咨询与建议

限定检索结果

文献类型

  • 169,123 篇 会议
  • 2,153 篇 期刊文献
  • 1,696 册 图书
  • 14 篇 学位论文
  • 11 篇 专利
  • 5 篇 科技报告

馆藏范围

  • 173,002 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 106,132 篇 工学
    • 88,255 篇 计算机科学与技术...
    • 51,800 篇 软件工程
    • 32,174 篇 信息与通信工程
    • 18,015 篇 电气工程
    • 10,954 篇 控制科学与工程
    • 7,527 篇 生物工程
    • 5,560 篇 电子科学与技术(可...
    • 5,193 篇 网络空间安全
    • 4,760 篇 安全科学与工程
    • 4,228 篇 机械工程
    • 3,987 篇 生物医学工程(可授...
    • 3,650 篇 仪器科学与技术
    • 3,453 篇 动力工程及工程热...
    • 2,744 篇 交通运输工程
    • 2,541 篇 光学工程
    • 1,973 篇 化学工程与技术
  • 27,201 篇 理学
    • 14,183 篇 数学
    • 8,207 篇 生物学
    • 5,061 篇 物理学
    • 4,383 篇 统计学(可授理学、...
    • 3,198 篇 系统科学
    • 2,284 篇 化学
  • 21,949 篇 管理学
    • 13,792 篇 管理科学与工程(可...
    • 9,727 篇 图书情报与档案管...
    • 5,634 篇 工商管理
  • 5,234 篇 法学
    • 3,444 篇 社会学
    • 1,856 篇 法学
  • 4,259 篇 医学
    • 3,318 篇 临床医学
    • 2,848 篇 基础医学(可授医学...
  • 2,069 篇 经济学
    • 2,037 篇 应用经济学
  • 1,282 篇 教育学
  • 1,151 篇 农学
  • 921 篇 文学
  • 656 篇 军事学
  • 184 篇 艺术学
  • 6 篇 哲学
  • 5 篇 历史学

主题

  • 13,473 篇 security
  • 9,309 篇 cloud computing
  • 5,992 篇 network security
  • 5,523 篇 protocols
  • 5,467 篇 information secu...
  • 4,916 篇 computational mo...
  • 4,798 篇 wireless sensor ...
  • 4,694 篇 authentication
  • 4,172 篇 privacy
  • 4,120 篇 internet of thin...
  • 4,027 篇 computer network...
  • 3,969 篇 cryptography
  • 3,896 篇 servers
  • 3,836 篇 feature extracti...
  • 3,750 篇 mobile computing
  • 3,642 篇 routing
  • 3,410 篇 computer archite...
  • 3,249 篇 neural networks
  • 3,187 篇 internet
  • 3,101 篇 deep learning

机构

  • 665 篇 institute of inf...
  • 569 篇 school of cyber ...
  • 322 篇 university of ch...
  • 179 篇 institute of com...
  • 137 篇 chinese acad sci...
  • 136 篇 beijing universi...
  • 126 篇 school of comput...
  • 109 篇 school of cyber ...
  • 109 篇 school of comput...
  • 91 篇 chitkara univers...
  • 89 篇 maharishi school...
  • 86 篇 faculty of infor...
  • 86 篇 school of inform...
  • 84 篇 college of intel...
  • 77 篇 institute of inf...
  • 75 篇 computer network...
  • 72 篇 key laboratory o...
  • 67 篇 univ chinese aca...
  • 66 篇 chinese academy ...
  • 62 篇 shandong provinc...

作者

  • 132 篇 wang lei
  • 106 篇 zhang tao
  • 89 篇 wang wei
  • 80 篇 lei wang
  • 74 篇 jian wang
  • 64 篇 wei wang
  • 62 篇 li wei
  • 57 篇 bin wang
  • 51 篇 yang yang
  • 51 篇 leonard barolli
  • 49 篇 zhang lin
  • 46 篇 rui wang
  • 46 篇 liu yang
  • 44 篇 li hui
  • 43 篇 zhang yuqing
  • 42 篇 zhang wei
  • 41 篇 kim tai-hoon
  • 41 篇 cheng xinzhou
  • 38 篇 yang bin
  • 36 篇 feng liu

语言

  • 169,432 篇 英文
  • 2,493 篇 其他
  • 1,422 篇 中文
  • 11 篇 土耳其文
  • 10 篇 俄文
  • 8 篇 法文
  • 7 篇 葡萄牙文
  • 6 篇 乌克兰文
  • 3 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 德文
检索条件"任意字段=International Conference on Network Computing and Information Security"
173003 条 记 录,以下是11-20 订阅
排序:
An Intelligent and Trust-Enabled Farming Systems With Blockchain and Digital Twins on Mobile Edge computing
收藏 引用
international JOURNAL OF network MANAGEMENT 2025年 第1期35卷
作者: Rathee, Geetanjali Saini, Hemraj Chakkravarthy, Selvaraj Praveen Maheswar, Rajagopal Netaji Subhas Univ Technol Dept CSE New Delhi India DIT Univ Sch Comp Dehra Dun India Dr NGP Inst Technol Dept BME Coimbatore Tamil Nadu India KPR Inst Engn & Technol Ctr IoT & AI CITI Dept ECE Coimbatore Tamil Nadu India
Advancement and flourishment in mobile edge computing (MEC) have motivated the farmers to deploy an efficient ecosystem in their farms. For further real-time monitoring and surveillance of the environment along with t... 详细信息
来源: 评论
Zero Trust network Access (ZTNA) Architecture: A Novel Perspective to Cloud security  3rd
Zero Trust Network Access (ZTNA) Architecture: A Novel Persp...
收藏 引用
3rd international conference on network security and Blockchain Technology
作者: Das, Priyanka Ray, Sangram Govil, Mahesh Chandra Natl Inst Technol Sikkim Dept Comp Sci & Engn Ravangla 737139 Sikkim India
Cloud computing is the development drift of the IT industry. This modern cloud computing has grabbed remarkable attention in recent days owing to its high-quality on-demand service accessibility and flexible nature. I... 详细信息
来源: 评论
Research on dynamic network security detection technology based on SDN  4
Research on dynamic network security detection technology ba...
收藏 引用
4th international conference on network Communication and information security, ICNCIS 2024
作者: Zhao, Kai Beijing Polytechnic Beijing100176 China
Traditional network architecture can no longer meet the development needs of technologies such as cloud computing and big data. SDN network architecture has the characteristics of high openness and programmability, wh... 详细信息
来源: 评论
information security requirements in monitoring e-government systems  4
Information security requirements in monitoring e-government...
收藏 引用
4th international conference on Evolutionary computing and Mobile Sustainable networks, ICECMSN 2024
作者: Gafurov, Azam Botirov, Fayzullajon 108 Amir Temur Tashkent Uzbekistan
This article examines the requirements for information security in monitoring e-government systems. It discusses the information security framework for eGoverment system, a model for organizing multi-level network sec... 详细信息
来源: 评论
Research on Sports Data security Protection Based on One-Shot Aggregation and Generation Adversarial network
收藏 引用
international Journal of network security 2025年 第2期27卷 248-255页
作者: Zheng, Hongyan Qi, Lan Wu, Fei Dalian City116000 China Dalian City116000 China
The application of big data in the cloud computing environment has become more and more common. The advantage of big data is another leap in the role of modern computer technology. The interpretation of big data, data... 详细信息
来源: 评论
Trust Collaboration for Edge computing  24
Trust Collaboration for Edge Computing
收藏 引用
14th international conference on Communication and network security, ICCNS 2024
作者: Dong, Jie Wen Kang, Xi Nai Peng, Jin Jiang, Xuan Ming Zhu, Tao Jun Information Technology Department National Key Laboratory of Seience and Technology on Aerospace Intelligence Control Beijing Aerospace Automatic Control Institute BeiJing China School of Computer Science Beijing University of Technology BeiJing China
As edge computing becomes an increasingly important computing model, trust management and security issues are becoming more severe. Problems such as malicious node attacks and trust isolation pose threats to the secur... 详细信息
来源: 评论
Design and Analysis of Optimized Power Internet of Things System Based on Edge computing
Design and Analysis of Optimized Power Internet of Things Sy...
收藏 引用
2024 international conference Optoelectronic information and Optical Engineering, OIOE 2024
作者: Yu, Fei Rao, Wei Liu, Mingliu Li, Yiwen State Grid Hubei Electric Power Co. Ltd. China State Grid Hubei Electric Power Co. Ltd. Electric Power Science Research Institute China
In the development of China's power Internet construction, in order to better meet the characteristics of network transportation, the key technology to the edge computing framework as the core has been highly valu... 详细信息
来源: 评论
Routing in IoT network Using NetSim Simulator  5th
Routing in IoT Network Using NetSim Simulator
收藏 引用
5th international conference on computing Science, Communication and security
作者: Goyal, Divyanshi Sonam Yadav, Anjali Alfred, Manan Johari, Rahul Guru Gobind Singh Indraprastha Univ SWINGER Secur Wireless IoT Network Grp Engn & Res Lab Univ Sch Automat & Robot USAR East Delhi Campus Delhi 110032 India
As is widely recognized, a prevalent term in the realm of information Technology (IT) these days is the Internet of Things (IoT). IoT is a revolutionary paradigm in the world of networks which primarily focuses on sha... 详细信息
来源: 评论
Risk Assessment of Computer network information security in the Context of Artificial Intelligence  14th
Risk Assessment of Computer Network Information Security in ...
收藏 引用
14th international conference on Frontier computing, FC 2024
作者: Sun, Chenyao Computer Systems Engineering University of Glasgow GlasgowG128QQ United Kingdom
This paper is based on artificial intelligence environment, combined with artificial neural network to quantify the evaluation index. By connecting the number of nodes to determine the input signal dimension to, from ... 详细信息
来源: 评论
Edge computing security of Mobile Communication System Based on Computer Algorithms
收藏 引用
international JOURNAL OF COOPERATIVE information SYSTEMS 2025年 第1期34卷
作者: Zhang, Jinna Zhengzhou Vocat Coll Finance & Taxat Dept Informat Technol Zhengzhou 450000 Henan Peoples R China
With the progress of information technology recently, mobile communication system edge computing (EC) has been widely used in all walks of life, but the traditional mobile communication system EC mode has security pro... 详细信息
来源: 评论