咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 60 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,855 篇 工学
    • 2,546 篇 计算机科学与技术...
    • 1,705 篇 软件工程
    • 944 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 346 篇 wireless sensor ...
  • 304 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 205 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 165 篇 computer securit...
  • 161 篇 network security
  • 158 篇 information secu...
  • 154 篇 internet of thin...
  • 153 篇 distributed comp...
  • 148 篇 cryptography
  • 146 篇 computer science
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 19 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 jasni mohamad za...
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 natrayan l
  • 7 篇 lin zhang
  • 7 篇 wei wang
  • 7 篇 mukaddim pathan
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu

语言

  • 4,998 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是991-1000 订阅
排序:
SSVBT: Secure Certificateless Aggregate Signature Scheme in VANETS with Block Chain Technology
SSVBT: Secure Certificateless Aggregate Signature Scheme in ...
收藏 引用
international conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions)
作者: Ruchi Mittal Varun Malik Manisha Aeri Kuldeep Singh Kaswan S Vikram Singh Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Computer Science and Engineering Graphic Era Hill University Graphic Era Deemed to be University Dehradun Uttarakhand Department of Computer Science and Engineering Galgotias University Greater Noida Uttar Pradesh India Amity School of Engineering and Technology Amity University Greater Noida Uttar Pradesh India
The proliferation of Vehicular Ad-hoc networks (VANETs) highlights the crucial need for secure, privacy-protecting inter-vehicle communication. By integrating blockchain technology with a safe certificate-less aggrega... 详细信息
来源: 评论
A Review on Effective Detection and Prevention for DDOS Attack in Cloud Virtual Environment Using Honeypot
A Review on Effective Detection and Prevention for DDOS Atta...
收藏 引用
international conference on Computing, Communication, and Intelligent systems (ICCCIS)
作者: Vidhyasagar B. S Ravula Kartheek Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
Network communication is increasing day by day in many ways. The cloud is one of the most modern communication environments. This environment gives users easy access to their information whenever and wherever they nee...
来源: 评论
A Trajectory Tracking System for Zebrafish Based on Embedded Edge Artificial Intelligence
A Trajectory Tracking System for Zebrafish Based on Embedded...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Chuanhao Zang Anming Dong Jiguo Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Big Data Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Trajectory tracking of zebrafish is an important requirement in studying neurological disorders and developing new psychoactive drug. However, many challenges emerge for stable tracking, since zebrafish are similar in...
来源: 评论
Fusion of Dynamic Hypergraph and Clinical Event for Sequential Diagnosis Prediction
Fusion of Dynamic Hypergraph and Clinical Event for Sequenti...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Xin Zhang Xueping Peng Hongjiao Guan Long Zhao Xinxiao Qiao Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Sydney Australia
Sequential diagnosis prediction (SDP) is a challenging task, aiming to predict patients’ future diagnoses based on their historical medical records. While methods based on graph neural networks (GNNs) have proven suc...
来源: 评论
A Decentralized Cryptocurrency Infrastructure for Edge-Based IoMT systems
A Decentralized Cryptocurrency Infrastructure for Edge-Based...
收藏 引用
Artificial Intelligence and Smart Communication (AISC), international conference on
作者: Abhinav Rathour Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
Significant shifts in e-health services have occurred as a result of the healthcare industry’s use of edge of the network (MEC) and Blockchain technology for improving efficiency in healthcare operations. While some ... 详细信息
来源: 评论
A Survey on VANET attacks and its security Mechanisms
A Survey on VANET attacks and its Security Mechanisms
收藏 引用
international conference on Parallel distributed and Grid Computing (PDGC)
作者: Tejaswi Sapala Rama Chandra Suresh Reddy Penumallu Reddy Sai Kiran M.V. Rajesh B.S.Kiruthika Devi Department of Computer Science and Engineering Aditya Engineering College Surampalem A.P. India CL Educate Ltd New Delhi India
There has been a recent surge in interest in wireless related VANETs, which are swiftly rising to the top of the priority research list for the smart-transportation system. Such system offers protection and safety mea... 详细信息
来源: 评论
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation
JSRevealer: A Robust Malicious JavaScript Detector against O...
收藏 引用
international conference on Dependable systems and networks (DSN)
作者: Kunlun Ren Weizhong Qiang Yueming Wu Yi Zhou Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the convenience and popularity of Web applications, they have become a prime target for attackers. As the main programming language for Web applications, many methods have been proposed for detecting malicious ...
来源: 评论
Assets Criticality Assessment of Industrial Control systems: A Wind Farm Case Study
Assets Criticality Assessment of Industrial Control Systems:...
收藏 引用
IEEE international conference on Software Quality, Reliability and security (QRS)
作者: Shwetha Gowdanakatte Mahmoud Abdelgawad Indrakshi Ray Department of Systems Engineering Colorado State University Fort Collins Colorado USA Department of Computer Science Colorado State University Fort Collins Colorado USA
The increasing growth of threats to Industrial Control systems (ICS) in the energy sector puts this critical infrastructure at high risk. Consequently, holistic approaches are needed to assess the criticality of ICS a... 详细信息
来源: 评论
BlockChain Based Chat Application
BlockChain Based Chat Application
收藏 引用
Emerging Technology (INCET), international conference for
作者: Ishan Lokhande Nilesh Deotale Bharat Mali Sneha Chauhan Jayesh Dhuri Depertment of Computer Engineering St. John College of Engineering and Management Palghar India
Peer-to-peer networks are used by decentralized applications to ensure that no network failure can be caused by a failing central node. Today's environment, where holding data on a centralized server might be unsa...
来源: 评论
TOSA: Tolerating Stuck-At-Faults in Edge-based RRAM Inference Accelerators
TOSA: Tolerating Stuck-At-Faults in Edge-based RRAM Inferenc...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Shaofeng Zhao Bo Liu Fang Wang Dan Feng Xiang Chen School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Cyberspace Security Zhengzhou University Zhengzhou China
Applications powered by Deep Neural networks (DNNs) are shifting from cloud to edge computing due to the promising performance efficiency of Resistive Random Access Memory (RRAM) devices. However, modern RRAM devices ...
来源: 评论