咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 87 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 5,104 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 496 篇 security
  • 355 篇 wireless sensor ...
  • 312 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 202 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 149 篇 cryptography
  • 147 篇 computer science
  • 142 篇 computational mo...
  • 142 篇 internet
  • 140 篇 data security

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...
  • 6 篇 the islamic univ...
  • 6 篇 graphic era deem...

作者

  • 9 篇 hammoudeh mohamm...
  • 9 篇 obaidat mohammad...
  • 8 篇 igor kotenko
  • 8 篇 eyas el-qawasmeh
  • 7 篇 yanmin zhu
  • 7 篇 barolli leonard
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 mohammad s. obai...
  • 6 篇 shahid raza
  • 6 篇 thiemo voigt
  • 6 篇 natrayan l
  • 6 篇 das sajal k.
  • 6 篇 mohammad hammoud...
  • 6 篇 keromytis angelo...
  • 5 篇 isaac woungang
  • 5 篇 ma jianfeng
  • 5 篇 lionel m. ni
  • 5 篇 wehrle klaus

语言

  • 4,987 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5104 条 记 录,以下是101-110 订阅
排序:
Exploring Artificial Intelligence’s Potential in Developing Advanced distributed Denial of Service Defense Strategies
Exploring Artificial Intelligence’s Potential in Developing...
收藏 引用
international conference on Computing and Machine Learning, CML 2024
作者: Alhindi, Ahmad Computer Science and Artificial Intelligence Department College of Computer and Information Systems Makkah Saudi Arabia
Facing the growing menace of distributed denial of service (DDoS) attacks, there’s a critical demand for enhanced detection mechanisms. This necessitates a shift from traditional methodologies to more advanced, dynam... 详细信息
来源: 评论
A Novel distributed Tree-Based One-Hot Encoding (DTOHE) Technique for Intrusion Detection  6th
A Novel Distributed Tree-Based One-Hot Encoding (DTOHE) Tech...
收藏 引用
6th international conference on Recent Innovations in Computing, ICRIC 2023
作者: Abirami, K. Samraj, Jasmine Chennai India
In the realm of cloud security, intrusion detection systems (IDSs) play a pivotal role as they are instrumental in identifying vulnerable activities occurring across networks and computer systems. Developing a novel I... 详细信息
来源: 评论
Enhancing Building Management systems with distributed Intelligence  13
Enhancing Building Management Systems with Distributed Intel...
收藏 引用
13th IEEE international conference on Communication systems and Network Technologies, CSNT 2024
作者: Rajalakshmi, B. Reddy, V Venkat Malviya, Bhupendra Thethi, H Pal Praveen Adnan, Myasar Mundher New Horizon College of Engineering Department of Computer Science Bangalore India Institute of Aeronautical Engineering Hyderabad India Ies College of Technology Department of Computer Science & Engineering M. P. Bhopal India Lovely Professional University Phagwara India Lloyd Institute of Engineering & Technology Uttar Pradesh Greater Noida201306 India The Islamic University Najaf Iraq
There has been a significant change in the management and operation of buildings as a result of the incorporation of distributed Intelligence into Building Management systems. This paper analyzes the revolutionary pot... 详细信息
来源: 评论
Vehicle Identification Using RESNET-50: CNN approach  3
Vehicle Identification Using RESNET-50: CNN approach
收藏 引用
3rd IEEE international conference on Blockchain and distributed systems security, ICBDS 2024
作者: Singh, Kartikey Patil, Netra Mohite, Sagar Ganapati Jadhav, Swati Mohite, Snehal Gayakwad, Milind Joshi, Rahul College of Engineering Department of Computer Engineering Pune India BARTC's Vishwakarma Institute of Technology Department of Computer Engineering Pune India College of Engineering Cse Department Pune India College of Engineering Department of It Pune India Symbiosis Institute of Technology Cse Department Pune India
Vehicle This paper proposes a method for vehicle brand identification using a Convolution Neural Network (CNN) with improved Accuracy. The proposed method utilizes static image datasets and live CCTV surveillance data... 详细信息
来源: 评论
international conference on Current Problems of Applied Mathematics and computer systems, CPAMCS 2023
International Conference on Current Problems of Applied Math...
收藏 引用
international conference on Current Problems of Applied Mathematics and computer systems, CPAMCS 2023
The proceedings contain 59 papers. The special focus in this conference is on Current Problems of Applied Mathematics and computer systems. The topics include: Forced Longitudinal Oscillations of Vertical Rods with Co...
来源: 评论
LiteCrypt: Enhancing IoMT security with Optimized HE and Lightweight Dual-Authorization  30
LiteCrypt: Enhancing IoMT Security with Optimized HE and Lig...
收藏 引用
30th IEEE international conference on Parallel and distributed systems, ICPADS 2024
作者: Xie, Qipeng Wang, Weizheng Huang, Yongzhi Zheng, Mengyao Shang, Shuai Jiang, Linshan Khan, Salabat Wu, Kaishun IoT Thrust Guang Zhou China Hong Kong University of Science and Technology Hong Kong City University of Hong Kong Computer Science Engineer Hong Kong Dsa Thrust Information Hub Guang Zhou China Harvard T.H. Chan School of Public Health Boston United States University of Electronic Science and Technology of China Chengdu Chengdu China National University of Singapore Institute of Data Science Singapore
The integration of 5G/6G networks with intelligent healthcare systems has enabled early disease detection through patient data monitoring. However, the Internet of Medical Things (IoMT) and remote healthcare services ... 详细信息
来源: 评论
Secure and Efficient Data Transmission for IoT Devices in Untrusted Environments
Secure and Efficient Data Transmission for IoT Devices in Un...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Jain, Upma Smitha, K. Battula, R.S.S. Raju Sarkar, Arindam Martin, Natasha Natrayan, L. Graphic Era Deemed to Be University Department of Computer Science & Engineering Dehradun India Adichunchanagiri University Bgs Institute of Technology Department of Artificial Intelligence and Machine Learning India Aditya University Department of Computer Applications India Heritage Institute of Technology Department of Applied Electronics and Instrumentation Engineering Kolkata India Department of Law Symbiosis Law Pune India School of Engineering Simats Department of Mechanical Engineering Saveetha India
One technological trend that will not go away in the modern world is the Internet of Things (IoT). With the development of the Internet of Things, the world is becoming smarter. The efficacy, flexibility, and simplici... 详细信息
来源: 评论
An Energy Efficient Clustering for Underwater Acoustic Sensor networks using 6G Technology  5
An Energy Efficient Clustering for Underwater Acoustic Senso...
收藏 引用
5th IEEE international conference on Recent Trends in computer Science and Technology, ICRTCST 2024
作者: Siddiqui, Shams Tabrez Hashmi, Syed Ghyasuddin Ali, Mohammed Maqsood Syed, Ziauddin Qidwai, Khalid Ali Salim, Abu Jazan University College of Engineering and Computer Science Department of Computer Science Jazan Saudi Arabia Applied College Jazan University Department of Business Administration Jazan Saudi Arabia
These underwater Acoustic Sensor networks (UWSNs) present unique challenges due to the harsh and dynamic underwater environment, making efficient communication protocols essential for their operation. This paper intro... 详细信息
来源: 评论
Detection and Evaluation of Cybersecurity Threats in MANET Based on AI  4
Detection and Evaluation of Cybersecurity Threats in MANET B...
收藏 引用
4th international conference on Ubiquitous Computing and Intelligent Information systems, ICUIS 2024
作者: Mohandas, R. Vaigandla, Karthik Kumar Sivapriya, N. Kirubasankar, K. Chennai Institute of Technology Department of Electronics & Communication Engineering Tamil Nadu Chennai India Balaji Institute of Technology and Science Department of Electronics & Communication Engineering Telangana Warangal India Cauvery College for Women Department of Computer Applications Tamil Nadu Trichy India
This research focuses on the use of AI to enhance the security of Mobile Ad-hoc networks (MANETs), which aredecentralized and mobile wireless networks characterized by their dynamic nature. The work aims to assess the... 详细信息
来源: 评论
Malware Detection Method Based on TPE Optimized Stacking  3
Malware Detection Method Based on TPE Optimized Stacking
收藏 引用
3rd international conference on High Performance Computing and Communication Engineering, HPCCE 2023
作者: Zhao, Dongbo Yuan, Zesong Xie, Nannan Jilin Province Key Laboratory of Network and Information Security School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China
Fast detection and categorization of malware are increasingly important for securing hosts and networks. Although many Machine Learning models have been utilized to detect malware, single-model detection may not remai... 详细信息
来源: 评论