Technology and Design Canterbury Christ Church University Canterbury United Kingdom
The rising prevalence of Autism Spectrum Disorder (ASD) and Attention-Deficit/Hyperactivity Disorder (ADHD) necessitates tailored digital interventions for safeguarding and enhancing the well-being of affected individ... 详细信息
来源: 评论
Simplification on mobile devices reduces personal (cyber) safety  15
Simplification on mobile devices reduces personal (cyber) sa...
收藏 引用
ieee 15th International symposium on Applied computational intelligence and Informatics (SACI)
作者: Szarvak, Aniko Poser, Valeria Kozlovszky, Miklos Univ Obuda Doctoral Sch Appl Math & Appl Informat Budapest Hungary Univ Obuda Inst Biomat & Appl Artificial Intelligence BMI Budapest Hungary Univ Obuda BioTech Res Ctr EKIK Budapest Hungary
Due pandemic reasons, the phishing attack numbers are 6 times bigger than normally, approximately. If we assume the defense stays in the same level, this means 6 times more loss than before. Phishing attacks are targe... 详细信息
来源: 评论
A Distributed Multi-User Access Control Middleware for Critical applications
A Distributed Multi-User Access Control Middleware for Criti...
收藏 引用
ieee symposium Series on computational intelligence (SSCI)
作者: Alexander Williams Arunava Roy Dipankar Dasgupta Center for Information Assurance University of Memphis
We present a novel access control middleware for distributed multi-user review. The system uses a fuzzy inference system trained on real world access control rules to evaluate and select reviewers as an extension to a...
来源: 评论
Feature Selection Methods for Intrusion Detection Systems in IoT
Feature Selection Methods for Intrusion Detection Systems in...
收藏 引用
International symposium on Applied Machine intelligence and Informatics (SAMI)
作者: Ons Saadallah Ikrame Nouar Department of Data Science and Engineering ELTE - Eotvös Loránd University Budapest Hungary
IoT systems enhance daily life through smart applications but are vulnerable due to the increasing number of con-nected devices. To address security concerns, Intrusion Detection Systems (IDS) are crucial for detectin... 详细信息
来源: 评论
CTIFuser: Cyber Threat intelligence Fusion via Unsupervised Learning Model
CTIFuser: Cyber Threat Intelligence Fusion via Unsupervised ...
收藏 引用
International symposium on Parallel and Distributed Processing with applications, ISPA
作者: Chunyan Ma Zhengwei Jiang Jun Jiang Peian Yang Mengjiao Cui Fangming Dong Huamin Feng Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Beijing Electronic Science and Technology Institute Beijing China
Cyber attack campaigns are becoming increasingly complex and severe, causing significant impacts on institutions and individuals. Cyber Threat intelligence (CTI) provides important evidential knowledge about attackers... 详细信息
来源: 评论
Enhancing Intrusion Detection Systems with representation methods: A comparative study
Enhancing Intrusion Detection Systems with representation me...
收藏 引用
computational intelligence in security, Defence and Biometrics (CISDB), ieee symposium on
作者: Bruno H. Meyer Aurora T. R. Pozo Michele Nogueira Wagner M. Nunan Zola Department of Informatics Federal University of Paraná Brazil Department of Computer Science Federal University of Minas Gerais Brazil
This paper presents a comparative analysis of three data representation methods for improving Intrusion Detection Systems (IDS). The methods compared are autoencoders, Generative Adversarial Networks (GANs), and contr... 详细信息
来源: 评论