咨询与建议

限定检索结果

文献类型

  • 5,039 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,406 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,904 篇 工学
    • 2,594 篇 计算机科学与技术...
    • 1,728 篇 软件工程
    • 989 篇 信息与通信工程
    • 376 篇 电气工程
    • 327 篇 控制科学与工程
    • 200 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 129 篇 动力工程及工程热...
    • 127 篇 电子科学与技术(可...
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 73 篇 仪器科学与技术
    • 70 篇 建筑学
    • 59 篇 交通运输工程
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
  • 620 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 101 篇 统计学(可授理学、...
    • 85 篇 物理学
  • 506 篇 管理学
    • 355 篇 管理科学与工程(可...
    • 201 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 243 篇 法学
    • 166 篇 法学
    • 83 篇 社会学
  • 79 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 52 篇 公共卫生与预防医...
  • 63 篇 经济学
    • 63 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 510 篇 security
  • 357 篇 wireless sensor ...
  • 308 篇 computer network...
  • 254 篇 protocols
  • 249 篇 computer archite...
  • 222 篇 intrusion detect...
  • 214 篇 authentication
  • 210 篇 computer communi...
  • 201 篇 ip networks
  • 196 篇 computer crime
  • 172 篇 servers
  • 166 篇 computer securit...
  • 163 篇 network security
  • 158 篇 information secu...
  • 157 篇 internet of thin...
  • 149 篇 distributed comp...
  • 147 篇 computer science
  • 146 篇 computational mo...
  • 145 篇 cryptography
  • 142 篇 data security

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 graphic era deem...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 natrayan l.
  • 6 篇 yunhao liu

语言

  • 4,953 篇 英文
  • 422 篇 其他
  • 45 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5406 条 记 录,以下是1001-1010 订阅
排序:
Effective Intrusion Detection in Heterogeneous Internet-of-Things networks via Ensemble Knowledge Distillation-Based Federated Learning
Effective Intrusion Detection in Heterogeneous Internet-of-T...
收藏 引用
IEEE international conference on Communications (ICC)
作者: Jiyuan Shen Wenzhuo Yang Zhaowei Chu Jiani Fan Dusit Niyato Kwok-Yan Lam Strategic Centre for Research in Privacy-Preserving Technologies & Systems Nanyang Technological University Singapore School of Computer Science and Engineering Nanyang Technological University Singapore
With the rapid development of low-cost consumer electronics and cloud computing, Internet-of- Things (IoT) devices are widely adopted for supporting next-generation distributed systems such as smart cities and industr... 详细信息
来源: 评论
Multilingual Knowledge Graph Completion via Multimodal Decouple and Relation-based Ensemble Inference
Multilingual Knowledge Graph Completion via Multimodal Decou...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Xiaojing Liu Xuesong Jiang Fengge Yi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The objective of Multimodal Knowledge Graph Completion (MKGC) is to forecast absent entities within a knowledge graph by leveraging additional textual and visual modalities. Existing studies commonly utilize a singula...
来源: 评论
Machine Learning Algorithms to Detect Illicit Accounts on Ethereum Blockchain  23
Machine Learning Algorithms to Detect Illicit Accounts on Et...
收藏 引用
Proceedings of the 7th international conference on Future networks and distributed systems
作者: Chibuzo Obi-Okoli Olamide Jogunola Bamidele Adebisi Mohammad Hammoudeh Department of Computing and Mathematics Manchester Metropolitan University UK Department of Engineering Manchester Metropolitan University UK Information and Computer Science Department King Fahd University of Petroleum and Minerals Saudi Arabia
The rapid growth and psudonomity inherent in blockchain technology such as in Bitcoin and Ethereum has marred its original intent to reduce dependant on centralised system, but created an avenue for illicit activities... 详细信息
来源: 评论
Federated Learning in Malware Detection
Federated Learning in Malware Detection
收藏 引用
international conference on Emerging Technologies and Factory Automation (ETFA)
作者: Dimitrios Serpanos Georgios Xenos Computer Technology Institute and Press DIOPHANTUS & Dept. of Electrical and Computer Engineering University of Patras Patras Greece Computer Technology Institute and Press DIOPHANTUS University of Patras Campus Patras Greece
Malware detection constitutes a fundamental step in safe and secure computational systems, including industrial systems and the Internet of Things (IoT). Modern malware detection is based on machine learning methods t...
来源: 评论
Machine Learning for Cloud-Based DDoS Attack Detection: A Comprehensive Algorithmic Evaluation
Machine Learning for Cloud-Based DDoS Attack Detection: A Co...
收藏 引用
international conference on Confluence The Next Generation Information Technology Summit (Confluence)
作者: Anukriti Naithani Shailendra Narayan Singh Krishna Kant Singh Sushil Kumar Computer Science and Engineering ASET Amity University Noida India Computer Science and Engineering NIT Kurukshetra India
distributed denial of service attacks, in the recent times, have become a critical threat to not only private server connections but also meta scale cloud computing environments. This research paper furnishes a detail...
来源: 评论
Analyzing the Attacks on Blockchain Technologies  2nd
Analyzing the Attacks on Blockchain Technologies
收藏 引用
2nd international conference on Machine Learning, Advances in Computing,Renewable Energy and communication, MARC 2020
作者: Vats, Vinay Kumar Katarya, Rahul Department of Computer Science & Engineering Delhi Technological University Shahbad Daulatpur Delhi110042 India
Blockchain technology has gained significant interest because of a wide variety of possible uses. It was first developed as a Bitcoin cryptocurrency but has since been used in many other business and non-business appl... 详细信息
来源: 评论
A Comparative Analysis of IoT Protocols for Resource Constraint Devices and networks  22
A Comparative Analysis of IoT Protocols for Resource Constra...
收藏 引用
Proceedings of the 6th international conference on Future networks & distributed systems
作者: Sara Holm Mohammad Hammoudeh School of Computing and Mathematics Manchester Metropolitan University United Kingdom Information Computer Science King Fahd University of Petroleum and Minerals Saudi Arabia
Communication standards and protocols are detrimental to the success of any Internet of Things (IoT) system or application. Selecting a communication standard and a suitable middleware or messaging protocol for IoT co... 详细信息
来源: 评论
Demo Abstract: distributed Virtual CPS Environment for K12  20
Demo Abstract: Distributed Virtual CPS Environment for K12
收藏 引用
20th ACM/IEEE international conference on Information Processing in Sensor networks (IPSN)
作者: Stein, Gordon Jean, Devin Ledeczi, Akos Vanderbilt Univ 221 Kirkland Hall Nashville TN 37235 USA
While educational robotics and makerspaces are useful to modern STEM education, they introduce both physical and economic barriers to entry. By creating a simulated, networked environment, we can facilitate instructio... 详细信息
来源: 评论
7th international conference on Mobile Internet security, MobiSec 2023
7th International Conference on Mobile Internet Security, Mo...
收藏 引用
7th international conference on Mobile Internet security, MobiSec 2023
The proceedings contain 21 papers. The special focus in this conference is on Mobile Internet security. The topics include: Computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile E...
来源: 评论
TON-IoT: Detection of Attacks on Internet of Things in Vehicular networks  6
TON-IoT: Detection of Attacks on Internet of Things in Vehic...
收藏 引用
6th international conference on Electronics, Communication and Aerospace Technology, ICECA 2022
作者: Sharma, Anshika Babbar, Himanshi Sharma, Avinash Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura140401 India Department of Computer Science and Engineering Mullana Haryana Ambala India
During the recent era, due to the exponential rise in the Internet of things (IoT) enabled devices around the globe, IoT and Machine learning (ML) has come out as usable and efficient approach to supply productive sol... 详细信息
来源: 评论