咨询与建议

限定检索结果

文献类型

  • 5,039 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,406 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,904 篇 工学
    • 2,594 篇 计算机科学与技术...
    • 1,728 篇 软件工程
    • 989 篇 信息与通信工程
    • 376 篇 电气工程
    • 327 篇 控制科学与工程
    • 200 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 129 篇 动力工程及工程热...
    • 127 篇 电子科学与技术(可...
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 73 篇 仪器科学与技术
    • 70 篇 建筑学
    • 59 篇 交通运输工程
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
  • 620 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 101 篇 统计学(可授理学、...
    • 85 篇 物理学
  • 506 篇 管理学
    • 355 篇 管理科学与工程(可...
    • 201 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 243 篇 法学
    • 166 篇 法学
    • 83 篇 社会学
  • 79 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 52 篇 公共卫生与预防医...
  • 63 篇 经济学
    • 63 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 510 篇 security
  • 357 篇 wireless sensor ...
  • 308 篇 computer network...
  • 254 篇 protocols
  • 249 篇 computer archite...
  • 222 篇 intrusion detect...
  • 214 篇 authentication
  • 210 篇 computer communi...
  • 201 篇 ip networks
  • 196 篇 computer crime
  • 172 篇 servers
  • 166 篇 computer securit...
  • 163 篇 network security
  • 158 篇 information secu...
  • 157 篇 internet of thin...
  • 149 篇 distributed comp...
  • 147 篇 computer science
  • 146 篇 computational mo...
  • 145 篇 cryptography
  • 142 篇 data security

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 graphic era deem...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 natrayan l.
  • 6 篇 yunhao liu

语言

  • 4,953 篇 英文
  • 422 篇 其他
  • 45 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5406 条 记 录,以下是1101-1110 订阅
排序:
security and Privacy Enabled Framework for Online Social networks using Blockchain
Security and Privacy Enabled Framework for Online Social Net...
收藏 引用
Electronics and Sustainable Communication systems (ICESC), 2020 international conference on
作者: Arvind Kumar Tushar Vyas Saleem Ahmed Nitin Girdharwal E. Vijayakumar Arivanantham Thangavelu MRIIRS Faridabad Haryana India Department of CSE JECRC University Jaipur Rajasthan India Oryx Universal College Doha Qatar Prestige Institute of Management & Research (PIMR) Indore Madhya Pradesh India KIT- Kalaignar Karunanidhi Institute of Technology Coimbatore Tamilnadu India Computer Engineering Dr. D. Y. Patil College of Engineering and Innovation Varale Talegaon Pune Maharashtra India
Users may easily deal with data overload concerns while navigating Online Social networks (OSN) through suggestion engines. In addition, it increases a number of privacy-related issues, particularly for users who woul...
来源: 评论
Detection and Replay of distributed Denial of Service Attacks In Smart Cities Using a Hybrid Deep Learning Approach
Detection and Replay of Distributed Denial of Service Attack...
收藏 引用
Business Analytics for Technology and security (ICBATS), international conference on
作者: Muhammad Waseem Iqbal Ghassan F. Issa Muhammad Yousif Muhammad Atif Department of Software Engineering Superior University Lahore Pakistan School of Information Technology Skyline University College Sharjah UAE Department of Computer Science NCBAE Lahore. Pakistan Applied Science Research Center Applied Science Private University Amman Jordan Department of Computer Science NCBAE Lahore Pakistan
Infrastructure for smart cities is presently being built, mostly because of the (IoT) platform, which connects a wide variety of things by using the website's underlying infrastructure. As a result, it is possible... 详细信息
来源: 评论
distributed Novelty Detection at the Edge for IoT Network security  21st
Distributed Novelty Detection at the Edge for IoT Network Se...
收藏 引用
21st international conference on Computational Science and Its Applications (ICCSA)
作者: Puhl, Luis Cassales, Guilherme Weigert Guardia, Helio Crestana Senger, Hermes Univ Fed Sao Carlos Sao Carlos Brazil
The ongoing implementation of the Internet of Things (IoT) is sharply increasing the number and variety of small devices on edge networks. Likewise, the attack opportunities for hostile agents also increases, requirin... 详细信息
来源: 评论
IoT and Blockchain combined: For decentralized security  18
IoT and Blockchain combined: For decentralized security
收藏 引用
18th international conference on Mobile systems and Pervasive Computing, MobiSPC 2021, The 16th international conference on Future networks and Communications, FNC 2021 and the 11th international conference on Sustainable Energy Information Technology, SEIT 2021
作者: Abbassi, Younes Benlahmer, Habib Computer Sciences Department Hassan 2 University Casablanca Morocco
Blockchain technology, a version of distributed ledger technology, has been grabbing a huge amount of attention in fields beyond its roots in crypto-currencies: blockchain and finance, blockchain and logistics, blockc... 详细信息
来源: 评论
Whale optimization algorithm with exploratory move for wireless sensor networks localization  19th
Whale optimization algorithm with exploratory move for wirel...
收藏 引用
19th international conference on Hybrid Intelligent systems, HIS 2019, and the 14th international conference on Information Assurance and security, IAS 2019
作者: Bacanin, Nebojsa Tuba, Eva Zivkovic, Miodrag Strumberger, Ivana Tuba, Milan Singidunum University Belgrade11000 Serbia
In the modern era, with the development of new technologies, such as cloud computing and the internet of things, there is a greater focus on wireless distributed sensors, distributed data processing and remote operati... 详细信息
来源: 评论
Blockchain 3.0 applications survey
收藏 引用
JOURNAL OF PARALLEL AND distributed COMPUTING 2020年 第0期138卷 99-114页
作者: Maesa, Damiano Di Francesco Mori, Paolo Univ Cambridge Dept Comp Sci & Technol Cambridge England CNR Ist Informat & Telemat Pisa Italy
In this paper we survey a number of interesting applications of blockchain technology not related to cryptocurrencies. As a matter of fact, after an initial period of application to cryptocurrencies and to the financi... 详细信息
来源: 评论
DadGAN: DDOS Anomaly Detection using Generative Adversarial Network  5
DadGAN: DDOS Anomaly Detection using Generative Adversarial ...
收藏 引用
5th IEEE international conference on Computational systems and Information Technology for Sustainable Solutions, CSITSS 2021
作者: Girish, L. Rao, Sridhar Kn Renukananda, T. Vidyashree, K. Hemashree, R. Channabasaveshwara Institute of Technology Open Source Club Department of Computer Science and Engineering Karnataka Gubbi India
Software Defined networks (SDN) were designed to simplify network management by allowing users to monitor and administer the entire network from a single location. In many data centre network environments today, SDN i... 详细信息
来源: 评论
Research on Routing Algorithm of mobile wireless packet switching computer network based on deep learning  4
Research on Routing Algorithm of mobile wireless packet swit...
收藏 引用
4th IEEE international conference on Automation, Electronics and Electrical Engineering, AUTEEE 2021
作者: Guan, Zhicong Guangdong Business and Technology University Zhaoqing526020 China
With the rapid development of wireless sensor networks in various fields, its security has become the focus of attention. The application of computer network technology is becoming more and more common, not only in pr... 详细信息
来源: 评论
Internet of Things-Based Middleware Against Cyber-Attacks on Smart Homes using Software-Defined Networking and Deep Learning  2
Internet of Things-Based Middleware Against Cyber-Attacks on...
收藏 引用
2nd international conference on Computational Methods in Science and Technology, ICCMST 2021
作者: Tawfik, Mohammed Al-Zidi, Nasser M. Alsellami, Belal Al-Hejri, Aymen M. Nimbhore, Sunil Dr. Babasaheb Ambedkar Marathwada University Department of Computer Science & It Aurangabad India Albaydha University Faculty of Administrative and Computer Sciences Albaydha Yemen
Internet of Things (IoT) devices are expected to number about 3.5 billion by 2023.;a tremendous amount of Internet of Things (IoT) data that is generating (IoT) devices is estimated to exceed 79.4 zettabytes by 2025. ... 详细信息
来源: 评论
A Robust Federated Learning Approach for Combating Attacks Against IoT systems Under Non-IID Challenges
A Robust Federated Learning Approach for Combating Attacks A...
收藏 引用
international conference on Smart Communications and Networking (SmartNets)
作者: Eyad Gad Zubair Md Fadlullah Mostafa M. Fouda Department of Computer Science University of Western Ontario London ON Canada Department of Electrical and Computer Engineering Idaho State University Pocatello ID USA Center for Advanced Energy Studies (CAES) Idaho Falls ID USA
In the context of the growing proliferation of user devices and the concurrent surge in data volumes, the complex-ities arising from the substantial increase in data have posed formidable challenges to conventional ma... 详细信息
来源: 评论