咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 84 篇 期刊文献

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,879 篇 工学
    • 2,570 篇 计算机科学与技术...
    • 1,720 篇 软件工程
    • 968 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 355 篇 wireless sensor ...
  • 308 篇 computer network...
  • 254 篇 protocols
  • 249 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 201 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 166 篇 computer securit...
  • 160 篇 network security
  • 158 篇 information secu...
  • 155 篇 internet of thin...
  • 150 篇 distributed comp...
  • 147 篇 computer science
  • 146 篇 cryptography
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,022 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5374 条 记 录,以下是1051-1060 订阅
排序:
Performance Evaluation of Consensus Algorithms for Permissioned Blockchain networks
Performance Evaluation of Consensus Algorithms for Permissio...
收藏 引用
international conference on Computing and Networking Technology (ICCNT)
作者: Triveni Kalwad Vinuta Aramani Needa Fatima Attar Neha Raikar Narayan D G Manjula Pawar Pooja Shettar Department of Computer Science and Engineering KLE Technological University Hubballi India
The ever-evolving technological landscape demands systems that can ensure trust, security, transparency, and traceability. To meet these requirements, blockchain technology has emerged that uses decentralized ledgers ...
来源: 评论
Detecting DDoS Attacks in Software-Defined Networking through the Utilization of Supervised and Unsupervised Learning Techniques
Detecting DDoS Attacks in Software-Defined Networking throug...
收藏 引用
international conference on Computing and Networking Technology (ICCNT)
作者: T Sathwik Tadi Sai Vishruth Reddy Venkat Rohith Gangavarapu Sreebha Bhaskaran Dept. of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Given the dynamic nature of SDN environments, it is necessary to quickly recognize distributed Denial of Service (DDoS) attacks to maintain our network’s integrity and ensure uninterrupted service delivery. However, ... 详细信息
来源: 评论
Smart Mining and Consensus Protocols in Blockchain-enabled Industrial Cyber-Physical systems: A Survey  23
Smart Mining and Consensus Protocols in Blockchain-enabled I...
收藏 引用
Proceedings of the 7th international conference on Future networks and distributed systems
作者: Salah Eddine Elgharbi Samir Ouchani Abderrahim Ait Wakrime Yassine Ouhammou La Rochelle University France CESI Lineact France Computer Science Department Mohammed V University in Rabat Morocco LIAS/ISAE France
The integration of emerging technologies into industrial systems is essential for facilitating collaboration among diverse stakeholders and optimizing the management of extensive assets. Efficient decision-making proc... 详细信息
来源: 评论
Big Data Framework to Detect and Mitigate distributed Denial of Service(DDoS) Attacks in Software-Defined networks (SDN)
Big Data Framework to Detect and Mitigate Distributed Denial...
收藏 引用
Electrical, computer, Communications and Mechatronics Engineering (ICECCME), international conference on
作者: Amirreza Fazely Hamedani Muzzamil Aziz Philipp Wieder Ramin Yahyapour Department of Computer Science Göettingen University Göttingen Germany eScience Group Gesellschaft für Wissenschaftliche Datenverarbeitung mbH Göttingen (GWDG) Göttingen Germany
The software-defined network is in recent years come into the sight of so many network designers as a successor to the traditional network. This type of network is vulnerable to DDoS attacks, targeting a different par...
来源: 评论
Various Modulation Types Classification on the Air by Convolutional Neural Network  23
Various Modulation Types Classification on the Air by Convol...
收藏 引用
Proceedings of the 7th international conference on Future networks and distributed systems
作者: Yousif I Hammadi Mokhalad Abdulameer Kadhim Alsaeedi Omar Abdulkareem Mahmood Aws Zuhair Sameen Mohammed Saleh Ali Muthanna Ahmed Aziz Ammar Muthanna Dep. of Medical Instruments Engineering Techniques Bilad Alrafidain University College Iraq Department of Communications Engineering University of Diyala Iraq Department of Medical Instrumentation Engineering Techniques Al-Farahidi University Iraq Institute of Computer Technologies and Information Security Southern Federal University Russia Department of computer science Benha university Egypt and International Business Management Department Tashkent State University of Economics Uzbekistan Department of Telecommunication Networks and Data Transmission The Bonch Bruevich Saint Petersburg State University of Telecommunications Russia and Department of Applied Probability and Informatics Peoples Friendship University of Russia Russia
Deep learning (DL), a relatively recent AI technique, has been successfully applied to the problem of automated modulation categorization (AMC), with promising results. An essential part of developing the spectrum-sen...
来源: 评论
DDoS Flood Detection and Mitigation using SDN and Network Ingress Filtering - an Experiment Report
DDoS Flood Detection and Mitigation using SDN and Network In...
收藏 引用
Electronic Communications, Internet of Things and Big Data (ICEIB), international conference on
作者: Sebastien Marleau Prianna Rahman Chung–Horng Lung Department of Systems and Computer Engineering Carleton University Ottawa Canada
distributed Denial of Service (DDoS) attacks are a common security threat to overwhelm a target server. IP source spoofing is a common approach used for DDoS attacks. It is claimed that all large DDoS attacks require ... 详细信息
来源: 评论
Digitization and Secure Process of Forensic Data Management Using Blockchain
Digitization and Secure Process of Forensic Data Management ...
收藏 引用
IEEE international conference on System, Computation, Automation and Networking (ICSCAN)
作者: R. Indhumathi P. Mathivanan K. Mahalakshmi K. Subha Nanda S. Krishna Department of Computer Science and Engineering Manakula Vinayagar Institute of Technology Puducherry India Department of Computer Science and Business Systems KIT - Kalaignarkarunanidhi Institute of Technology Coimbatore India Department of Computer Science and Engineering Surya Group of Institutions Villuppuram India
Cyber threats and data manipulation are the main concerns in this technological society. The investigator finds it challenging to submit evidence to the court because of the information breach as continuity documentat...
来源: 评论
Comparative Analysis of Communication Protocols in Blockchain-IoT systems for Optimizing IoT Data Flow Efficiency
Comparative Analysis of Communication Protocols in Blockchai...
收藏 引用
Advanced Innovations in Smart Cities (ICAISC), international conference on
作者: Mnar Alnaghes Hong Shen School of Computer Science University of Adelaide Adelaide Australia
The Internet of Things (IoT) is considered an evolving technology, consisting of different types of connected devices that have sensors, specialized hardware, and software. However, considerable challenges related to ... 详细信息
来源: 评论
distributed Collaborative Anomaly Detection for Trusted Digital Twin Vehicular Edge networks  1
收藏 引用
16th international conference on Wireless Algorithms, systems, and Applications (WASA)
作者: Liu, Jiawen Zhang, Shuaipeng Liu, Hong Zhang, Yan East China Normal Univ Sch Software Engn Shanghai Peoples R China Univ Oslo Dept Informat Oslo Norway
The vehicular networks are vulnerable to cyber security attacks due to the vehicles' large attack surface. Anomaly detection is an effective means to deal with this kind of attack. Due to the vehicle's limited... 详细信息
来源: 评论
ISecIT 2021 - Proceedings of the 3rd international conference on Information security and Information Technologies, co-located with 1st international Forum "Digital Reality", DRForum 2021
ISecIT 2021 - Proceedings of the 3rd International Conferenc...
收藏 引用
3rd international Scientific and Practical conference on Information security and Information Technologies, ISecIT 2021
The proceedings contain 43 papers. The topics discussed include: development of a method for detecting deviations in the nature of traffic from the elements of the communication network;method of recognition sarcasm i...
来源: 评论