咨询与建议

限定检索结果

文献类型

  • 5,039 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,406 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,904 篇 工学
    • 2,594 篇 计算机科学与技术...
    • 1,728 篇 软件工程
    • 989 篇 信息与通信工程
    • 376 篇 电气工程
    • 327 篇 控制科学与工程
    • 200 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 129 篇 动力工程及工程热...
    • 127 篇 电子科学与技术(可...
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 73 篇 仪器科学与技术
    • 70 篇 建筑学
    • 59 篇 交通运输工程
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
  • 620 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 101 篇 统计学(可授理学、...
    • 85 篇 物理学
  • 506 篇 管理学
    • 355 篇 管理科学与工程(可...
    • 201 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 243 篇 法学
    • 166 篇 法学
    • 83 篇 社会学
  • 79 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 52 篇 公共卫生与预防医...
  • 63 篇 经济学
    • 63 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 510 篇 security
  • 357 篇 wireless sensor ...
  • 308 篇 computer network...
  • 254 篇 protocols
  • 249 篇 computer archite...
  • 222 篇 intrusion detect...
  • 214 篇 authentication
  • 210 篇 computer communi...
  • 201 篇 ip networks
  • 196 篇 computer crime
  • 172 篇 servers
  • 166 篇 computer securit...
  • 163 篇 network security
  • 158 篇 information secu...
  • 157 篇 internet of thin...
  • 149 篇 distributed comp...
  • 147 篇 computer science
  • 146 篇 computational mo...
  • 145 篇 cryptography
  • 142 篇 data security

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 graphic era deem...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 natrayan l.
  • 6 篇 yunhao liu

语言

  • 4,953 篇 英文
  • 422 篇 其他
  • 45 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5406 条 记 录,以下是1121-1130 订阅
排序:
Safety in distributed Sensor networks: A Literature Review  5
Safety in Distributed Sensor Networks: A Literature Review
收藏 引用
5th international conference on Internet of Things, Big Data and security (IoTBDS)
作者: Altenburg, Tobias Bosse, Sascha Turowski, Klaus Otto von Guericke Univ Fac Comp Sci Very Large Business Applicat Lab Magdeburg Germany
The connectivity megatrend dominates the current social change. The number of networked devices and the resulting amount of data is constantly increasing worldwide. For this reason, the dependability of computer syste... 详细信息
来源: 评论
Intelligent transportation systems trusted user’s security and privacy
Intelligent transportation systems trusted user’s security ...
收藏 引用
Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI), IEEE conference on
作者: Priyanka Kaushik Saurabh Pratap Singh Rathore Lakshay Sachdeva Minakshi Poonia Dipti Singh Lovish Bir Dept. of CSE (AIML) CSE-APEX Chandigarh University Chandigarh India Management & Research ICAPSR New Delhi India Dept. of Eng. Math’s & Computing Madhav Institute of Technology & Science Gwalior India Dept. of Management Madhav University Abu Road India
Standard encryption cannot be utilized in practical communications due to time and storage limits. Dedicated lane keeping (DRL) is a technique that helps self-driving cars navigate congested roads by keeping them in a...
来源: 评论
Detection of DDoS Attacks in Software Defined Network using Decision Tree  10
Detection of DDoS Attacks in Software Defined Network using ...
收藏 引用
10th IEEE international conference on Communication systems and Network Technologies, CSNT 2021
作者: Kousar, Heena Mulla, Mohammed Moin Shettar, Pooja Narayan, D.G. School of Computer Science and Engineering KLE Technological University Karnataka Hubli India
Software Defined networks (SDN) is a programmable network which can be easily managed with a global knowledge of network topology. However, SDN controller is vulnerable to distributed denial of service (DDoS) due to i... 详细信息
来源: 评论
Serverless-DFS: Serverless Federated Learning with Dynamic Forest Strategy  23
Serverless-DFS: Serverless Federated Learning with Dynamic F...
收藏 引用
Proceedings of the 2023 12th international conference on networks, Communication and Computing
作者: Bobin Deng Xinyue Zhang Dan Chia-Tien Lo Department of Computer Science Kennesaw State University USA
Training large-scale machine learning models typically requires support from High-performance computers (HPCs) or cloud servers. One strategy to reduce the computational burden and alleviate the communication bottlene... 详细信息
来源: 评论
A review of cyber securities in smart grid technology  2
A review of cyber securities in smart grid technology
收藏 引用
2nd international conference on Computation, Automation and Knowledge Management, ICCAKM 2021
作者: Kawoosa, Asif Iqbal Prashar, Deepak Lovely Professional University Department of Computer Applications Punjab India
A Smart Grid (SG) is an electrical infrastructure much like legacy power grid with scalable and pervasive two-way communications, timely control capabilities, large scale integration of distributed resources and effic... 详细信息
来源: 评论
An approach to Improving Columnar Permutation Cipher for Wills in distributed systems of Law Firms  5
An approach to Improving Columnar Permutation Cipher for Wil...
收藏 引用
5th international conference on Future networks and distributed systems: The Premier conference on Smart Next Generation Networking Technologies, ICFNDS 2021
作者: Nwokedi, Emeka Adeniyi Ojerinde, Oluwaseun Ojeniyi, Joseph Adepoju, Solomon Federal University of Technology Minna Department of Computer Science Niger Nigeria
With the evolution of cryptography in the twentieth century, classical ciphers (transposition ciphers) are gradually being pushed out because it now possesses low security ratings, however we can still salvage them, a... 详细信息
来源: 评论
Using Synthetic Data to Reduce Model Convergence Time in Federated Learning
Using Synthetic Data to Reduce Model Convergence Time in Fed...
收藏 引用
international conference on Advances in Social Network Analysis and Mining, ASONAM
作者: Fida K. Dankar Nisha Madathil Computer Science program NYUAD Abu Dhabi UAE Information Systems and Security UAEU Al Ain UAE
Federated Learning (FL) is a hot new topic in collaborative training of machine learning problems. It is a privacy-preserving distributed machine learning approach, allowing multiple clients to jointly train a global ... 详细信息
来源: 评论
DDoS Attack Detection Approaches in on Software Defined Network
DDoS Attack Detection Approaches in on Software Defined Netw...
收藏 引用
international conference on Mathematics, Actuarial Science, computer Science and Statistics (MACS)
作者: Saira Muzafar NZ Jhanjhi Navid Ali Khan Farzeen Ashfaq School of Computer Science SCE Taylor's University Subang Jaya Malaysia
Software Defined Networking (SDN) is a new network paradigm to address the limitations of vertically integrated conventional networks in context of scalability, Quality of Service, flexibility, and security. SDN isola... 详细信息
来源: 评论
Secure Consensus Generation with distributed DoH  50
Secure Consensus Generation with Distributed DoH
收藏 引用
50th IEEE/IFIP Annual international conference on Dependable systems and networks (DSN)
作者: Jeitner, Philipp Shulman, Haya Waidner, Michael Tech Univ Darmstadt Darmstadt Germany Fraunhofer Inst Secure Informat Technol SIT Darmstadt Germany
Many applications and protocols depend on the ability to generate a pool of servers to conduct majority-based consensus mechanisms and often this is done by doing plain DNS queries. A recent off-path attack [1] agains... 详细信息
来源: 评论
Department of Computing and Mathematics, Manchester Metropolitan University Manchester, UK  5
Department of Computing and Mathematics, Manchester Metropol...
收藏 引用
5th international conference on Future networks and distributed systems: The Premier conference on Smart Next Generation Networking Technologies, ICFNDS 2021
作者: Alrehaili, Meaad Alshamrani, Adel Eshmawi, Ala Department of Computer Science and Artificial Intelligence University of Jeddah Jeddah Saudi Arabia Department of Cybersecurity University of Jeddah Jeddah Saudi Arabia
Advanced Persistent Threat (APT) attack is one of the most common and costly destructive attacks on the target system. This attack has become a challenge for companies, governments, and organizations' information ... 详细信息
来源: 评论