咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,231 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5348 条 记 录,以下是141-150 订阅
排序:
A Proposed distributed Off-Chain Medical Health Record Management Using Blockchain Technology and IPFS for HEIs  5
A Proposed Distributed Off-Chain Medical Health Record Manag...
收藏 引用
5th international conference on Intelligent Communication Technologies and Virtual Mobile networks, ICICV 2024
作者: Cruz, Michael Marvin P. Balogo, Ken M. Cofino, Chester L. Dandan, Dexter G. College of Computer Studies Central Philippines State University San Carlos Campus Negros Occidental San Carlos City Philippines College of Computer Studies Central Philippines State University Negros Occidental Kabankalan City Philippines
The management and security of medical health records are of utmost importance in a higher education institution. Traditional centralized methods of managing and preserving medical records are prone to single points o... 详细信息
来源: 评论
Probing with a Generic MAC Address: An Alternative to MAC Address Randomisation  32
Probing with a Generic MAC Address: An Alternative to MAC Ad...
收藏 引用
32nd international conference on Software, Telecommunications and computer networks, SoftCOM 2024
作者: McDougall, Johanna Ansohn Brighente, Alessandro Kunstmann, Anne Zapatka, Niklas Schambach, Hanna Federrath, Hannes University of Hamburg Security in Distributed Systems Hamburg Germany University of Padova Department of Mathematics Padua Italy
Active scanning via probe requests is a means for mobile devices to detect known networks. To protect the device from being tracked via an unchanging identifier contained in the probe request, MAC address randomisatio... 详细信息
来源: 评论
XGBoost and Deep Learning Based-Federated Learning for DDoS Attack Detection in 5G Core Network VNFs.  6
XGBoost and Deep Learning Based-Federated Learning for DDoS ...
收藏 引用
6th international conference on computer Communication and the Internet (ICCCI)
作者: Maiga, Abdoul-Aziz Ataro, Edwin Githinji, Stanley Pan African Univ Inst Basic Sci Technol & Innovat Nairobi Kenya Tech Univ Kenya Dept Elect & Elect Engn Nairobi Kenya US Int Univ Africa USIU A Dept Comp Nairobi Kenya
distributed Denial-of-Service (DDoS) attacks can employ cloud network zombies to compromise the availability of 5G network services and hinder the ability of telecommunication service providers (TSPs) to deliver promi... 详细信息
来源: 评论
CNN-LSTM Model for Mitigation of DDoS Attacks in Software-Defined networks
CNN-LSTM Model for Mitigation of DDoS Attacks in Software-De...
收藏 引用
2024 international conference on Science, Engineering and Business for Driving Sustainable Development Goals, SEB4SDG 2024
作者: Jimoh, Ebunayo Rachael Oladele, Tinuke Omolewa Oladele, Oluwabunmi Titilope Akinlolu, Azeez Olawale Akanbi, Mulikat Bola Olabanke, Olasehinde-Williams University of Ilorin Faculty of Communication and Information Sciences Department of Computer Science Ilorin Nigeria University of Ilorin Faculty of Communication and Information Sciences Department of Information Technology Ilorin Nigeria Fountain University Department of Mathematical and Computer Sciences Osogbo Nigeria Kwara State Polytechnic Computer Science Department Kwara State Ilorin Nigeria University of Ilorin Centre for Open and Distance Learning Department of Computer Science Ilorin Nigeria
The Internet, as the world's largest computer network, has evolved beyond a mere repository of information to become an indispensable tool driving modern society. Its dynamic nature enables communication, interact... 详细信息
来源: 评论
A Multi-attention Based CNN-BiLSTM Intrusion Detection Model for In-vehicle networks  21
A Multi-attention Based CNN-BiLSTM Intrusion Detection Model...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud Computing, 16th IEEE international conference on Social Computing and Networking and 13th international conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Gao, Kai Huang, Hao Liu, Linhong Du, Ronghua Zhang, Jinlai Changsha University of Science & Technology College of Automotive and Mechanical Engineering Changsha410114 China
The development of vehicular networking technology continuously enhances the internet connectivity of modern vehicles. However, for in-vehicle networks, constant communication with the outside world dramatically incre... 详细信息
来源: 评论
Secure Edge IoT Intrusion Detection Framework for Industrial IoT via Blockchain Integration  4
Secure Edge IoT Intrusion Detection Framework for Industrial...
收藏 引用
4th international conference on Blockchain Technology and Information security, ICBCTIS 2024
作者: Goel, Punit Khatri, Dignesh Kumar Gangu, Krishna Ayyagiri, Aravind Mokkapati, Chandrasekhara Hussien, Rami Riad Maharaja Agrasen Himalayan Garhwal University Department of Management Uttarakhand India Gujarat University Department of Computer Science & Engineering Gujarat India Chaitanya Bharathi Institute of Technology Osmania University Department of Mechanical Engineering Hyderabad India Wichita State University Department of Computer Science & Engineering DublinCA United States Jawaharlal Nehru Technological University Department of Cs & It Hyderabad India The Islamic University Najaf Iraq
In essence, blockchain is a distributed, secure ledger that contains a hierarchical network of blocks that maintains a record of all transactions. Bringing cloud capabilities closer to computation tasks is the goal of... 详细信息
来源: 评论
CNN-Based Detection of DDoS Attacks in Multi-Cloud Environments
CNN-Based Detection of DDoS Attacks in Multi-Cloud Environme...
收藏 引用
2024 international conference on Communication, computer Sciences and Engineering, IC3SE 2024
作者: Verma, Rashmi Jailia, Manisha Kumar, Munish Kaliraman, Bhawna Banasthali Vidyapith Department Of Computer Science And Engineering Rajasthan Tonk India Koneru Lakshmaiah Education Foundation Department Of Computer Science And Engineering Vaddeswaram India Dpg Institute Of Technology And Management Department Of Computer Science And Engineering Gurugram India
With the increasing reliance on cloud computing services, ensuring the security of cloud-based infrastructures has become paramount. This paper proposes a novel approach utilizing Convolutional Neural networks (CNNs) ... 详细信息
来源: 评论
An Intense Systematic Review of Mobile Agent Based Harmful Threats and Attack Detection systems in IOT networks  3
An Intense Systematic Review of Mobile Agent Based Harmful T...
收藏 引用
3rd international conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2023
作者: Vigenesh, M. Ravivarman, G. Singh, Prabhdeep Vaseem Akram, Shaik Sharma, Deepti Tiwari, Mohit Karpagam Academy of Higher Education Department of CSE Coimbatore India Karpagam Academy of Higher Education Department of EEE Tamil Nadu Coimbatore India Graphic Era Deemed to Be University Department of Computer Science and Engineering Uttarakhand Dehradun India Uttaranchal University Uttaranchal Institute of Technology India Uttaranchal University Department of Management Dehradun India Bharati Vidyapeeth's College of Engineering Department of Computer Science and Engineering Delhi India
A breach is detected by an intrusion detection system (IDS) by analysing events that are deemed risky from a security standpoint in systems and networks. Due to a surge in occurrences involving network security, organ... 详细信息
来源: 评论
A High-Payload Image Steganography Based on Shamir’s Secret Sharing Scheme  1
收藏 引用
7th international conference on Microelectronics and Telecommunication Engineering, ICMETE 2023
作者: Tyagi, Sanjive Alsaad, Maysara Mazin Garg, Sharvan Kumar Department of CSE Swami Vivekanand Subharti University Uttar Pradesh Meerut India Department of Computer Science Gujarat University Ahmedabad India Department of CSE Swami Vivekanand Subharti University Uttar Pradesh Meerut India
This paper introduces an image steganography system that hides a high capacity of confidential data by utilizing a distributed computing scheme that offers the embedding of smaller, equally segmented confidential imag... 详细信息
来源: 评论
Comparison of Machine Learning Models for Classification of DDoS Attacks  5
Comparison of Machine Learning Models for Classification of ...
收藏 引用
5th international conference on Cybernetics and Intelligent systems, ICORIS 2023
作者: Prima, Felix Dylan, Leonardo Gunawan, Alexander Agung Santoso Bina Nusantara University School of Computer Science Mathematics Department Jakarta11480 Indonesia Bina Nusantara University School of Computer Science Computer Science Department Jakarta11480 Indonesia
distributed Denial of Service (DDoS) is one of the major threats for security networks and systems. The DDoS attack is flooding a network with huge packets to weaken the performance of the network. The ability to accu... 详细信息
来源: 评论