咨询与建议

限定检索结果

文献类型

  • 4,982 篇 会议
  • 280 册 图书
  • 89 篇 期刊文献

馆藏范围

  • 5,351 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,876 篇 工学
    • 2,567 篇 计算机科学与技术...
    • 1,716 篇 软件工程
    • 978 篇 信息与通信工程
    • 373 篇 电气工程
    • 304 篇 控制科学与工程
    • 183 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 121 篇 电子科学与技术(可...
    • 121 篇 安全科学与工程
    • 112 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 44 篇 交通运输工程
  • 615 篇 理学
    • 368 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 101 篇 统计学(可授理学、...
    • 85 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 185 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 240 篇 法学
    • 165 篇 法学
    • 81 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 500 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,230 篇 英文
  • 90 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5351 条 记 录,以下是1-10 订阅
Recent Trends in computer networks and distributed systems security - international conference, snds 2012, Proceedings
Recent Trends in Computer Networks and Distributed Systems S...
收藏 引用
international conference on security in computer networks and distributed systems, snds 2012
The proceedings contain 48 papers. The topics discussed include: a novel key management mechanism for dynamic hierarchical access control based on linear polynomials;publicly auditable provable data possession scheme ...
来源: 评论
2nd international conference on security in computer networks and distributed systems, snds 2014
2nd International Conference on Security in Computer Network...
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
The proceedings contain 49 papers. The special focus in this conference is on security in computer networks and distributed systems. The topics include: Collaborative approach for data integrity verification in cloud ...
来源: 评论
TruChain: A Blockchain-based Access Control to Improve the security of Smart Water Grid systems  17
TruChain: A Blockchain-based Access Control to Improve the S...
收藏 引用
17th international conference on COMmunication systems and networks, COMSNETS 2025
作者: Mondal, Susmita Chakraborty, Suchetana Indian Institute of Technology Department of Computer Science and Engineering Jodhpur India
Water is a significant resource in day-to-day life, and it usually requires technological association for comprehensive management. Smart Water Grids (SWG) typically use cyberphysical systems (CPS) to monitor several ... 详细信息
来源: 评论
The Virtual computer networks Lab: On the Design and Implementation of a Location Independent networks Laboratory in Higher Education  17
The Virtual Computer Networks Lab: On the Design and Impleme...
收藏 引用
17th international conference on computer Supported Education, CSEDU 2025
作者: Baun, Christian Kappes, Martin Cocos, Henry-Norbert Koch, Malte Petrozziello, Maurizio Department of Computer Science and Engineerung Frankfurt University of Applied Sciences Nibelungeplatz 1 Frankfurt am MainD-60318 Germany
This paper describes a novel virtual platform for university teaching, which in particular allows the creation and use of complex IT infrastructures even for non-experts. Until now, complex network infrastructures in ... 详细信息
来源: 评论
Enhancing Peer-to-Peer Network security using 3D Convolutional Autoencoder based Anomaly Detection  1
Enhancing Peer-to-Peer Network Security using 3D Convolution...
收藏 引用
1st international conference on Intelligent systems and Computational networks, ICISCN 2025
作者: Rana Veer Samara Sihman Bharattej, R. Ajznblasm, Zaid Satish, E.G. Adlin Sylvia, A. Devi, M. Saint Leo University Department of Computer Science FL United States The Islamic University of Al Diwaniyah College of Technical Engineering Department of Computers Techniques Engineering Al Diwaniyah Iraq Nitte Meenakshi Institute of Technology Department of Computer Science and Engineering Bengaluru India Dhanalakshmi Srinivasan College of Engineering and Technology Department of Computer Science and Engineering Mamallapuram India New Prince Shri Bhavani College of Engineering and Technology Department of Electrical and Electronics Engineering Chennai India
In this era, Peer-to-Peer (P2P) networks have developed as a revolutionized network for data distribution and alternate to traditional client-server network. The features of P2P networks allow a distributed group of u... 详细信息
来源: 评论
On-Device AI security Solutions: A Study on Lightweight Ensemble Learning Technique  17
On-Device AI Security Solutions: A Study on Lightweight Ense...
收藏 引用
17th international conference on COMmunication systems and networks, COMSNETS 2025
作者: Dong, Huiyao Kotenko, Igor ITMO University Faculty of Information Technology and Security Saint Petersburg Russia St. Petersburg Federal Research Center of the RAS Laboratory of Computer Security Problems Saint Petersburg Russia
IoT security poses a significant challenge due to the presence of extensive confidential data and vulnerable devices. Artificial intelligence (AI) is increasingly viewed as pivotal in cybersecurity, enhancing the effi... 详细信息
来源: 评论
Detection of Anomalous Cryptocurrency Transactions Using Neural networks with Decision-making Explanation  33
Detection of Anomalous Cryptocurrency Transactions Using Neu...
收藏 引用
33rd Euromicro international conference on Parallel, distributed, and Network-Based Processing, PDP 2025
作者: Levshun, Dmitry Zhernova, Ksenia Chechulin, Andrey St. Petersburg Federal Research Center of the Russian Academy of Sciences Saint Petersburg Russia
The objective of this paper is to explore an effective approach for detecting anomalies in cryptocurrency transactions using artificial intelligence techniques. The proposed method is compared with existing approaches... 详细信息
来源: 评论
TLMMChain: Blockchain-Based Hierarchical security Management Scheme for Three-Level Mobility Model in Next-Generation networks  5th
TLMMChain: Blockchain-Based Hierarchical Security Management...
收藏 引用
5th international Ethical Hacking conference, eHaCON 2024
作者: Chakraborty, Mohuya Palit, Sudip Kumar Cybersecurity Centre of Excellence Institute of Engineering and Management University of Engineering and Management Kolkata India Department of Computer Science and Engineering Institute of Engineering and Management University of Engineering and Management Kolkata India
This paper focuses on the security aspects of the Three-level Mobility Model (TLMM) in the next-generation networks. Prior research has indicated that hierarchical architectures outperform other network topologies in ... 详细信息
来源: 评论
Exploring blockchain solutions: Integrating cryptocurrency with IoT for enhanced security
Exploring blockchain solutions: Integrating cryptocurrency w...
收藏 引用
2025 international conference on Pervasive Computational Technologies, ICPCT 2025
作者: Shravan, M. Kakad, Shital Mulani, Umar M Sharma, Geeti Tiwari, Mohit Mary Shiba, C. Sr University School of Business Telangana Warangal India Vishwakarma Institute of Technology Artificial Intelligence and Data Science Maharashtra Pune India Kj College of Engineering and Management Research Pune India India Bharati Vidyapeeth's College of Engineering Department of Computer Science and Engineering Delhi Delhi India R.M.K Engineering College Department of Computer Science and Business Systems Thiruvallur India
Blockchain, initially developed as the underlying technology for Bitcoin, has garnered significant attention for its applications beyond cryptocurrency, particularly in complex non-monetary domains. Utilizing cryptogr... 详细信息
来源: 评论
DDoS Mitigation Dilemma Exposed: A Two-Wave Attack with Collateral Damage of Millions  19th
DDoS Mitigation Dilemma Exposed: A Two-Wave Attack with Coll...
收藏 引用
19th international conference on security and Privacy in Communication networks
作者: Shi, Lumin Li, Jun Sisodia, Devkishen Zhang, Mingwei Dainotti, Alberto Reiher, Peter Univ Oregon Eugene OR 97403 USA Georgia Inst Technol Atlanta GA USA UCLA Los Angeles CA USA
While mitigating link-flooding attacks on the Internet has become an essential task, little research has been done on how an attacker can further attack and abuse the mitigation solutions themselves. In this paper, we... 详细信息
来源: 评论