咨询与建议

限定检索结果

文献类型

  • 15,044 篇 会议
  • 100 篇 期刊文献
  • 80 册 图书
  • 1 篇 学位论文

馆藏范围

  • 15,225 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,741 篇 工学
    • 8,090 篇 计算机科学与技术...
    • 4,339 篇 软件工程
    • 3,255 篇 信息与通信工程
    • 2,106 篇 电气工程
    • 819 篇 控制科学与工程
    • 457 篇 网络空间安全
    • 378 篇 安全科学与工程
    • 345 篇 电子科学与技术(可...
    • 279 篇 仪器科学与技术
    • 261 篇 生物工程
    • 239 篇 机械工程
    • 199 篇 动力工程及工程热...
    • 166 篇 交通运输工程
    • 117 篇 生物医学工程(可授...
    • 110 篇 建筑学
    • 104 篇 土木工程
    • 100 篇 材料科学与工程(可...
  • 1,582 篇 管理学
    • 1,116 篇 管理科学与工程(可...
    • 557 篇 图书情报与档案管...
    • 444 篇 工商管理
  • 1,400 篇 理学
    • 765 篇 数学
    • 292 篇 生物学
    • 211 篇 系统科学
    • 207 篇 物理学
    • 196 篇 统计学(可授理学、...
  • 1,104 篇 法学
    • 913 篇 法学
    • 224 篇 社会学
  • 186 篇 经济学
    • 181 篇 应用经济学
  • 183 篇 医学
    • 132 篇 临床医学
    • 108 篇 基础医学(可授医学...
  • 64 篇 文学
  • 60 篇 军事学
  • 57 篇 教育学
  • 38 篇 农学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 2,244 篇 security
  • 1,157 篇 quality of servi...
  • 1,034 篇 network security
  • 827 篇 denial-of-servic...
  • 672 篇 cloud computing
  • 625 篇 authentication
  • 547 篇 protocols
  • 438 篇 internet of thin...
  • 425 篇 computer crime
  • 397 篇 servers
  • 386 篇 data security
  • 370 篇 intrusion detect...
  • 365 篇 communication sy...
  • 339 篇 routing
  • 337 篇 computer archite...
  • 315 篇 information secu...
  • 297 篇 wireless sensor ...
  • 297 篇 internet
  • 291 篇 privacy
  • 273 篇 monitoring

机构

  • 61 篇 institute of inf...
  • 54 篇 school of cyber ...
  • 35 篇 beijing universi...
  • 28 篇 chinese acad sci...
  • 28 篇 univ chinese aca...
  • 27 篇 state key labora...
  • 27 篇 beijing univ pos...
  • 25 篇 chitkara univers...
  • 24 篇 university of ch...
  • 21 篇 china electric p...
  • 20 篇 univ chinese aca...
  • 18 篇 beijing univ pos...
  • 17 篇 guilin huigu ins...
  • 17 篇 key laboratory o...
  • 17 篇 state key labora...
  • 14 篇 school of cyber ...
  • 14 篇 school of comput...
  • 14 篇 chinese academy ...
  • 14 篇 electronics and ...
  • 14 篇 shandong provinc...

作者

  • 19 篇 zhang tao
  • 19 篇 wang wei
  • 16 篇 de laat cees
  • 15 篇 tao zhang
  • 13 篇 wei li
  • 13 篇 xu wu
  • 12 篇 luo xiaonan
  • 11 篇 zhang yan
  • 10 篇 cheng xinzhou
  • 10 篇 zhang lei
  • 10 篇 yao wenbin
  • 10 篇 li li
  • 10 篇 wang chao
  • 10 篇 wang he
  • 10 篇 ghita bogdan
  • 9 篇 liu yang
  • 9 篇 manickam selvaku...
  • 9 篇 festor olivier
  • 9 篇 li yong
  • 9 篇 cees de laat

语言

  • 14,973 篇 英文
  • 142 篇 其他
  • 128 篇 中文
  • 3 篇 土耳其文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"任意字段=International Conference on Network and Service Security"
15225 条 记 录,以下是1-10 订阅
排序:
2009 international conference on network and service security, N2S 2009
2009 International Conference on Network and Service Securit...
收藏 引用
2009 international conference on network and service security, N2S 2009
The proceedings contain 35 papers. The topics discussed include: a prior distribution for anti-spam statistical Bayesian model;a PVSS scheme based on Boolean operations with improved contrast;adaptive trust aware comm...
来源: 评论
Report on the 4th international conference on Autonomous Infrastructures, Management, and security (AIMS 2010) and the international Summer School on network and service Management (ISSNSM 2010)
收藏 引用
JOURNAL OF network AND SYSTEMS MANAGEMENT 2011年 第1期19卷 130-136页
作者: Stiller, Burkhard De Turck, Filip Morariu, Cristian Waldburger, Martin Univ Zurich CSG IFI CH-8050 Zurich Switzerland Univ Ghent IBBT B-9050 Ghent Belgium
This article contains the report on AIMS 2010, which was held June 23-25, 2010 at the Department of Informatics ( IFI), University of Zurich, Switzerland and which was driven by the theme "Mechanisms for Autonomo... 详细信息
来源: 评论
Report on the 4th international conference on Autonomous Infrastructures, Management, and security (AIMS 2010) and the international Summer School on network and service Management (ISSNSM 2010)
Report on the 4th International Conference on Autonomous Inf...
收藏 引用
作者: Stiller, Burkhard De Turck, Filip Morariu, Cristian Waldburger, Martin University of Zürich CSG at IFI Binzmühlestrasse 14 CH-8050 Zürich Switzerland Ghent University-IBBT Gaston Crommenlaan 8 Ghent 9050 Belgium
This article contains the report on AIMS 2010, which was held June 23-25, 2010 at the Department of Informatics (IFI), University of Zürich, Switzerland and which was driven by the theme "Mechanisms for Auto... 详细信息
来源: 评论
Zero Trust network Access (ZTNA) Architecture: A Novel Perspective to Cloud security  3rd
Zero Trust Network Access (ZTNA) Architecture: A Novel Persp...
收藏 引用
3rd international conference on network security and Blockchain Technology
作者: Das, Priyanka Ray, Sangram Govil, Mahesh Chandra Natl Inst Technol Sikkim Dept Comp Sci & Engn Ravangla 737139 Sikkim India
Cloud computing is the development drift of the IT industry. This modern cloud computing has grabbed remarkable attention in recent days owing to its high-quality on-demand service accessibility and flexible nature. I... 详细信息
来源: 评论
A method of service content prefetching based on node portrait  4
A method of service content prefetching based on node portra...
收藏 引用
4th international conference on network Communication and Information security, ICNCIS 2024
作者: Jia, Feng Kong, Lei Guo, Le-Meng Sun, Kai College of Information and Communication National University of Defence Technology Wuhan430000 China
Focusing on the service access requirements of edge nodes, aiming at the problems of narrow network bandwidth, poor network quality and low transmission rate of the edge nodes, a node service dynamic demand prediction... 详细信息
来源: 评论
service similarity based k-anonymity location privacy preserving method for internet of vehicles  4
Service similarity based k-anonymity location privacy preser...
收藏 引用
4th international conference on network Communication and Information security, ICNCIS 2024
作者: Ren, Xuwei Jin, Zhexue Li, Yongzhen Network Security Laboratory Yanbian University Yanji China
Aiming at the shortcomings of current location privacy protection methods for internet of vehicles (IoV) in terms of balancing location privacy and service availability, high communication overhead, and susceptibility... 详细信息
来源: 评论
FlowShredder: A Protocol-Independent in-network security service in the Cloud  22nd
FlowShredder: A Protocol-Independent in-Network Security Ser...
收藏 引用
22nd international conference on service Oriented Computing
作者: Song, Bin Sun, Bin Fu, Qiang Li, Hao Xi An Jiao Tong Univ Xian Peoples R China RMIT Univ Melbourne Vic Australia
Cloud services increasingly generates enormous Internet traffic. Much of it such as rich media traffic is not highly sensitive, but prefers some sort of protection. The traditional end-to-end encryption such as TLS is... 详细信息
来源: 评论
Detecting Distributed Denial of service (DDoS) Attacks in a Multi-controller SDN Environment Utilizing Machine Learning  5th
Detecting Distributed Denial of Service (DDoS) Attacks in a ...
收藏 引用
5th international conference on Computing Science, Communication and security
作者: Sanghani, Nishant Vaghela, Gunjani Borisaniya, Bhavesh Gujarat Technol Univ Ahmadabad India Atmiya Univ Rajkot India Shantilal Shah Engn Coll Bhavnagar India
Software Define network is a platform for network architecture used to create and design the virtual network hardware components, so it can be modified with dynamic connection settings with ease of implementation. The... 详细信息
来源: 评论
Short Paper: Onion Messages on Leash  28th
Short Paper: Onion Messages on Leash
收藏 引用
28th international conference on Financial Cryptography and Data security
作者: Bashiri, Amin Khabbazian, Majid Univ Alberta Edmonton AB Canada
Onion messages (OMs) are private messages sent between nodes in the Lightning network (LN) using onion routing. While they are intended to enable interesting applications such as static invoices, refunds, and asynchro... 详细信息
来源: 评论
Choreography-Defined networks: A Case Study on DoS Mitigation  22nd
Choreography-Defined Networks: A Case Study on DoS Mitigatio...
收藏 引用
22nd international conference on service Oriented Computing
作者: Giallorenzo, Saverio Mauro, Jacopo Melis, Andrea Montesi, Fabrizio Peressotti, Marco Prandini, Marco Univ Bologna Bologna Italy INRIA Sophia Antipolis France Univ Southern Denmark Odense Denmark
Software-defined networking and network function virtualization have brought unparalleled flexibility in defining and managing network architectures. With the widespread diffusion of cloud platforms, more resources ar... 详细信息
来源: 评论