咨询与建议

限定检索结果

文献类型

  • 169,164 篇 会议
  • 2,165 篇 期刊文献
  • 1,694 册 图书
  • 14 篇 学位论文
  • 11 篇 专利
  • 5 篇 科技报告

馆藏范围

  • 173,054 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 106,199 篇 工学
    • 88,350 篇 计算机科学与技术...
    • 51,804 篇 软件工程
    • 32,288 篇 信息与通信工程
    • 18,089 篇 电气工程
    • 11,005 篇 控制科学与工程
    • 7,524 篇 生物工程
    • 5,598 篇 电子科学与技术(可...
    • 5,252 篇 网络空间安全
    • 4,757 篇 安全科学与工程
    • 4,252 篇 机械工程
    • 3,985 篇 生物医学工程(可授...
    • 3,649 篇 仪器科学与技术
    • 3,453 篇 动力工程及工程热...
    • 2,747 篇 交通运输工程
    • 2,534 篇 光学工程
    • 1,974 篇 化学工程与技术
  • 27,296 篇 理学
    • 14,281 篇 数学
    • 8,205 篇 生物学
    • 5,092 篇 物理学
    • 4,378 篇 统计学(可授理学、...
    • 3,199 篇 系统科学
    • 2,284 篇 化学
  • 21,957 篇 管理学
    • 13,779 篇 管理科学与工程(可...
    • 9,746 篇 图书情报与档案管...
    • 5,616 篇 工商管理
  • 5,223 篇 法学
    • 3,436 篇 社会学
    • 1,853 篇 法学
  • 4,282 篇 医学
    • 3,315 篇 临床医学
    • 2,845 篇 基础医学(可授医学...
  • 2,065 篇 经济学
    • 2,033 篇 应用经济学
  • 1,280 篇 教育学
  • 1,149 篇 农学
  • 921 篇 文学
  • 656 篇 军事学
  • 184 篇 艺术学
  • 6 篇 哲学
  • 5 篇 历史学

主题

  • 13,481 篇 security
  • 9,315 篇 cloud computing
  • 5,996 篇 network security
  • 5,522 篇 protocols
  • 5,467 篇 information secu...
  • 4,916 篇 computational mo...
  • 4,798 篇 wireless sensor ...
  • 4,695 篇 authentication
  • 4,177 篇 privacy
  • 4,122 篇 internet of thin...
  • 4,027 篇 computer network...
  • 3,968 篇 cryptography
  • 3,896 篇 servers
  • 3,838 篇 feature extracti...
  • 3,751 篇 mobile computing
  • 3,642 篇 routing
  • 3,409 篇 computer archite...
  • 3,249 篇 neural networks
  • 3,186 篇 internet
  • 3,110 篇 deep learning

机构

  • 663 篇 institute of inf...
  • 569 篇 school of cyber ...
  • 322 篇 university of ch...
  • 179 篇 institute of com...
  • 138 篇 chinese acad sci...
  • 136 篇 beijing universi...
  • 126 篇 school of comput...
  • 109 篇 school of cyber ...
  • 109 篇 school of comput...
  • 91 篇 chitkara univers...
  • 89 篇 maharishi school...
  • 86 篇 faculty of infor...
  • 86 篇 school of inform...
  • 84 篇 college of intel...
  • 77 篇 institute of inf...
  • 75 篇 computer network...
  • 72 篇 key laboratory o...
  • 67 篇 univ chinese aca...
  • 66 篇 chinese academy ...
  • 62 篇 shandong provinc...

作者

  • 131 篇 wang lei
  • 106 篇 zhang tao
  • 91 篇 wang wei
  • 80 篇 lei wang
  • 74 篇 jian wang
  • 66 篇 li wei
  • 64 篇 wei wang
  • 57 篇 bin wang
  • 51 篇 yang yang
  • 51 篇 leonard barolli
  • 50 篇 zhang lin
  • 46 篇 rui wang
  • 46 篇 liu yang
  • 45 篇 zhang yuqing
  • 44 篇 li hui
  • 42 篇 zhang wei
  • 41 篇 kim tai-hoon
  • 41 篇 cheng xinzhou
  • 38 篇 yang bin
  • 37 篇 wang liming

语言

  • 169,303 篇 英文
  • 2,674 篇 其他
  • 1,435 篇 中文
  • 11 篇 土耳其文
  • 10 篇 俄文
  • 8 篇 法文
  • 7 篇 葡萄牙文
  • 6 篇 乌克兰文
  • 3 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 德文
检索条件"任意字段=International Conference on Network Computing and Information Security"
173055 条 记 录,以下是1-10 订阅
排序:
Proceedings - 2011 international conference on network computing and information security, NCIS 2011
Proceedings - 2011 International Conference on Network Compu...
收藏 引用
2011 international conference on network computing and information security, NCIS 2011
The proceedings contain 184 papers. The topics discussed include: a dynamic access control scheme for outsourced database;a mandatory access control model based on concept lattice;a user access policy based on dynamic...
来源: 评论
Proceedings - 2011 international conference on network computing and information security, NCIS 2011
Proceedings - 2011 International Conference on Network Compu...
收藏 引用
2011 international conference on network computing and information security, NCIS 2011
The proceedings contain 184 papers. The topics discussed include: a dynamic access control scheme for outsourced database;a mandatory access control model based on concept lattice;a user access policy based on dynamic...
来源: 评论
2nd international conference on network computing and information security, NCIS 2012
2nd International Conference on Network Computing and Inform...
收藏 引用
2nd international conference on network computing and information security, NCIS 2012
The proceedings contain 104 papers. The special focus in this conference is on network computing and information security. The topics include: on the isomorphism classes of elliptic curves with 2-torsion points;templa...
来源: 评论
Call for Papers for 2011 international conference on network computing and information security (NCIS 2011) 2011 international conference on Multimedia and Signal Processing (CMSP 2011)
收藏 引用
软件学报 2010年 第10期 2665-2665页
The 2011 international conference on network computing and information security (NCIS 2011) and the 2011 international conference on Multimedia and Signal Processing (CMSP 2011) will be jointly held at Guilin,
来源: 评论
network computing and information security: Second international conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings
Network Computing and Information Security: Second Internati...
收藏 引用
2nd international conference on network computing and information security, NCIS 2012
作者: Lei, Jingsheng Wang, Fu Lee Li, Mo Luo, Yuan Shanghai University of Electric Power School of Computer and Information Engineering Shanghai 200090 China Caritas Institute of Higher Education 18 Chui Ling Road Tseung Kwan O Hong Kong China School of Computer Engineering Computer Science Division 50 Nanyang Avenue Singapore Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai 200030 China
来源: 评论
2nd international Symposium on network-Centric Ubiquitous Systems, NCUS 2006, 2nd international Workshop on security in Ubiquitous computing Systems, SecUbiq 2006, 2nd international Workshop on RFID and Ubiquitous Sensor networks, USN 2006, 1st international Workshop on Trustworthiness, Reliability and services in Ubiquitous and Sensor networks, TRUST 2006, 1st international Workshop on Embedded Software Optimization, ESO 2006 and 1st international Workshop on Multimedia Solution and the Assurance in the Ubiquitous information Systems, MSA 2006 held in conjunction with the IFIP international conference on Embedded and Ubiquitous computing, EUC 2006
2nd International Symposium on Network-Centric Ubiquitous Sy...
收藏 引用
2nd international Symposium on network-Centric Ubiquitous Systems, NCUS 2006, 2nd international Workshop on security in Ubiquitous computing Systems, SecUbiq 2006, 2nd international Workshop on RFID and Ubiquitous Sensor networks, USN 2006, 1st international Workshop on Trustworthiness, Reliability and services in Ubiquitous and Sensor networks, TRUST 2006, 1st international Workshop on Embedded Software Optimization, ESO 2006 and 1st international Workshop on Multimedia Solution and the Assurance in the Ubiquitous information Systems, MSA 2006 held in conjunction with the IFIP international conference on Embedded and Ubiquitous computing, EUC 2006
The proceedings contain 106 papers. The special focus in this conference is on NCUS 2006 Symposium, SecUbiq 2006 Workshop, USN 2006 Workshop, TRUST 2006 Workshop, ESO 2006 Workshop and MSA 2006 Workshop. The topics in...
来源: 评论
2nd international Symposium on network-Centric Ubiquitous Systems, NCUS 2006, 2nd international Workshop on security in Ubiquitous computing Systems, SecUbiq 2006, 2nd international Workshop on RFID and Ubiquitous Sensor networks, USN 2006, 1st international Workshop on Trustworthiness, Reliability and services in Ubiquitous and Sensor networks, TRUST 2006, 1st international Workshop on Embedded Software Optimization, ESO 2006 and 1st international Workshop on Multimedia Solution and the Assurance in the Ubiquitous information Systems, MSA 2006 held in conjunction with the IFIP international conference on Embedded and Ubiquitous computing, EUC 2006
收藏 引用
28th IFIP WG 6.1 international conference on Formal Techniques for networked and Distributed Systems, FORTE 2008
The proceedings contain 23 papers. The special focus in this conference is on NCUS 2006 Symposium. The topics include: Adaptive router promotion in ad-hoc networks;a utility-based auction cooperation incentive mechani...
来源: 评论
2nd international conference on security and information Technologies with AI, Internet computing and Big-data Applications, SITAIBA 2023
2nd International Conference on Security and Information Tec...
收藏 引用
2nd international conference on security and information Technologies with AI, Internet computing and Big-data Applications, SITAIBA 2023
The proceedings contain 46 papers. The special focus in this conference is on security and information Technologies with AI. The topics include: Authentication of Image Fidelity in Watermarking-QR-Code Approving Copyr...
来源: 评论
Verification and Testing of Chinese information Technology Application Innovation network security for the Tobacco Industry  8th
Verification and Testing of Chinese Information Technology A...
收藏 引用
8th international conference on information Science, Communication and computing
作者: Zeng, Manling Wang, Qiang Yu, Tingyue Cai, Penghua Xin, Weiyang Yao, Jiangyuan Jin, Ting Tobacco Co Ltd Fujian Prov Fuzhou 350001 Peoples R China Hainan Univ Sch Comp Sci & Technol Haikou 570228 Hainan Peoples R China
The tobacco industry faces numerous network security challenges during its digital transformation. With the picture of Chinese information technology application innovation (ITAI), network security issues have become ... 详细信息
来源: 评论
Enhancing trusted computing operation efficiency based on parallel file verification techniques  4
Enhancing trusted computing operation efficiency based on pa...
收藏 引用
4th international conference on network Communication and information security, ICNCIS 2024
作者: Zhang, Zhilong Pan, Fengyan Hou, Haibo Li, Yuan Shanghai Jiaotong University Shanghai China Beijing Chenguang Rongxin Technology Co. Beijing China
Trusted computing technology represents a significant element of cyber security systems, serving to guarantee the integrity and accessibility of data and systems. The incorporation of Trusted computing introduces a se... 详细信息
来源: 评论