咨询与建议

限定检索结果

文献类型

  • 4,982 篇 会议
  • 280 册 图书
  • 89 篇 期刊文献

馆藏范围

  • 5,351 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,876 篇 工学
    • 2,567 篇 计算机科学与技术...
    • 1,716 篇 软件工程
    • 978 篇 信息与通信工程
    • 373 篇 电气工程
    • 304 篇 控制科学与工程
    • 183 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 121 篇 电子科学与技术(可...
    • 121 篇 安全科学与工程
    • 112 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 44 篇 交通运输工程
  • 615 篇 理学
    • 368 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 101 篇 统计学(可授理学、...
    • 85 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 185 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 240 篇 法学
    • 165 篇 法学
    • 81 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 500 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,230 篇 英文
  • 90 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5351 条 记 录,以下是91-100 订阅
排序:
Advanced Machine Learning Approach for Cyber Attack Detection in Cloud Computing
Advanced Machine Learning Approach for Cyber Attack Detectio...
收藏 引用
Intelligent Control, Computing and Communications (IC3), international conference on
作者: Shashi Bhushan Singh Yadav Nitin Arvind Shelke Jagendra Singh Yasmeen Deependra Pandey Himanshi Department Computer Science & Engineering BBD Northern India Institute of Technology Lucknow India School of Computer Science Engineering & Technology Bennett University Greater Noida India Department of CSE-DS CVR College of Engineering Hyderabad India Department of ECE Amity School of Engineering and Technology Amity University Lucknow India Department of Information Technology Raj Kumar Goel Institute of Technology Ghaziabad India
Cloud computing has become the most important part of modern IT infrastructure, which is scalable and flexible. However, with such wide-scale adoption, new vulnerabilities have been introduced into the system, making ... 详细信息
来源: 评论
Recent Trends in computer networks and distributed systems security  2012
收藏 引用
丛书名: Communications in computer and Information Science
2012年
作者: Sabu M. Thampi Albert Y. Zomaya Thorsten Strufe Jose M. Alcaraz-Calero Tony Thomas
This book constitutes the refereed proceedings of the international conference on Recent Trends in computer networks and distributed systems security, held in Trivandrum, India, in October 2012. The 34 revised full pa...
来源: 评论
distributed Denial of Service Attack Detection by Machine Learning Techniques
Distributed Denial of Service Attack Detection by Machine Le...
收藏 引用
Learning and Technology conference (L&T)
作者: Varkha K. Jewani Prafulla E. Ajmire Mohd. Atique Bhisham Sharma Imed Ben Dhaou Suhashini Awadhesh Chaurasia Sant Gadge Baba Amravati University Amravati India Centre of Research Impact and Outcome Chitkara University Rajpura Punjab India Department of Computer Science Hekma School of Engineering Computing and Design Dar Al-Hekma University Jeddah Saudi Arabia Department of Computer Science RTM Nagpur University Nagpur
The exponential expansion of computer networks and the internet makes it clear that there is a chance of being attacked and harmed. In the meantime, one of the most crucial defensive measures against the more complex ... 详细信息
来源: 评论
DDoS Attacks: Detection Techniques, Challenges, and Modern Practices
DDoS Attacks: Detection Techniques, Challenges, and Modern P...
收藏 引用
IEEE Students' conference on Electrical, Electronics and computer Science (SCEECS)
作者: Ramesh Redekar Rajesh Bharati Department of Computer Engineering Dr. D. Y. Patil Institute of Technology Pimpri Pune India
Internet, one of the essential components of today's civilization, serves numerous purposes for individuals, businesses, and society. However, its extensive use has sparked concerns, especially regarding privacy a... 详细信息
来源: 评论
20th international conference on Data Science, ICDATA 2024, held as part of the World Congress in computer Science, computer Engineering and Applied Computing, CSCE 2024
20th International Conference on Data Science, ICDATA 2024, ...
收藏 引用
20th international conference on Data Science, ICDATA 2024, held as part of the World Congress in computer Science, computer Engineering and Applied Computing, CSCE 2024
The proceedings contain 37 papers. The special focus in this conference is on Data Science. The topics include: Trust as a Classification Tool: Analyzing Collaboration in Senate Floor Speeches on G...
来源: 评论
Comparative Analysis of Communication Protocols in Blockchain-IoT systems for Optimizing IoT Data Flow Efficiency
Comparative Analysis of Communication Protocols in Blockchai...
收藏 引用
Advanced Innovations in Smart Cities (ICAISC), international conference on
作者: Mnar Alnaghes Hong Shen School of Computer Science University of Adelaide Adelaide Australia
The Internet of Things (IoT) is considered an evolving technology, consisting of different types of connected devices that have sensors, specialized hardware, and software. However, considerable challenges related to ... 详细信息
来源: 评论
Classification of Internet of Things Cybersecurity Attacks Using a Hybrid Deep Learning Approach  2nd
Classification of Internet of Things Cybersecurity Attacks U...
收藏 引用
2nd international conference on Innovations of Intelligent Informatics, Networking and Cybersecurity, 3INC 2024
作者: Kareem, Eman Karkawi Manaa, Mehdi Ebady Department of Information Networks College of IT University of Babylon Babylon Iraq Intelligent Medical Systems Department College of Sciences Al-Mustaqbal University Babylon51001 Iraq College of Information Technology University of Babylon Babylon Iraq
IoT devices play an integral part of our digital life today, yet pose significant security risks. These risks allow attackers to carry out various cyberattacks, mainly distributed denial of service (DDoS) attacks. To ... 详细信息
来源: 评论
A Powered-Up Classification of Disabling distributed Network Cloud-Based Attacks Using MLPNN-BP and MLPNN-LM  1
收藏 引用
3rd international conference on Machine Intelligence and Smart systems, MISS 2023
作者: Singh, Dhiraj Mishra, Rahul Centre for Interdisciplinary Research in Business and Technology Chitkara University Punjab Rajpura140401 India
An Intrusion Detection System (IDS) is a form of network security that monitors for malicious activity. In the cloud, an IDS might operate on individual hosts or over an entire network. DDoS attacks are so named becau... 详细信息
来源: 评论
Scalable Intrusion Detection Using Recurrent Neural networks in distributed Data Engineering systems  3rd
Scalable Intrusion Detection Using Recurrent Neural Networks...
收藏 引用
3rd international conference on Advancements in Smart Computing and Information security, ASCIS 2024
作者: Jeyaram, A. Muthukumaravel, A. Chennai India Chennai India
Traditional Intrusion Detection systems (IDS) frequently rely on anomaly and signature-based methods, which have limits in terms of accuracy, scalability, and flexibility. Anomaly-based systems generate a high number ... 详细信息
来源: 评论
Recent Trends in computer networks and distributed systems security
Recent Trends in Computer Networks and Distributed Systems S...
收藏 引用
2nd international conference on security in computer networks and distributed systems, snds 2014
作者: Pérez, Gregorio Martínez Thampi, Sabu M. Ko, Ryan Shu, Lei University of Murcia Spain Indian Institute of Information Technology and Management - Kerala Trivandrum India The University of Waikato Hamilton New Zealand Guangdong University of Petrochemical Technology Maoming China
来源: 评论