咨询与建议

限定检索结果

文献类型

  • 169,123 篇 会议
  • 2,153 篇 期刊文献
  • 1,696 册 图书
  • 14 篇 学位论文
  • 11 篇 专利
  • 5 篇 科技报告

馆藏范围

  • 173,002 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 106,132 篇 工学
    • 88,255 篇 计算机科学与技术...
    • 51,800 篇 软件工程
    • 32,174 篇 信息与通信工程
    • 18,015 篇 电气工程
    • 10,954 篇 控制科学与工程
    • 7,527 篇 生物工程
    • 5,560 篇 电子科学与技术(可...
    • 5,193 篇 网络空间安全
    • 4,760 篇 安全科学与工程
    • 4,228 篇 机械工程
    • 3,987 篇 生物医学工程(可授...
    • 3,650 篇 仪器科学与技术
    • 3,453 篇 动力工程及工程热...
    • 2,744 篇 交通运输工程
    • 2,541 篇 光学工程
    • 1,973 篇 化学工程与技术
  • 27,201 篇 理学
    • 14,183 篇 数学
    • 8,207 篇 生物学
    • 5,061 篇 物理学
    • 4,383 篇 统计学(可授理学、...
    • 3,198 篇 系统科学
    • 2,284 篇 化学
  • 21,949 篇 管理学
    • 13,792 篇 管理科学与工程(可...
    • 9,727 篇 图书情报与档案管...
    • 5,634 篇 工商管理
  • 5,234 篇 法学
    • 3,444 篇 社会学
    • 1,856 篇 法学
  • 4,259 篇 医学
    • 3,318 篇 临床医学
    • 2,848 篇 基础医学(可授医学...
  • 2,069 篇 经济学
    • 2,037 篇 应用经济学
  • 1,282 篇 教育学
  • 1,151 篇 农学
  • 921 篇 文学
  • 656 篇 军事学
  • 184 篇 艺术学
  • 6 篇 哲学
  • 5 篇 历史学

主题

  • 13,473 篇 security
  • 9,309 篇 cloud computing
  • 5,992 篇 network security
  • 5,523 篇 protocols
  • 5,467 篇 information secu...
  • 4,916 篇 computational mo...
  • 4,798 篇 wireless sensor ...
  • 4,694 篇 authentication
  • 4,172 篇 privacy
  • 4,120 篇 internet of thin...
  • 4,027 篇 computer network...
  • 3,969 篇 cryptography
  • 3,896 篇 servers
  • 3,836 篇 feature extracti...
  • 3,750 篇 mobile computing
  • 3,642 篇 routing
  • 3,410 篇 computer archite...
  • 3,249 篇 neural networks
  • 3,187 篇 internet
  • 3,101 篇 deep learning

机构

  • 665 篇 institute of inf...
  • 569 篇 school of cyber ...
  • 322 篇 university of ch...
  • 179 篇 institute of com...
  • 137 篇 chinese acad sci...
  • 136 篇 beijing universi...
  • 126 篇 school of comput...
  • 109 篇 school of cyber ...
  • 109 篇 school of comput...
  • 91 篇 chitkara univers...
  • 89 篇 maharishi school...
  • 86 篇 faculty of infor...
  • 86 篇 school of inform...
  • 84 篇 college of intel...
  • 77 篇 institute of inf...
  • 75 篇 computer network...
  • 72 篇 key laboratory o...
  • 67 篇 univ chinese aca...
  • 66 篇 chinese academy ...
  • 62 篇 shandong provinc...

作者

  • 132 篇 wang lei
  • 106 篇 zhang tao
  • 89 篇 wang wei
  • 80 篇 lei wang
  • 74 篇 jian wang
  • 64 篇 wei wang
  • 62 篇 li wei
  • 57 篇 bin wang
  • 51 篇 yang yang
  • 51 篇 leonard barolli
  • 49 篇 zhang lin
  • 46 篇 rui wang
  • 46 篇 liu yang
  • 44 篇 li hui
  • 43 篇 zhang yuqing
  • 42 篇 zhang wei
  • 41 篇 kim tai-hoon
  • 41 篇 cheng xinzhou
  • 38 篇 yang bin
  • 36 篇 feng liu

语言

  • 169,432 篇 英文
  • 2,493 篇 其他
  • 1,422 篇 中文
  • 11 篇 土耳其文
  • 10 篇 俄文
  • 8 篇 法文
  • 7 篇 葡萄牙文
  • 6 篇 乌克兰文
  • 3 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 德文
检索条件"任意字段=International Conference on Network Computing and Information Security"
173003 条 记 录,以下是11-20 订阅
排序:
Research on the Application of Distributed Intrusion Detection System in Campus network
Research on the Application of Distributed Intrusion Detecti...
收藏 引用
2024 international conference on Optimization computing and Wireless Communication, ICOCWC 2024
作者: Wang, Yongkang Zhang, Meixia College of Information Technology Shandong Provinee Weifang City261061 China
The application of Distributed Intrusion Detection System (DIDS) in campus network is a security technology which aims at monitoring and analyzing network attacks. With the increasing number of campus network users an... 详细信息
来源: 评论
Channel-Robust Radio Frequency Fingerprint Identification for LTE Devices with Hybrid Feature  22
Channel-Robust Radio Frequency Fingerprint Identification fo...
收藏 引用
IEEE 22nd international conference on Trust, security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Peng, Haichuan Peng, Linning Fu, Hua Xie, Lingnan Shi, Junxian Jing, Wentao Southeast Univ Sch Cyber Sci & Engn Nanjing Peoples R China Purple Mt Labs Network & Commun Secur Nanjing Peoples R China
Radio frequency fingerprint (RFF) identification as a physical layer authentication technique by leveraging devices' unique hardware-level imperfections in transmitted signals has been considered as a potential co... 详细信息
来源: 评论
HardWhale: A Hardware-isolated network security Enforcement System for Cloud Environments  44
HardWhale: A Hardware-isolated Network Security Enforcement ...
收藏 引用
44th IEEE international conference on Distributed computing Systems (ICDCS)
作者: You, Myoungsung Nam, Jaehyun Seo, Hyunmin Seo, Minjae Kim, Jaehan Choi, Dongmin Shin, Seungwon Korea Adv Inst Sci & Technol Daejeon South Korea Dankook Univ Yongin South Korea
With the increasing popularity of containers for deploying microservices, ensuring the security of container networks has become a vital concern. However, current security solutions rely on a host's operating syst... 详细信息
来源: 评论
Design of automatic monitoring system for network information security in cloud computing environment
收藏 引用
international JOURNAL OF information AND COMPUTER security 2023年 第1-2期21卷 19-34页
作者: Niu, Jing Nanyang Med Coll Comp Teaching & Res Sect Nanyang 473000 Peoples R China
Aiming at the problems of incomplete monitoring, slow response speed and low accuracy of the existing network information security automatic monitoring system, the paper designs an automatic network information securi... 详细信息
来源: 评论
Extracting Length Field of Unknown Binary network Protocol from Static Trace  22
Extracting Length Field of Unknown Binary Network Protocol f...
收藏 引用
IEEE 22nd international conference on Trust, security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Sun, Xiuwen Wu, Zhihao Lin, Jing Fu, Pengfei Cui, Jie Zhong, Hong Anhui Univ Sch Comp Sci & Technol Hefei Peoples R China
network protocol specification is essential in analyzing and evaluating network functionality, performance, and security. However, increasing private protocols become a hindrance to these features. The existing works ... 详细信息
来源: 评论
Enhancing trusted computing operation efficiency based on parallel file verification techniques  4
Enhancing trusted computing operation efficiency based on pa...
收藏 引用
4th international conference on network Communication and information security, ICNCIS 2024
作者: Zhang, Zhilong Pan, Fengyan Hou, Haibo Li, Yuan Shanghai Jiaotong University Shanghai China Beijing Chenguang Rongxin Technology Co. Beijing China
Trusted computing technology represents a significant element of cyber security systems, serving to guarantee the integrity and accessibility of data and systems. The incorporation of Trusted computing introduces a se... 详细信息
来源: 评论
Analysis and Comparison of Delay Tolerant network security Issues and Solutions  22
Analysis and Comparison of Delay Tolerant Network Security I...
收藏 引用
IEEE 22nd international conference on Trust, security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Sun, Jingwen Bai, Xiangyu Zhou, Kaxin Inner Mongolia Univ Coll Comp Inner Mongolia Key Lab Wireless Networking & Mobi Hohhot Peoples R China
Delay Tolerant network (DTN) is a network model designed for special environments. It is designed to be used in challenging network environments with high latency levels, bandwidth constraints, and unstable data trans... 详细信息
来源: 评论
Research on Cloud computing network security Design Based on OpenFlow  7
Research on Cloud Computing Network Security Design Based on...
收藏 引用
7th IEEE international conference on information Systems and Computer Aided Education, ICISCAE 2024
作者: Bian, Jianling Chen, Yukun Song, Zhenqian Jiao, Wentao Chi, Yulin Beijing China-Power Information Technology Co. Ltd. Beijing China
The rapid popularization of cloud computing has put forward higher requirements for network security, and the traditional network architecture is difficult to cope with the complex security requirements in the cloud c... 详细信息
来源: 评论
MECHATRON - security Analysis of 6G and 5G networks Using Multiaccess Edge computing  15
MECHATRON - Security Analysis of 6G and 5G Networks Using Mu...
收藏 引用
15th international conference on networks of the Future
作者: Berardi, Davide Martini, Barbara Univ Mercatorum Dept Sci & Engn Rome Italy
network security is a continuously evolving procedure now present in every aspect of communications. 5G and 6G networks are examples of networks that can suffer from network security problems and become critical asset... 详细信息
来源: 评论
TGCN-DA: A Temporal Graph Convolutional network with Data Augmentation for High Accuracy Insider Threat Detection  22
TGCN-DA: A Temporal Graph Convolutional Network with Data Au...
收藏 引用
IEEE 22nd international conference on Trust, security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Li, Ximing Li, Linghui Li, Xiaoyong Cai, Binsi Li, Bingyu Beijing Univ Posts & Telecommun Key Lab Trustworthy Distributed Comp & Serv Minist Educ Beijing Peoples R China Beihang Univ Sch Cyber Sci & Technol Beijing Peoples R China
Insider threats present a formidable challenge to cybersecurity, as insiders possess the privileges and information necessary to execute diverse attacks. A comprehensive analysis of user behavior, including behavioral... 详细信息
来源: 评论