咨询与建议

限定检索结果

文献类型

  • 5,039 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,406 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,904 篇 工学
    • 2,594 篇 计算机科学与技术...
    • 1,728 篇 软件工程
    • 989 篇 信息与通信工程
    • 376 篇 电气工程
    • 327 篇 控制科学与工程
    • 200 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 129 篇 动力工程及工程热...
    • 127 篇 电子科学与技术(可...
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 73 篇 仪器科学与技术
    • 70 篇 建筑学
    • 59 篇 交通运输工程
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
  • 620 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 101 篇 统计学(可授理学、...
    • 85 篇 物理学
  • 506 篇 管理学
    • 355 篇 管理科学与工程(可...
    • 201 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 243 篇 法学
    • 166 篇 法学
    • 83 篇 社会学
  • 79 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 52 篇 公共卫生与预防医...
  • 63 篇 经济学
    • 63 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 510 篇 security
  • 357 篇 wireless sensor ...
  • 308 篇 computer network...
  • 254 篇 protocols
  • 249 篇 computer archite...
  • 222 篇 intrusion detect...
  • 214 篇 authentication
  • 210 篇 computer communi...
  • 201 篇 ip networks
  • 196 篇 computer crime
  • 172 篇 servers
  • 166 篇 computer securit...
  • 163 篇 network security
  • 158 篇 information secu...
  • 157 篇 internet of thin...
  • 149 篇 distributed comp...
  • 147 篇 computer science
  • 146 篇 computational mo...
  • 145 篇 cryptography
  • 142 篇 data security

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 graphic era deem...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 natrayan l.
  • 6 篇 yunhao liu

语言

  • 4,953 篇 英文
  • 422 篇 其他
  • 45 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5406 条 记 录,以下是1031-1040 订阅
排序:
Assets Criticality Assessment of Industrial Control systems: A Wind Farm Case Study
Assets Criticality Assessment of Industrial Control Systems:...
收藏 引用
IEEE international conference on Software Quality, Reliability and security (QRS)
作者: Shwetha Gowdanakatte Mahmoud Abdelgawad Indrakshi Ray Department of Systems Engineering Colorado State University Fort Collins Colorado USA Department of Computer Science Colorado State University Fort Collins Colorado USA
The increasing growth of threats to Industrial Control systems (ICS) in the energy sector puts this critical infrastructure at high risk. Consequently, holistic approaches are needed to assess the criticality of ICS a... 详细信息
来源: 评论
BlockChain Based Chat Application
BlockChain Based Chat Application
收藏 引用
Emerging Technology (INCET), international conference for
作者: Ishan Lokhande Nilesh Deotale Bharat Mali Sneha Chauhan Jayesh Dhuri Depertment of Computer Engineering St. John College of Engineering and Management Palghar India
Peer-to-peer networks are used by decentralized applications to ensure that no network failure can be caused by a failing central node. Today's environment, where holding data on a centralized server might be unsa...
来源: 评论
TOSA: Tolerating Stuck-At-Faults in Edge-based RRAM Inference Accelerators
TOSA: Tolerating Stuck-At-Faults in Edge-based RRAM Inferenc...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Shaofeng Zhao Bo Liu Fang Wang Dan Feng Xiang Chen School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Cyberspace Security Zhengzhou University Zhengzhou China
Applications powered by Deep Neural networks (DNNs) are shifting from cloud to edge computing due to the promising performance efficiency of Resistive Random Access Memory (RRAM) devices. However, modern RRAM devices ...
来源: 评论
Detection and Prevention of Advanced Persistent Threat (APT) Activities in Heterogeneous networks using SIEM and Deep Learning
Detection and Prevention of Advanced Persistent Threat (APT)...
收藏 引用
international conference on Computing and Networking Technology (ICCNT)
作者: V S Tharunika Shridhar T K Veeresh Senthil Kumar Thangavel Karthik Srinivasan Sulakshan Vajipayajula Anjali Tibrewal Computer Science and Engineering Amrita Vishwa Vidyapeetham Coimbatore India IBM Security International Business Machines India Pvt. Ltd.
distributed Denial of Service (DDOS) in IOT based systems has become a vital consideration especially since the quintessential development of IOT based gadgets including small Personal Digital Assistants (PDA) to larg...
来源: 评论
An Exploration of Evaluating the Performance of Malware Detection in the Cloud Environment
An Exploration of Evaluating the Performance of Malware Dete...
收藏 引用
international conference on computer Communication and Informatics (ICCCI)
作者: Charan Nivas Reddy Kaipu Gopu Karthik Konala Sree Umadevi Koneru Kamal Koushik T Pavan Kumar S. Kavitha Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Guntur India
Numerous businesses now adopt cloud computing, putting their server, storage, and application resources on a network in the cloud somewhere online. Data from the user is stored on cloud at a low price, making cloud co... 详细信息
来源: 评论
Internet of Things Protocols (IoTp) Literature Review  23
Internet of Things Protocols (IoTp) Literature Review
收藏 引用
Proceedings of the 7th international conference on Future networks and distributed systems
作者: Ali Alamery Mohanad Abd Shehab Omar Abdulkareem Mahmood Yousif I Hammadi Ahmed Aziz Mohammed Saleh Ali Muthanna Balad Al-hadeth group company Balad Al-hadeth group company Iraq Electrical Engineering Department Mustansiriyah University Iraq Department of Communications Engineering University of Diyala Iraq Dep. of Medical Instruments Engineering Techniques Bilad Alrafidain University College Iraq Department of computer science Benha university Egypt and International Business Management Department Tashkent State University of Economics Uzbekistan Institute of Computer Technologies and Information Security Southern Federal University Russia
Considering today's variety of technologies and devices connected to the network, a huge number of manufacturers, there are many problems of their interaction and the need to create and adopt specialized communica...
来源: 评论
Guest Editorial: Softwarized Networking for Next Generation Industrial Cyber-Physical systems
收藏 引用
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 2021年 第8期17卷 5506-5510页
作者: Garg, Sahil Wang, Honggang Granelli, Fabrizio Li, Hongwei Univ Quebec Ecole Technol Super Montreal PQ H3C 1K3 Canada Univ Massachusetts Dartmouth N Dartmouth MA 02747 USA Univ Trento I-38122 Trento Italy Univ Elect Sci & Technol China Chengdu 610054 Peoples R China
The papers in this special section focus on softwarized networking for next generation industrial cyber-physical systems (CPSs). With the emergence of embedded and ubiquitous cyberphysical applications, the rationale ... 详细信息
来源: 评论
A design of dynamic rate aware classified key for network security in wireless sensor network through optimized distributed secure routing protocol
A design of dynamic rate aware classified key for network se...
收藏 引用
Artificial Intelligence and Smart Communication (AISC), international conference on
作者: A. Shameem Surendra Kumar Shukla Mohit Tiwari Dharam Buddhi Yashpal Singh Ushasree R AMET Business School AMET University Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India Department of Computer Science and Engineering Bharati Vidyapeeth’s College of Engineering Delhi Uttaranchal Institute of Technology Uttaranchal University Dehradun Uttarakhand Department of Computer Science andEngineering Jain Deemed to be University Bengaluru Karnataka India Department of MCA Dayanad Sagar Academy of Technology and Management Bangalore India
Data must be transferred in a secure manner in order to transmit information through an industrial network, creating a high security root. A lot of study has been done on wireless internet network routing security iss... 详细信息
来源: 评论
Real-Time Anomaly Detection in 5G networks Through Edge Computing
Real-Time Anomaly Detection in 5G Networks Through Edge Comp...
收藏 引用
IEEE international conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS)
作者: Riaz Shaik Dara Raju Prakash Chandra Behera Ravindra Changala S. Suma Christal Mary A. Balakumar Department of CSE KL University Vaddeswaram Andhra Pradesh India Dept. of Computer Science & Engineering Vignana Bharathi Institute and Technology Aushapur Ghatkesar India Department of Science St. Claret College Bangalore India Department of Information Technology Guru Nanak Institutions Technical Campus Hyderabad India Department of Information Technology Panimalar Engineering College Poonamalle Chennai Department of ECE K. Ramakrishnan College Of Engineering samayapuram Trichy India
Strong anomaly detection techniques are becoming more and more necessary as 5G networks develop in order to maintain network performance, security, and dependability. This study leverages the capabilities of Mobile Ed... 详细信息
来源: 评论
Ensuring Privacy and security of IoT networks Utilizing Blockchain and Federated Learning
Ensuring Privacy and Security of IoT Networks Utilizing Bloc...
收藏 引用
international conference on Future Internet of Things and Cloud (FiCloud)
作者: Md Mamunur Rashid Piljoo Choi Suk-Hwan Lee Jan Platos Young Huh Ki-Ryong Kwon Department of Artificial Intelligence Convergence Pukyong National University Busan Republic of Korea Department of Computer Engineering Donga University Busan Republic of Korea Department of Electrical Engineering and Computer Science VSB-Technical University of Ostrava Ostrava Czech Republic Korea Smart Medical Device Industry Promotion Foundation Seoul Republic of Korea
The Internet of Things (IoT) has become a game-changing technology, bridging the gap between the real and virtual worlds and allowing for smooth data transfer and communication between linked objects. The other two po...
来源: 评论