咨询与建议

限定检索结果

文献类型

  • 170,303 篇 会议
  • 2,134 篇 期刊文献
  • 1,713 册 图书
  • 11 篇 学位论文
  • 11 篇 专利
  • 2 篇 科技报告

馆藏范围

  • 174,175 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 106,590 篇 工学
    • 88,614 篇 计算机科学与技术...
    • 52,077 篇 软件工程
    • 32,297 篇 信息与通信工程
    • 18,083 篇 电气工程
    • 11,036 篇 控制科学与工程
    • 7,532 篇 生物工程
    • 5,574 篇 电子科学与技术(可...
    • 5,242 篇 网络空间安全
    • 4,806 篇 安全科学与工程
    • 4,245 篇 机械工程
    • 3,998 篇 生物医学工程(可授...
    • 3,655 篇 仪器科学与技术
    • 3,467 篇 动力工程及工程热...
    • 2,780 篇 交通运输工程
    • 2,574 篇 光学工程
    • 1,983 篇 化学工程与技术
  • 27,291 篇 理学
    • 14,240 篇 数学
    • 8,211 篇 生物学
    • 5,092 篇 物理学
    • 4,406 篇 统计学(可授理学、...
    • 3,202 篇 系统科学
    • 2,288 篇 化学
  • 22,076 篇 管理学
    • 13,862 篇 管理科学与工程(可...
    • 9,793 篇 图书情报与档案管...
    • 5,673 篇 工商管理
  • 5,280 篇 法学
    • 3,463 篇 社会学
    • 1,884 篇 法学
  • 4,276 篇 医学
    • 3,339 篇 临床医学
    • 2,868 篇 基础医学(可授医学...
  • 2,072 篇 经济学
    • 2,040 篇 应用经济学
  • 1,298 篇 教育学
  • 1,156 篇 农学
  • 920 篇 文学
  • 656 篇 军事学
  • 184 篇 艺术学
  • 6 篇 哲学
  • 5 篇 历史学

主题

  • 13,591 篇 security
  • 9,354 篇 cloud computing
  • 6,048 篇 network security
  • 5,549 篇 protocols
  • 5,474 篇 information secu...
  • 5,015 篇 computational mo...
  • 4,810 篇 wireless sensor ...
  • 4,722 篇 authentication
  • 4,208 篇 privacy
  • 4,166 篇 internet of thin...
  • 4,024 篇 computer network...
  • 3,982 篇 cryptography
  • 3,927 篇 servers
  • 3,927 篇 feature extracti...
  • 3,751 篇 mobile computing
  • 3,662 篇 routing
  • 3,428 篇 computer archite...
  • 3,268 篇 neural networks
  • 3,196 篇 internet
  • 3,188 篇 deep learning

机构

  • 707 篇 institute of inf...
  • 606 篇 school of cyber ...
  • 331 篇 university of ch...
  • 180 篇 institute of com...
  • 137 篇 chinese acad sci...
  • 134 篇 beijing universi...
  • 128 篇 school of comput...
  • 114 篇 school of cyber ...
  • 112 篇 school of comput...
  • 100 篇 key laboratory o...
  • 91 篇 chitkara univers...
  • 91 篇 college of intel...
  • 89 篇 maharishi school...
  • 88 篇 school of inform...
  • 86 篇 faculty of infor...
  • 77 篇 institute of inf...
  • 76 篇 computer network...
  • 75 篇 chinese academy ...
  • 71 篇 univ chinese aca...
  • 64 篇 shandong provinc...

作者

  • 130 篇 wang lei
  • 107 篇 zhang tao
  • 89 篇 wang wei
  • 82 篇 lei wang
  • 74 篇 jian wang
  • 65 篇 wei wang
  • 62 篇 li wei
  • 57 篇 bin wang
  • 53 篇 yang yang
  • 51 篇 leonard barolli
  • 49 篇 rui wang
  • 49 篇 zhang lin
  • 46 篇 liu yang
  • 46 篇 li hui
  • 45 篇 zhang yuqing
  • 42 篇 zhang wei
  • 41 篇 kim tai-hoon
  • 41 篇 cheng xinzhou
  • 38 篇 yang bin
  • 37 篇 feng liu

语言

  • 160,643 篇 英文
  • 12,449 篇 其他
  • 1,741 篇 中文
  • 10 篇 俄文
  • 10 篇 土耳其文
  • 8 篇 法文
  • 7 篇 葡萄牙文
  • 6 篇 乌克兰文
  • 3 篇 西班牙文
  • 2 篇 德文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
检索条件"任意字段=International Conference on Network Computing and Information Security"
174176 条 记 录,以下是31-40 订阅
排序:
HiSec: Towards Cyber Threat Correlation and Discovery Based on Hierarchical Graph Neural networks  22
HiSec: Towards Cyber Threat Correlation and Discovery Based ...
收藏 引用
IEEE 22nd international conference on Trust, security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Xu, Liwen Lin, Xiang Li, Jianhua Bai, Min Wang, Liejun Shanghai Jiao Tong Univ Inst Cyber Sci & Technol Shanghai Peoples R China Qianxin Technol Grp Co LTD Qianxin Threat Intelligence Ctr Beijing Peoples R China
A multi-step targeted cyberattack refers to a sophisticated, systematic, and persistent form of attack aiming to compromise the security and integrity of a complex network system. These attacks exhibit spatial and tem... 详细信息
来源: 评论
5G/5G-A Private network: Construction, Operation and Applications  22
5G/5G-A Private Network: Construction, Operation and Applica...
收藏 引用
IEEE 22nd international conference on Trust, security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Xu, Lexi Zhao, Junsheng Zhu, Hong Huo, Mingde Cheng, Xinzhou Chao, Kun Li, Jie Guan, Jian Liu, Xiqing Gao, Jie China United Network Commun Corp Res Inst Beijing Peoples R China China Assoc Commun Enterprises Beijing Peoples R China China Natl Inst Standardizat Beijing Peoples R China China United Network Commun Corp Chongqing Branch Chongqing Peoples R China
In recent years, 5G/5G-A technology has fast developed and found widespread deployment, meeting the diverse requirements of application scenarios across various industries. In this paper, we introduce the principle an... 详细信息
来源: 评论
Application Scenarios of Confidential computing in Satellite Internet  22
Application Scenarios of Confidential Computing in Satellite...
收藏 引用
IEEE 22nd international conference on Trust, security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Ren, Jie Lin, Lin Xue, Miao Wang, Zelin China Unicom Res Inst Beijing 100048 Peoples R China
To satisfy the increasing demand for ubiquitous networks, Satellite Internet has attracted considerable attention from both academia and industry. This innovative modality, comparing with terrestrial 4G/5G networks, p... 详细信息
来源: 评论
HiDRNet: Hiding image with Deep Reversible network  24
HiDRNet: Hiding image with Deep Reversible Network
收藏 引用
5th international conference on computing, networks and Internet of Things (CNIOT)
作者: Li, Yunlong Zeng, Weiwei Li, Lei Yunnan Univ Engn Res Ctr Cyberspace Natl Pilot Sch Software Kunming Yunnan Peoples R China
Image hiding task is an important task in the field of information security, where the main objectives are to ensure image quality, payload, and undetectability while hiding secret images. Nowadays, deep learning-base... 详细信息
来源: 评论
Protecting Sensitive Data in the Cloud: A network security Approach  15
Protecting Sensitive Data in the Cloud: A Network Security A...
收藏 引用
15th international conference on computing Communication and networking Technologies, ICCCNT 2024
作者: Mohammed, Abdul Sajid Sreeramulu, Madhusudhan Dasari Gopal, Santhosh Kumar Gupta, Ketan Anand Kumar, V. University of the Cumberlands Dept of School of Computer and Information Sciences KY United States American Express Dept of Cyber Security United States Charlotte NC United States University of The Cumberlands Dept. of Information Technology WilliamsburgKY United States Sri Eshwar College of Engineering Department of Ece Tamil Nadu Coimbatore641202 India
Cloud computing adoption has increased dramatically over the past few years, making the protection of sensitive data on the cloud a major concern. In this paper network security is presented as an effective way to ens... 详细信息
来源: 评论
Research on key distribution methods supporting trusted data migration of cloud platform
Research on key distribution methods supporting trusted data...
收藏 引用
2024 international conference on Computer network security and Software Engineering, CNSSE 2024
作者: Tian, Fuqiang Mou, Jun Liu, Angang Zhu, Zhongkui Lin, Maonan Wu, Hongyu Zhongdian Qixing Information Technology Co. Ltd. Sichuan Chengdu610000 China
Cloud computing is a significant leap in the development process of the information industry. It integrates computing, storage, network, and other information resources organically, providing more convenient means for... 详细信息
来源: 评论
Research on Diagnosis System of 5G Data Service Latency Problem  22
Research on Diagnosis System of 5G Data Service Latency Prob...
收藏 引用
IEEE 22nd international conference on Trust, security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Qiao, Jinjian Xu, Guoping Meng, Ning Lyu, Feibi Cheng, Xinzhou Zhu, Jiajia Xu, Lexi Liu, Liang China United Network Commun Corp Res Inst Beijing Peoples R China China United Network Commun Corp Grp Co Beijing Peoples R China
When the data service latency of mobile network is too large, it will cause problems such as slow page opening, game stuck, video stuck and seriously affect user perception. Therefore, optimizing the network and reduc... 详细信息
来源: 评论
Assessing Cooperative Trust-Based Authentication within Micro Vehicular Clouds
Assessing Cooperative Trust-Based Authentication within Micr...
收藏 引用
international conference on Smart Applications, Communications and networking (SmartNets)
作者: Ghazizadeh, Puya Choudhury, Pushpa Singh, Brandon Ebrahimi, Alireza St Johns Univ Div Comp Sci Math & Sci New York NY 11432 USA SUNY Old Westbury Sch Business Old Westbury NY USA
Vehicular Cloud (VC) computing is described as a network of vehicles capable of sharing information and various resources, including computational power, storage, and bandwidth, among drivers. Vehicles in a connected ... 详细信息
来源: 评论
Parallel Pattern Matching over Brotli Compressed network Traffic  22
Parallel Pattern Matching over Brotli Compressed Network Tra...
收藏 引用
IEEE 22nd international conference on Trust, security and Privacy in computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Sun, Xiuwen Zhang, Guangzheng Wu, Di Yu, Qingying Cui, Jie Zhong, Hong Anhui Univ Sch Comp Sci & Technol Hefei Peoples R China Anhui Normal Univ Anhui Prov Key Lab Network & Informat Sci Hefei Peoples R China
Pattern matching is a crucial technique for network traffic detection applications. As a fundamental computation model used by pattern matching, the finite state automata execute sequential matching due to the state d... 详细信息
来源: 评论
Data Protection in Cloud computing Environment: New Dimension of network information security  1
Data Protection in Cloud Computing Environment: New Dimensio...
收藏 引用
1st international conference on Software, Systems and information Technology, SSITCON 2024
作者: Liu, Hua The Third Research Institute of the Ministry of Public Security Shanghai Xuhui China
Against the backdrop of continuous development of computer technology, the service scope of the network system is constantly expanding, and the service capability is significantly improving to meet the growing materia... 详细信息
来源: 评论