咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 84 篇 期刊文献

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,879 篇 工学
    • 2,570 篇 计算机科学与技术...
    • 1,720 篇 软件工程
    • 968 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 355 篇 wireless sensor ...
  • 308 篇 computer network...
  • 254 篇 protocols
  • 249 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 201 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 166 篇 computer securit...
  • 160 篇 network security
  • 158 篇 information secu...
  • 155 篇 internet of thin...
  • 150 篇 distributed comp...
  • 147 篇 computer science
  • 146 篇 cryptography
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,022 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5374 条 记 录,以下是1011-1020 订阅
排序:
Enhanced SNR Based Admission Control Algorithm for Vehicular Ad-Hoc Network  23
Enhanced SNR Based Admission Control Algorithm for Vehicular...
收藏 引用
Proceedings of the 7th international conference on Future networks and distributed systems
作者: Aws Zuhair Sameen Mohammed Hasan Alwan Mayssam Saad Kadhum Yousif I Hammadi Mokhalad Abdulameer Kadhim Alsaeedi Ahmed Aziz Mohammed Saleh Ali Muthanna Department of Medical Instrumentation Engineering Techniques Al-Farahidi University Iraq Department of Communications Engineering University of Diyala Iraq Dep. of Medical Instruments Engineering Techniques Bilad Alrafidain University College Iraq Department of computer science Benha university Egypt and International Business Management Department Tashkent State University of Economics Uzbekistan Institute of Computer Technologies and Information Security Southern Federal University Russia
Vehicular Ad-hoc Network (VANET) becomes a fundamental subcategory of mobile ad-hoc networks that provides vehicles to communicate with each other and with roadside infrastructure smartly. Various VANET performance ch...
来源: 评论
NPV: Fast Network Policy Verification for Cloud-Native Networking
NPV: Fast Network Policy Verification for Cloud-Native Netwo...
收藏 引用
international conference on distributed Computing systems
作者: Shunbin Dong Yumin Xie Jin Zhao Kun Qiu School of Computer Science Fudan University Shanghai China Shanghai Key Laboratory of Intelligent Information Processing Shanghai China
Network policy plays a crucial role in cloud-native networking, especially in multi-tenant scenarios. It provides precise control over connectivity by specifying source and destination endpoints, traffic types, and ot... 详细信息
来源: 评论
An Efficient Hybrid Red Panda Optimization-Similarity-Navigated Graph Neural Network with Blockchain Technology for Shared Electric Vehicle Charging
An Efficient Hybrid Red Panda Optimization-Similarity-Naviga...
收藏 引用
Sustainable Expert systems (ICSES), international conference on
作者: Sammy. F Rajeshwari S Prashanth G K Babu Thirumalaimuthu Hemant Singh Pokhariya Natrayan L Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh India Department of Mathematics Bangalore Institute of Technology Bengaluru Karnataka India Department of MCA Siddaganga Institute Technology Tumkur Karnataka India Department of Instrumentation and Control Engineering St. Joseph's College of Engineering Chennai Tamil Nandu India Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India Department of Mechanical Engineering Saveetha School of EngineeringSIMATS Chennai Tamil Nadu India
Blockchain technology for shared electric vehicle (EV) charging makes use of a distributed ledger in handling different transactions which promotes authenticity in charging. However, this technology can be non-scalabl... 详细信息
来源: 评论
A Study on MANET: Along with Recent Trends, Applications, Types, Protocols, Goals, Challenges
A Study on MANET: Along with Recent Trends, Applications, Ty...
收藏 引用
Intelligent Computing and Research Trends (ICRT), international conference on
作者: Deepak Arya Pramod Mehra Parag Jain Abhay Bhatia Computer Science & Engineering Roorkee Institute of Technology Roorkee India
The (MANET) ad-hoc mobile network is an automated, network in which android systems link to wireless devices. Ad hoc word means "for this purpose". In MANET any device can easily move in various directions. ...
来源: 评论
Resource Allocation in Cloud Computing Using Genetic Algorithm and Neural Network
Resource Allocation in Cloud Computing Using Genetic Algorit...
收藏 引用
IEEE international conference on Smart Cloud (SmartCloud)
作者: Mahdi Manavi Yunpeng Zhang Guoning Chen Department of Computer Science University of Houston Houston USA Department of Information Science Technology University of Houston Houston USA
Cloud computing is one of the most used distributed systems for data processing and data storage. Due to the continuous increase in the size of the data processed by cloud computing, scheduling multiple tasks to maint...
来源: 评论
DCNN-based load balancing and computation offloading of Intelligent Video Surveillance with Edge Computing
DCNN-based load balancing and computation offloading of Inte...
收藏 引用
Evolutionary Algorithms and Soft Computing Techniques (EASCT), international conference on
作者: Shweta Koparde G. Sujatha Srinivas Jangirala P. Santhosh Kumar Computer Engineering Dr. DY Patil Institute of Technology Pune India Computer Science and Engineering Kommuri Pratap Reddy Institute of Technology Ghatkeshar India Jindal Global Business School O.P. Jindal Global University Sonipat India Information Technology College of Engineering and Technology SRM Institute of Science and Technology Ramapuram Chennai India
In this study, we offer a distributed Intelligent Video Surveillance (DIVS) system that is set up in an environment of edge computing and is based on Deep Learning (DL). For the DIVS system, we developed a distributed...
来源: 评论
Machine Learning Approach for Mitigating security Threats in IoT Environment
Machine Learning Approach for Mitigating Security Threats in...
收藏 引用
international conference on Inventive Research in Computing Applications (ICIRCA)
作者: Harnit Saini Saroj Bala S.Jhansi Ida K. Suresh Kumar Shankerpally Swetha Divyabarathi P Department of CSE Ajay Kumar Garg Engineering College Ghaziabad Department of MCA Ajay Kumar Garg Engineering College Ghaziabad Department of Computer Science and Business Systems R.M.K Engineering College Kavaraipettai Department of CSE Kongu Engineering College Erode Department of Information Technology CVR College of Engineering Telangana Department of Artificial Intelligence and Data Science Bannari Amman Institute of Technology Erode
In today's world, a huge amount of data and information is transferred through wireless networks. The Internet of Things (IoT) is a complex network that consists of diverse sensors, devices, and things, which ofte...
来源: 评论
A Secure Deep Q-Reinforcement Learning Framework for Network Intrusion Detection in IoT-Fog systems
A Secure Deep Q-Reinforcement Learning Framework for Network...
收藏 引用
Emerging Trends in Industry 4.0 (ETI 4.0)
作者: Sujit Bebortta Subhranshu Sekhar Tripathy Vandana Sharma Jnana Ranjan Behera Aishwarya Nayak Department of Computer Science Ravenshaw University Cuttack India School of Computer Engineering KIIT Deemed to be University Bhubaneswar India Department of Computational Sciences CHRIST (Deemed to be University) Delhi NCR Campus India School of Electronics KIIT Deemed to be University Bhubaneswar India Department of Computer Sceince & Engineering DRIEMS University Cuttack India
IoT-Fog system security depends on intrusion detection system (IDS) since the growing number of Internet-of-Things (IoT) devices has increased the attack surface for cyber threats. The dynamic nature of cyberattacks o... 详细信息
来源: 评论
SECURE - MEDSHARE: Decentralized Patient Data Sharing for Improved Healthcare
SECURE - MEDSHARE: Decentralized Patient Data Sharing for Im...
收藏 引用
Advances in Data Engineering and Intelligent Computing systems (ADICS), international conference on
作者: Vansh Kapoor Dhara Vadagasiya Revathy S. Department of computer science and engineering Hindustan Institute Of Technology and Science Chennai Tamil Nadu
Blockchain provides a decentralized framework for peer-to-peer networks' data and transaction management. The basic approach to the proposed system is to create a trustworthy and secure platform that enables docto... 详细信息
来源: 评论
Effectiveness Analysis Of Blockchain Mechanisms Using Consensus Algorithms
Effectiveness Analysis Of Blockchain Mechanisms Using Consen...
收藏 引用
Advances in Computing, Communication Control and Networking (ICAC3N), international conference on
作者: Munish Sabharwal Fayzullo Makhmadiyarovich Nazarov Bunyod Eshtemirov School of Computing Science & Engineering Galgotias University Samarkand State University
Recently, along with the development of information technology, blockchain technology has been developing all over the world. On the basis of blockchain technology, it will be possible to develop the digital economy, ... 详细信息
来源: 评论