咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,231 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5348 条 记 录,以下是121-130 订阅
排序:
Optimized Local Secret Sharing Techniques for distributed Blockchain networks  9
Optimized Local Secret Sharing Techniques for Distributed Bl...
收藏 引用
9th international conference on Science, Technology, Engineering and Mathematics, ICONSTEM 2024
作者: Roobini, M.S. Sindhuja, Chappidi Shravan, Chanda Nair, Manju C. Gowri, M. Sathyabama Institute of Science And Technology Department of Computer Science And Engineering Chennai600119 India
In blockchain systems, transaction details are stored across a distributed ledger, and each peer bears the responsibility of upkeeping an identical replica of this ledger. This project explains the challenges faced by... 详细信息
来源: 评论
Prediction of Human Age and Gender Using Deep Learning For Smart security systems  2
Prediction of Human Age and Gender Using Deep Learning For S...
收藏 引用
2nd IEEE international conference on distributed Computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Kinthadi, Durga Bhavani Burugu, Abhishekar Rumandla, Anish Sujana, S. Vardhaman College of Engineering Dept. of Ece Telangana Hyderabad India
The demand for accurate identification and verification of a person has increased as the number of smart security systems has grown. In recent years, data from a human face has been used in numerous real-world applica... 详细信息
来源: 评论
Comparative E-Voting security Evaluation: Multi-Modal Authentication Approaches  6
Comparative E-Voting Security Evaluation: Multi-Modal Authen...
收藏 引用
6th international conference on Blockchain Computing and Applications, BCCA 2024
作者: Ahmadieh, Elsi El Madhoun, Nour Lebanese University Faculty of Technology Department Communications and Computer Networks Engineering Beirut Lebanon LISITE Laboratory ISEP 10 Rue de Vanves Issy-les-Moulineaux92130 France Sorbonne Université CNRS LIP6 4 place Jussieu Paris75005 France
The decentralized, distributed ledger, a fundamental aspect of blockchain technology, plays a pivotal role in various sectors, including electronic voting (e-voting) systems. When considering e-voting, the significanc... 详细信息
来源: 评论
The Internet of Trust: Securing and Transparent Supply Chains with Blockchain and IoT  18
The Internet of Trust: Securing and Transparent Supply Chain...
收藏 引用
18th IEEE international conference on Advanced networks and Telecommunications systems, ANTS 2024
作者: Singal, Gaurav Kushwaha, Riti Sharma, Ashish Tewari, Tulika Netaji Subhash University of Technology SMIEEE Computer Science and Engineering Delhi India Bennett University School of Computer Science and Technology Greater Noida India Manipal University Computer Science and Engineering Jaipur India Netaji Subhash University of Technology Computer Science and Engineering Delhi India
In an era where digital commerce continues to burgeon, the conventional supply chain confronts challenges of inefficiency, fraud, and a dearth of transparency. Blockchain, renowned for its decentralized and immutable ... 详细信息
来源: 评论
Advancements in distributed Deep Learning: Federated Learning, AutoML Integration, and Beyond
Advancements in Distributed Deep Learning: Federated Learnin...
收藏 引用
2024 IEEE international conference on Innovation and Novelty in Engineering and Technology, INNOVA 2024
作者: Kavitha, T. Manikandan, S.P. Patil, Bhimaraya Patil, Anita Dept. of Computer Science and Engineering New Horizon College of Engineering Bangalore India CMR University Bengaluru India Dept. of Computer Science Engineering New Horizon College of Engg. Bangalore India Dept. of Information Science and Engg. City Engineering College Bengaluru India
This paper present advancements in distributed deep learning, focusing on federated learning, AutoML integration, and beyond. Leveraging the latest developments in machine learning (ML) and artificial intelligence (AI... 详细信息
来源: 评论
security Vulnerability Detection and Defense of Smart Home systems Based on the Internet of Things  6th
Security Vulnerability Detection and Defense of Smart Home S...
收藏 引用
6th international conference on Cyber security Intelligence and Analytics, CSIA 2024
作者: Zhao, Zhenghui Chen, Miao Chongqing Medical and Pharmaceutical College Chongqing401331 China
With the widespread application of IoT (Internet of Things) technology in smart homes, the security protection of systems has received more attention. In response to the problems of incomplete vulnerability detection ... 详细信息
来源: 评论
Concepts for Energy Management in the Evolution of Smart Grids  22nd
Concepts for Energy Management in the Evolution of Smart Gri...
收藏 引用
22nd international conference on Hybrid Intelligent systems, HIS 2022 and the 18th international conference on Information Assurance and security, IAS 2022
作者: Ritu, Ritu Department of Computer Science & Engineering APEX Institute of Technology Chandigarh University Punjab Mohali India
In the aim of a more sustainable and intelligent growth of distributed Electric systems, this paper presents an overview of fundamental power management ideas and technical difficulties for smart grid applications. Se... 详细信息
来源: 评论
Towards Smarter Maritime security: Apriori Algorithm Optimization in Serverless Environments  16
Towards Smarter Maritime Security: Apriori Algorithm Optimiz...
收藏 引用
16th international conference on Ambient systems, networks and Technologies networks, ANT 2025 / 8th international conference on Emerging Data and Industry 4.0, EDI40 2025
作者: Shahin, Mahtab Rahimpour, Saeed Ghasempouri, Tara Bauk, Sanja Fahringer, Thomas Draheim, Dirk Estonian Maritime Academy Tallinn University of Technology Tallinn Estonia Department of Computer Systems Tallinn University of Technology Tallinn Estonia Distributed and Parallel Systems Group University of Innsbruck Tirol Austria Information Systems Group Tallinn University of Technology Tallinn Estonia
This paper presents an optimized implementation of the Apriori algorithm tailored for large-scale data mining in cloud-native, serverless environments, utilizing real-world fuel datasets. Our approach achieves a 28% r... 详细信息
来源: 评论
Next Generation Firewall and Self Authentication for Network security  7
Next Generation Firewall and Self Authentication for Network...
收藏 引用
7th international conference on Image Information Processing, ICIIP 2023
作者: Singh, Bhagwant Cheema, Sikander Singh Punjabi University Department of Computer Science And Engineering Punjab Patiala India
In the era of the technologies, given the importance of the prevalence of the Internet, network safety is now essential to maintaining the accessibility and confidentiality of networks and data. Regular firewalls cann... 详细信息
来源: 评论
Decentralized File Storage System  15
Decentralized File Storage System
收藏 引用
15th international conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Tiwari, Kshitij Dhanda, Namrata Verma, Rajat Amity University Computer Science & Engineering Department Uttar Pradesh Lucknow India Pranveer Singh Institute of Technology Computer Science & Engineering Department Uttar Pradesh Kanpur India
The need for safe, scalable, and effective cloud storage solutions has increased in a time when digital information is essential to society. Let us introduce you to Google Drive, a reliable cloud storage solution that... 详细信息
来源: 评论