咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,231 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5348 条 记 录,以下是1-10 订阅
排序:
Enforcing Web security Constraints for LLM-driven Robot Agents for Online Transactions
Enforcing Web Security Constraints for LLM-driven Robot Agen...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Shah, Shraddha Pradipbhai Deshpande, Aditya Vilas University of the Cumberlands School of Computer and Information Sciences KY United States
The integration of Large Language Models (LLMs) into autonomous robotic agents for conducting online transactions poses significant cybersecurity challenges. This study aims to enforce robust cybersecurity constraints... 详细信息
来源: 评论
Fault Tolerance Performance of distributed Network security Protection System Optimized by Ant Colony Algorithm
Fault Tolerance Performance of Distributed Network Security ...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Li, Teng Technician College of LiaoCheng City Department of Economic Management Liaocheng China
Ant colony algorithm simulates the foraging behavior of ants in nature, using their unique pheromones to label paths and find the shortest path. This method can effectively solve the optimal problem, especially suitab... 详细信息
来源: 评论
CAN Bus Information security Technology for Connected Vehicles based on Artificial Intelligence
CAN Bus Information Security Technology for Connected Vehicl...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Zhou, Yixuan Guo, Zhen Ning, Yuqiao Yu, Mingming Ren, Shixuan China Automobile Data of Tianjin Co. Ltd Tianjin China Catarc Intelligent and Connected Technology Co. Ltd Tianjin China
With the rapid development of Intelligent Connected Vehicle (ICV) technology, data exchange between vehicles has become increasingly frequent, which greatly improves the demand for information security technology in v... 详细信息
来源: 评论
Investigating Cyber Threats against Proof-of-work Blockchain networks  3
Investigating Cyber Threats against Proof-of-work Blockchain...
收藏 引用
3rd IEEE international conference on Blockchain and distributed systems security, ICBDS 2024
作者: Fattahdizaji, Ali Pishdar, Mohammad Shukur, Zarina University Kebangsaan Malasya Information Science and Technology Department Kualalumpur Malaysia Bu-Ali Sina University Computer Science Department Hamedan Iran
In recent years, blockchain networks have become a singular power in the financial sector. Proof of work (POW) networks are among the most significant and widespread kinds of blockchain networks. One of the main issue... 详细信息
来源: 评论
Sharding:A Scalability Solutions for Blockchain networks  3
Sharding:A Scalability Solutions for Blockchain Networks
收藏 引用
3rd IEEE international conference on Blockchain and distributed systems security, ICBDS 2024
作者: Kale, Dattatray Raghunath Jadhav, Amolkumar N. Kruishna Prasad, K. Salunkhe, Somanath Janardan Hirve, Sumit Goswami, Chandrashekhar Mit Art Design and Technology University Mit School of Computing Department of Computer Science & Engg Pune India Annasaheb Dange College of Engineering and Technology Department of Computer Science & Engg Ashta India Shrinivas University Department of Computer Science & Engg Mangalore India D Y Patil Agriculture and Technical University Department of Computer Science & Engg Talsande India Sir Padampat Singhania University Faculty of Computing and Informatics Rajasthan Udaipur India
Blockchain technology's decentralized and immutable data storage has changed a number of sectors. But typical blockchain networks scalability issues prevent them from being widely used for large-scale applications... 详细信息
来源: 评论
Optimization of Data Encryption Algorithms in Information Construction
Optimization of Data Encryption Algorithms in Information Co...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Zhu, Shuai You, Yi Zhou, Bo Chen, Chuanting Yi, Xueqin Hankou University Network Information Center Wuhan China Hankou University School of Computer Science and Technology Wuhan China Wuhan University of Engineering Science Library and Information Center Wuhan China Hankou University School of Music Wuhan China Hankou University Board Office Wuhan China
Data encryption algorithms play a crucial role in information construction, effectively protecting data security. The problems in traditional research include a lack of targeting, a balance between efficiency and safe... 详细信息
来源: 评论
Enhanced Proof of Authentication(E-PoA) Consensus Blockchain-Based Secured Health Care Data Transmission in Internet of Things
Enhanced Proof of Authentication(E-PoA) Consensus Blockchain...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Keerthana, T. Krithika, D.R. Vels Institute of Science Technology and Advanced Studies Department of Computer Application Chennai India
Blockchain and the Internet of Things (IoT) are revolutionizing healthcare, presenting the potential for transformation. The IoT is achieving more and more confidence as the infrastructure for future applications. The... 详细信息
来源: 评论
Addressing Data Poisoning and Model Manipulation Risks using LLM Models in Web security
Addressing Data Poisoning and Model Manipulation Risks using...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Shah, Shraddha Pradipbhai Deshpande, Aditya Vilas University of the Cumberlands School of Computer and Information Sciences KY United States
Data poisoning and model manipulation represent significant threats to cybersecurity, where adversaries intentionally inject malicious data into training sets, leading to compromised machine learning models. This stud... 详细信息
来源: 评论
A Review on Privacy Enhanced distributed ML Against Poisoning Attacks  1
收藏 引用
9th international conference on Cyber security, Privacy in Communication networks, ICCS 2023
作者: Archa, A.T. Kartheeban, K. Kalasalingam Academy of Research and Education Computer Science and Engineering Srivilliputhur India
There is a higher demand for machine learning applications nowadays. To increase the accuracy of results, more and more training data is essential. To better increase the size of training data, it is necessary to dist... 详细信息
来源: 评论
Harris Corner Detection Algorithm based Long Short-Term Memory for Detecting distributed Denial of Service Anomalies in Software Defined networks
Harris Corner Detection Algorithm based Long Short-Term Memo...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Cigiri, Rashmi Kumar, Gotte Ranjith Alabdeli, Haider John, Y.M. Mahaboob Kaliappan, S. Hyderabad India Sr University Department of Computer Science & Artificial Intelligence Warangal India The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq Mahendra College of Engineering Department of Ece Salem India Lovely Professional University Department of Research and Development Phagwara India
Software-Defined Networking (SDN) is the innovative development in network technology with a number of attractive features, including management and flexibility. Despite these advantages, SDN was compromised by Distri... 详细信息
来源: 评论