咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,231 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5348 条 记 录,以下是91-100 订阅
排序:
Autonomous Cyber Defense using Graph Attention Network Enhanced Reinforcement Learning  30
Autonomous Cyber Defense using Graph Attention Network Enhan...
收藏 引用
30th IEEE international conference on Parallel and distributed systems, ICPADS 2024
作者: Shi, Yihang Zhang, Huajun Shi, Lin Xu, Shoukun Changzhou University School of Computer Science and Artificial Intelligence Changzhou China
Ubiquitous networked hosts and Internet of Things (IoT) devices have enabled critical network applications in both enterprise and industrial environments. However, network threats have proliferated, constantly challen... 详细信息
来源: 评论
Design and security Analysis of a distributed OS with Adaptive IP Management
Design and Security Analysis of a Distributed OS with Adapti...
收藏 引用
2024 international conference on Artificial Intelligence and Quantum Computation-Based Sensor Applications, ICAIQSA 2024
作者: Prajapat, Pramod Chadha, Raman Sharma, Aryan Awasthi, Kartikay Chandigarh University Computer Science and Engineering Punjab India
As we can see, in the era of high-speed internet and the increasing use of technologies, the proper and safe management of IP Addresses is of paramount importance. De- centralized networks' older methods of distri... 详细信息
来源: 评论
Data security in Communication using Blockchain and Key Based Protocols  2
Data Security in Communication using Blockchain and Key Base...
收藏 引用
2nd IEEE international conference on IoT, Communication and Automation Technology, ICICAT 2024
作者: Prabakaran, S. Harinivaash, K. Prasad, R. Kaviyan, J. Rabin, D. V.S.B. Engineering College Department of Computer Science and Engineering Karur India
The development of global communication networks depends on satellite communication. Due to its lower stability and reach, satellite communication networks have garnered a lot of attention recently as a means of reduc... 详细信息
来源: 评论
A Global Task Scheduling Method Based on Network Measurement and Prediction in Computing Power networks  29
A Global Task Scheduling Method Based on Network Measurement...
收藏 引用
29th IEEE international conference on Parallel and distributed systems, ICPADS 2023
作者: Zhang, Chuanfu Li, Wen Chen, Jing Ge, Jing Wang, Di Li, Na Sun, Hao Geng, Yudong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
To improve the task scheduling efficiency in computing power networks, this paper proposes a global task scheduling method based on network measurement and prediction in computing power networks (GTS-MP), which select... 详细信息
来源: 评论
Back Propagation Neural Network-Based Routing Optimization for IoT  2
Back Propagation Neural Network-Based Routing Optimization f...
收藏 引用
2nd IEEE international conference on Blockchain and distributed systems security, ICBDS 2023
作者: Maurya, Sant Kumar Srivastava, Animesh Saini, Parveen Kumar Gupta, Rajeev Dhondiyal, Shiv Ashish Chandigarh University Department of AIT-CSE Punjab Mohali India Graphic Era Hill University Department of Computer Science & Engineering Dehradun India Chandigarh University Department of CSE Punjab Mohali India Graphic Era Hill University Department of Electronics and Communications Engineering Dehradun India Department of Computer Science & Engineering Dehradun India
The Internet of Things (IoT) has fundamentally changed how we engage with the environment that surrounds us by facilitating the connection of various devices and the flow of data between them. However, as the complexi... 详细信息
来源: 评论
Proof-of-Variable-Authority: A Blockchain Consensus Mechanism for Securing IoT networks  19th
Proof-of-Variable-Authority: A Blockchain Consensus Mechanis...
收藏 引用
19th international conference on Information systems security (ICISS)
作者: Chacko, Lenoah Rajan, Pavithra Anilkumar, Varun Pathari, Vinod Natl Inst Technol Kozhikode 673601 India
In today's world, Internet of Things (IoT) has become an integral part of our daily lives. As IoT networks continue to gain importance, the need for efficient network management mechanisms becomes crucial. Current... 详细信息
来源: 评论
Open Architecture for distributed and Cooperative Media Algorithms  3
Open Architecture for Distributed and Cooperative Media Algo...
收藏 引用
3rd international conference for Innovation in Technology, INOCON 2024
作者: Bhambu, Pawan Manjunatha, R. Srivastava, Pratima Vivekananda Global University Department of Computer Science and Engineering Jaipur India School of Sciences Department of Data Analytics and Mathematical Sciences Karnataka Bangalore India Arka Jain University Department of Biotechnology Jharkhand Jamshedpur India
The Open structure for allotted and Cooperative Media Algorithms (OADCMA) is an open-deliver framework imparting a plug-in platform that lets customers, without problem, develop distributed and cooperative media algor... 详细信息
来源: 评论
Blockchain - Enhanced Secure and Efficient IPFS - based EHR Management: A Decentralized Approach  4
Blockchain - Enhanced Secure and Efficient IPFS - based EHR ...
收藏 引用
4th international conference on Emerging Trends in networks and computer Communications, ETNCC 2024
作者: Santhi, V. Santhosh, Diyaa Samyuktha, N. Sachitha, C. PSG College of Technology Department of Computer Science and Engineering Coimbatore India
This paper introduces a novel healthcare system based on blockchain and IPFS technologies, designed to securely store and facilitate the sharing of patient health records. The system is structured into three layers: b... 详细信息
来源: 评论
Designing Blockchain-Based Decentralized Scheme for Secure File Storage System
Designing Blockchain-Based Decentralized Scheme for Secure F...
收藏 引用
12th IEEE international conference on computer, Information and Telecommunication systems (CITS)
作者: Jariwala, Manav Pankaj Obaidat, Mohammad S. Wazid, Mohammad Mishra, Amit Kumar Singh, Devesh Pratap Graph Era Deemed Be Univ Dept Comp Sci & Engn Dehra Dun 248002 India Univ Jordan KASIT Amman 11942 Jordan Univ Sci & Technol Beijing Beijing 100083 Peoples R China SRM Univ Kattankulathur 603203 India Amity Univ Noida 201301 India Graph Era Hill Univ Dept Comp Sci & Engn Dehra Dun 248002 India
A decentralized file storage system is a system for storing the data. The files are stored across a distributed network of nodes. It does not rely on a centralized server. Each node in the network maintains a copy of ... 详细信息
来源: 评论
The Application of Deep Learning Techniques in computer security for Big Data Anomaly Detection  2
The Application of Deep Learning Techniques in Computer Secu...
收藏 引用
2nd IEEE international conference on Integrated Intelligence and Communication systems, ICIICS 2024
作者: Duan, Zhijuan Wuhan University of Engineering Science Hubei Wuhan China
Today, with the rapid development of the Internet, the requirements for network security are increasing day by day. This article explores the application of deep learning technology, especially convolutional neural ne... 详细信息
来源: 评论