咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 84 篇 期刊文献

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,879 篇 工学
    • 2,570 篇 计算机科学与技术...
    • 1,720 篇 软件工程
    • 968 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 355 篇 wireless sensor ...
  • 308 篇 computer network...
  • 254 篇 protocols
  • 249 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 201 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 166 篇 computer securit...
  • 160 篇 network security
  • 158 篇 information secu...
  • 155 篇 internet of thin...
  • 150 篇 distributed comp...
  • 147 篇 computer science
  • 146 篇 cryptography
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,022 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5374 条 记 录,以下是1021-1030 订阅
排序:
Bridging security and Efficiency: Energy-Aware Clustering for Data Encryption in Smart Agriculture
Bridging Security and Efficiency: Energy-Aware Clustering fo...
收藏 引用
2025 international conference on Computing, Networking and Communications, ICNC 2025
作者: Khan, Huzaif Purohit, Lokesh Jalooli, Ali California State University Dominguez Hills Department of Computer Science CarsonCA90747 United States
Securing data communication in smart agriculture is essential to ensure data integrity and confidentiality in distributed sensor networks. While Cheon-Kim-Kim-Song (CKKS) homomorphic encryption offers strong security ... 详细信息
来源: 评论
distributed Denial of Service Attack Detection by Machine Learning Techniques
Distributed Denial of Service Attack Detection by Machine Le...
收藏 引用
Learning and Technology conference (L&T)
作者: Varkha K. Jewani Prafulla E. Ajmire Mohd. Atique Bhisham Sharma Imed Ben Dhaou Suhashini Awadhesh Chaurasia Sant Gadge Baba Amravati University Amravati India Centre of Research Impact and Outcome Chitkara University Rajpura Punjab India Department of Computer Science Hekma School of Engineering Computing and Design Dar Al-Hekma University Jeddah Saudi Arabia Department of Computer Science RTM Nagpur University Nagpur
The exponential expansion of computer networks and the internet makes it clear that there is a chance of being attacked and harmed. In the meantime, one of the most crucial defensive measures against the more complex ... 详细信息
来源: 评论
Federated Learning for Enhanced Intrusion Detection in Smart City Environments
Federated Learning for Enhanced Intrusion Detection in Smart...
收藏 引用
international conference on Open Source systems and Technologies (ICOSST)
作者: Soomaiya Hamid Narmeen Zakaria Bawany Center for Computing Research Department of Computer Science and Software Engineering Jinnah University for Women Karachi Pakistan
The integration of IoT devices in smart cities enhances urban infrastructure, services, and governance but also introduces significant cybersecurity challenges. Traditional centralized Intrusion Detection systems (IDS... 详细信息
来源: 评论
17th international conference on Information systems security, ICISS 2021
17th International Conference on Information Systems Securit...
收藏 引用
17th international conference on Information systems security, ICISS 2021
The proceedings contain 15 papers. The special focus in this conference is on Information systems security. The topics include: Experimental Verification of Estimated Block Size of BKZ Algorithm Against LWE;...
来源: 评论
Advanced Machine Learning Approach for Cyber Attack Detection in Cloud Computing
Advanced Machine Learning Approach for Cyber Attack Detectio...
收藏 引用
2025 international conference on Intelligent Control, Computing and Communications, IC3 2025
作者: Yadav, Shashi Bhushan Singh Shelke, Nitin Arvind Singh, Jagendra Yasmeen Pandey, Deependra Himanshi Bbd Northern India Institute of Technology Department Computer Science & Engineering Lucknow India School of Computer Science Engineering & Technology Bennett University Greater Noida India Cvr College of Engineering Department of CSE-DS Hyderabad India Amity School of Engineering and Technology Amity University Department of Ece Lucknow India Raj Kumar Goel Institute of Technology Department of Information Technology Ghaziabad India
Cloud computing has become the most important part of modern IT infrastructure, which is scalable and flexible. However, with such wide-scale adoption, new vulnerabilities have been introduced into the system, making ... 详细信息
来源: 评论
A Comprehensive Study on Blockchain: Transforming the World
A Comprehensive Study on Blockchain: Transforming the World
收藏 引用
Innovation in Technology (INOCON), IEEE international conference for
作者: Sujata Negi Thakur Sudhanshu Maurya Bhupesh Rawat Department of Computer Science & Engineering Graphic Era Hill University Haldwani Campus Nainital India School of Computing Graphic Era Hill University Bhimtal Campus Nainital India
We are going towards digitization, and while discussing it, “money” is the most common word that comes to everyone’s mind. We have “Bitcoins” to support this. The Blockchain, a shared ledger system, allows for th... 详细信息
来源: 评论
Decentralized implementations of SDN-controllers in SDN-FANETs: a survey
Decentralized implementations of SDN-controllers in SDN-FANE...
收藏 引用
4th international conference on distributed Sensing and Intelligent systems (ICDSIS 2023)
作者: A. Eljack M. A. Talib S. Abbas Q. Nasir Department of Computer Science University of Sharjah Sharjah UAE Department of Computer Engineering University of Sharjah Sharjah UAE
The implementation of Software-Defined Networking (SDN) in Flying Ad-hoc networks (FANETs), known as SDN-FANET, has gained significant traction in the past decade. This is particularly due to its eccentric capabilitie...
来源: 评论
Optimizing Real- Time Threat Detection with Feature Engineering Strategies for Intelligent NIDS
Optimizing Real- Time Threat Detection with Feature Engineer...
收藏 引用
international conference on Contemporary Computing and Informatics (IC3I)
作者: Jyoti Verma Monika Sethi Manish Snehi Ishu Sharma Keshav Kaushik Department of Computer Science and Engineering Punjabi University Patiala Punjab India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India School of Computer Science University of Petroleum and Energy Studies Dehradun India
The escalation of cloud-based network attacks has been observed to be in tandem with the rapid proliferation of cloud-based services worldwide. It has highlighted current network intrusion detection systems' (NIDS...
来源: 评论
Intelligent network traffic analysis: leveraging machine learning for enhanced cybersecurity
Intelligent network traffic analysis: leveraging machine lea...
收藏 引用
2nd international conference on Pervasive Computing Advances and Applications (PerCAA 2024)
作者: Seema Kaloria Rakesh Kumar Saxena Deshraj Bairwa Faculty of Computer Science & Engineering Poornima University Jaipur Rajasthan India
Network traffic analysis is one of the necessary processes through which there can be monitoring, securing, and optimizing network operations. It is hard for this approach to notice some unknown or evolving kinds of s...
来源: 评论
Classification of Internet of Things Cybersecurity Attacks Using a Hybrid Deep Learning Approach  2nd
Classification of Internet of Things Cybersecurity Attacks U...
收藏 引用
2nd international conference on Innovations of Intelligent Informatics, Networking and Cybersecurity, 3INC 2024
作者: Kareem, Eman Karkawi Manaa, Mehdi Ebady Department of Information Networks College of IT University of Babylon Babylon Iraq Intelligent Medical Systems Department College of Sciences Al-Mustaqbal University Babylon51001 Iraq College of Information Technology University of Babylon Babylon Iraq
IoT devices play an integral part of our digital life today, yet pose significant security risks. These risks allow attackers to carry out various cyberattacks, mainly distributed denial of service (DDoS) attacks. To ... 详细信息
来源: 评论