咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 84 篇 期刊文献

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,879 篇 工学
    • 2,570 篇 计算机科学与技术...
    • 1,720 篇 软件工程
    • 968 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 355 篇 wireless sensor ...
  • 308 篇 computer network...
  • 254 篇 protocols
  • 249 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 201 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 166 篇 computer securit...
  • 160 篇 network security
  • 158 篇 information secu...
  • 155 篇 internet of thin...
  • 150 篇 distributed comp...
  • 147 篇 computer science
  • 146 篇 cryptography
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,022 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5374 条 记 录,以下是1061-1070 订阅
排序:
Securing Digital Governance: A Deep Learning and Blockchain Framework for Malware Detection in IoT networks
Securing Digital Governance: A Deep Learning and Blockchain ...
收藏 引用
Integrated Intelligence and Communication systems (ICIICS), international conference on
作者: Priyanka Pramod Pawar Deepak Kumar Mohan Kumar Meesala Piyush Kumar Pareek Santosh Reddy Addula Shwetha K S Department of Information Technology University of the Cumberlands Williamsburg KY USA Department of Artificial Intelligence & Machine Learning Nitte Meenakshi Institute of Technology Bengaluru India Department of Computer Science and Engineering Dayananda Sagar College of Engineering Bangalore India
This research uses deep learning and blockchain frameworks to provide a safe platform that promotes digital governance data exchange and interoperability. Use the bonobo optimization algorithm to start a blockchain-ba... 详细信息
来源: 评论
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications
Owl: Differential-Based Side-Channel Leakage Detection for C...
收藏 引用
international conference on Dependable systems and networks (DSN)
作者: Yu Zhao Wenjie Xue Weijie Chen Weizhong Qiang Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Over the past decade, various methods for detecting side-channel leakage have been proposed and proven to be effective against CPU side-channel attacks. These methods are valuable in assisting developers to identify a... 详细信息
来源: 评论
REPLACE: Real-time security Assurance in Vehicular Platoons Against V2V Attacks
REPLACE: Real-time Security Assurance in Vehicular Platoons ...
收藏 引用
IEEE Intelligent Transportation systems conference (ITSC)
作者: Boddupalli, Srivalli Hegde, Ashwini Ray, Sandip Univ Florida Dept Elect & Comp Engn Gainesville FL 32611 USA
Connected Autonomous Vehicular (CAV) platoon refers to a group of vehicles that coordinate their movements and operate as a single unit. The vehicle at the head acts as the leader of the platoon and determines the cou... 详细信息
来源: 评论
A Powered-Up Classification of Disabling distributed Network Cloud-Based Attacks Using MLPNN-BP and MLPNN-LM  1
收藏 引用
3rd international conference on Machine Intelligence and Smart systems, MISS 2023
作者: Singh, Dhiraj Mishra, Rahul Centre for Interdisciplinary Research in Business and Technology Chitkara University Punjab Rajpura140401 India
An Intrusion Detection System (IDS) is a form of network security that monitors for malicious activity. In the cloud, an IDS might operate on individual hosts or over an entire network. DDoS attacks are so named becau... 详细信息
来源: 评论
Exploring Quantum Computing Use Cases for Critical National Infrastructures  23
Exploring Quantum Computing Use Cases for Critical National ...
收藏 引用
Proceedings of the 7th international conference on Future networks and distributed systems
作者: Maryah Alghamdi Sara Alghamdi College of Computer Science and Engineering King Fahd University of Petroleum and Minerals Saudi Arabia and Information Technology Engineering Department Aramco Saudi Arabia College of Computer Science and Engineering King Fahd University of Petroleum and Minerals Saudi Arabia and Cyberani Saudi Arabia
Quantum computing is one of the evolving fields within computer science. It leverages benefits from physics, mathematics, and quantum principles in order to develop a computer with capabilities not ever witnessed befo... 详细信息
来源: 评论
Break-Glass Conceptual Model for distributed EHR management system based on Blockchain, IPFS and ABAC  12
Break-Glass Conceptual Model for Distributed EHR management ...
收藏 引用
12th international conference on Emerging Ubiquitous systems and Pervasive networks, EUSPN 2021 / 11th international conference on Current and Future Trends of Information and Communication Technologies in Healthcare, ICTH 2021
作者: Saberi, Mohammad Ali Adda, Mehdi McHeick, Hamid Department of Computer Science Mathematics University of Quebec at Chicoutimi ChicoutimiG7H 2B1 Canada Department. of Computer Science Mathematics University of Quebec at Rimouski RimouskiG5L 3A1 Canada
The recently proposed Blockchain-based healthcare system proposes an interesting vision for the level of data integrity and security. This research aims to propose a conceptual model of a break-glass conceptual for Bl... 详细信息
来源: 评论
VLDB workshops: international Workshop on Polystore systems for Heterogeneous Data in Multiple Databases with Privacy and security Assurances, Poly 2021 and 7th international Workshop on Data Management and Analytics for Medicine and Healthcare, DMAH 2021
VLDB workshops: International Workshop on Polystore Systems ...
收藏 引用
VLDB workshops: international Workshop on Polystore systems for Heterogeneous Data in Multiple Databases with Privacy and security Assurances, Poly 2021 and 7th international Workshop on Data Management and Analytics for Medicine and Healthcare, DMAH 2021
The proceedings contain 13 papers. The special focus in this conference is on Polystore systems for Heterogeneous Data in Multiple Databases with Privacy and security Assurances. The topics include: Administrative Hea...
来源: 评论
Optimized Data Storage Algorithm of IoT Based on Cloud Computing in distributed System
Optimized Data Storage Algorithm of IoT Based on Cloud Compu...
收藏 引用
Emerging Trends in Industry 4.0 (ETI 4.0)
作者: K.Jaya Deepthi T.Suresh Balakrishnan Prabhakar Krishnan U.Samson Ebenezar Nageshwari Department of AIML Mohan Babu University Tirupati-2 AP India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India IEEE Research Scientist Center for Cyber security Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri-campus India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical SciencesSaveetha University Chennai Tamil Nadu India Department of Computer Science and Engineering CARE College of Engineering Trichy Tamil Nadu
IoT and cloud technology are vital for large systems. An improved data storage technique for IoT applications and cloud distribution is described in this research. Scalability, reliability, latency, and resource usage... 详细信息
来源: 评论
security and Privacy Enabled Framework for Online Social networks using Blockchain
Security and Privacy Enabled Framework for Online Social Net...
收藏 引用
Electronics and Sustainable Communication systems (ICESC), 2020 international conference on
作者: Arvind Kumar Tushar Vyas Saleem Ahmed Nitin Girdharwal E. Vijayakumar Arivanantham Thangavelu MRIIRS Faridabad Haryana India Department of CSE JECRC University Jaipur Rajasthan India Oryx Universal College Doha Qatar Prestige Institute of Management & Research (PIMR) Indore Madhya Pradesh India KIT- Kalaignar Karunanidhi Institute of Technology Coimbatore Tamilnadu India Computer Engineering Dr. D. Y. Patil College of Engineering and Innovation Varale Talegaon Pune Maharashtra India
Users may easily deal with data overload concerns while navigating Online Social networks (OSN) through suggestion engines. In addition, it increases a number of privacy-related issues, particularly for users who woul...
来源: 评论
Optimizing Energy Management and Load Balancing Through AI-Driven Quantum Approximate Optimization
Optimizing Energy Management and Load Balancing Through AI-D...
收藏 引用
Mobile networks and Wireless Communications (ICMNWC), IEEE international conference on
作者: Manjunath Kamath K Manasa M Anitha B. S Mahadevi Falguni Tlajiya Sangramjit Chavan Department of Cyber Security NMAM Institute of Technology NITTE (Deemed to be University) Karkala India Department of Artificial Intelligence and Machine Learning Brindavan College of Engineering Bengaluru India Department of Computer Science Sarada Vilas College Mysuru India Department of Electrical Engineering Parul institute of Engineering and Technology Parul University Gujarat India Symbiosis Law School (SLS) Symbiosis International (Deemed University) (SIU) Pune India
The integration of Quantum Approximate Optimization Algorithm (QAOA) and Quantum Annealing (QA) offers a promising approach to addressing energy management and load balancing challenges in modern power systems. This s... 详细信息
来源: 评论