咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 84 篇 期刊文献

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,879 篇 工学
    • 2,570 篇 计算机科学与技术...
    • 1,720 篇 软件工程
    • 968 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 355 篇 wireless sensor ...
  • 308 篇 computer network...
  • 254 篇 protocols
  • 249 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 201 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 166 篇 computer securit...
  • 160 篇 network security
  • 158 篇 information secu...
  • 155 篇 internet of thin...
  • 150 篇 distributed comp...
  • 147 篇 computer science
  • 146 篇 cryptography
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,022 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5374 条 记 录,以下是1081-1090 订阅
排序:
MnemoSys: A Conditional Probability Estimation Protocol for Blockchain Audited Reputation Management
MnemoSys: A Conditional Probability Estimation Protocol for ...
收藏 引用
IEEE international conference on Trust, Privacy and security in Intelligent systems and Applications (TPS-ISA)
作者: Daniel Rouhana Peyton Lundquist Tim Andersen Gaby G. Dagher Department of Computer Science Washington State University Department of Computer Science Boise State University
Reputation systems have been one method of solving the unique challenges that face distributed networks of independent operators. Fundamentally, historical performance must be considered in a way that attempts to pred... 详细信息
来源: 评论
Synthesis of Adversarial DDoS Attacks Using Wasserstein Generative Adversarial networks with Gradient Penalty
Synthesis of Adversarial DDoS Attacks Using Wasserstein Gene...
收藏 引用
6th international conference on Computational Intelligence and Applications, ICCIA 2021
作者: Shieh, Chin-Shiuh Nguyen, Thanh-Tuan Lin, Wan-Wei Huang, Yong-Lin Horng, Mong-Fong Lee, Tsair-Fwu Miu, Denis National Kaohsiung University of Science and Technology Department of Electronic Engineering Taiwan Genie Networks Ltd Taiwan
DDoS (distributed Denial of Service) has become a pressing and challenging threat to the security and integrity of computer networks and information systems. The detection of DDoS attacks is essential before any mitig... 详细信息
来源: 评论
An Autoencoder-Based Approach for DDoS Attack Detection Using Semi-Supervised Learning
An Autoencoder-Based Approach for DDoS Attack Detection Usin...
收藏 引用
Next-Generation Computing, IoT and Machine Learning (NCIM), international conference on
作者: Tamanna Fardusy Sayma Afrin Ifrat Jahan Sraboni Uttam Kumar Dey Department of Computer Science and Engineering Uttara University Dhaka Bangladesh
A distributed Denial of Service (DDoS) attack is a malicious cyber-attack strategy that seeks to disrupt normal traffic to a specific server by overwhelming it with an excessive amount of requests or data. In recent y...
来源: 评论
Efficiency-enhanced Blockchain-based Client Selection in Heterogeneous Federated Learning
Efficiency-enhanced Blockchain-based Client Selection in Het...
收藏 引用
IEEE international conference on Blockchain (Blockchain)
作者: Zhiqi Lei Keke Gai Jing Yu Shuo Wang Liehuang Zhu Kim-Kwang Raymond Choo School of Computer Science and Technology Beijing Institute of Technology Beijing China Yangtze Delta Region Academy of Beijing Institute of Technology Jiaxing Zhejiang China School of Cyberspace Science and Technology Beijing Institute of Technology Beijing China Chinese Academy of Sciences Institute of Information Engineering Beijing China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio TX USA
In Federated Learning (FL), blockchain has been extensively used to achieve distributed and tamper-resistant data processing. However, typical Blockchain-based Federated Learning (BFL) rarely considers clients’ resou...
来源: 评论
Piecing Together the Jigsaw Puzzle of Transactions on Heterogeneous Blockchain networks  25
Piecing Together the Jigsaw Puzzle of Transactions on Hetero...
收藏 引用
Abstracts of the 2025 ACM SIGMETRICS international conference on Measurement and Modeling of computer systems
作者: Xiaohui Hu Hang Feng Pengcheng Xia Gareth Tyson Lei Wu Yajin Zhou Haoyu Wang Huazhong University of Science and Technology Wuhan Zhejiang China Zhejiang University Hangzhou Zhejiang China Huazhong University of Science and Technology Wuhan Hubei China Hong Kong University of Science and Technology (GZ) Guangzhou Guangdong China
The Web3 ecosystem is increasingly evolving to include multiple chains, with decentralized applications (dApps) distributed across different blockchains. This has driven the need for cross-chain bridges to enable bloc... 详细信息
来源: 评论
Medchain: Securing Electronic Medical Records with a Peer to Peer networks and distributed File System  1
收藏 引用
3rd international conference on Futuristic Trends in Network and Communication Technologies, FTNCT 2020
作者: Gururaj, H.L. Goutham, B. Janhavi, V. Suhas, K.C. Manu, M.N. Vidyavardhaka College of Engineering Mysuru India Channabasaveshwara Institute of Technology Tumkur India SJB Institute of Technology Bengaluru India
Though the advances in technology have changed every aspect of our lives, it has barely budged the way we think about our medical records being stored across various platforms. This electronic document talks about the... 详细信息
来源: 评论
Impact of Aggregation Function Randomization against Model Poisoning in Federated Learning
Impact of Aggregation Function Randomization against Model P...
收藏 引用
IEEE international conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Seyedsina Nabavirazavi Rahim Taheri Mohammad Shojafar Sundararaja Sitharama Iyengar School of Computing and Information Sciences Florida International University USA Faculty of Technology School of Computing University of Portsmouth UK 5G/6G Innovation Centre (5G/6GIC) Institute for Communication Systems University of Surrey UK
Federated learning has gained significant attention as a privacy-preserving approach for training machine learning models across decentralized devices. However, this distributed learning paradigm is susceptible to adv... 详细信息
来源: 评论
Safety in distributed Sensor networks: A Literature Review  5
Safety in Distributed Sensor Networks: A Literature Review
收藏 引用
5th international conference on Internet of Things, Big Data and security (IoTBDS)
作者: Altenburg, Tobias Bosse, Sascha Turowski, Klaus Otto von Guericke Univ Fac Comp Sci Very Large Business Applicat Lab Magdeburg Germany
The connectivity megatrend dominates the current social change. The number of networked devices and the resulting amount of data is constantly increasing worldwide. For this reason, the dependability of computer syste... 详细信息
来源: 评论
Analysis of BayesNet Classifier for DDoS Detection in Vehicular networks
Analysis of BayesNet Classifier for DDoS Detection in Vehicu...
收藏 引用
Augmented Intelligence and Sustainable systems (ICAISS), international conference on
作者: Amandeep Verma Rahul Saha School of Computer Science and Engineering Lovely Professional University India
In vehicular networks, distributed Denial of Service (DDoS), an extension of Denial of Service (DoS) attacks, disrupt the normal vehicular network services. Existing DDoS detection systems in vehicular networks use a ... 详细信息
来源: 评论
Macroscopic Insights of IoT Botnet Dynamics Via AS-level Tolerance Assessment
Macroscopic Insights of IoT Botnet Dynamics Via AS-level Tol...
收藏 引用
IEEE international conference on Communications (ICC)
作者: Hatem A. Almazarqi Mathew Woodyard Angelos K. Mamerides Department of Information Technology Faculty of Computing and Information Technology in Rabigh King Abdulaziz University Rabigh Saudi Arabia School of Computing Science University of Glasgow Glasgow Scotland UK Okta Inc. San Francisco CA USA Dept. of Electrical & Computer Engineering & KIOS CoE University of Cyprus Nicosia Cyprus
The ubiquitous integration of the IoT in current sociotechnical systems alongside the manufacturing of IoT devices and IoT-enabled services equipped with minimal security, has profoundly altered the cyber-threat lands... 详细信息
来源: 评论