咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是141-150 订阅
排序:
A Multi-attention Based CNN-BiLSTM Intrusion Detection Model for In-vehicle networks  21
A Multi-attention Based CNN-BiLSTM Intrusion Detection Model...
收藏 引用
21st IEEE international Symposium on Parallel and distributed Processing with Applications, 13th IEEE international conference on Big Data and Cloud Computing, 16th IEEE international conference on Social Computing and Networking and 13th international conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Gao, Kai Huang, Hao Liu, Linhong Du, Ronghua Zhang, Jinlai Changsha University of Science & Technology College of Automotive and Mechanical Engineering Changsha410114 China
The development of vehicular networking technology continuously enhances the internet connectivity of modern vehicles. However, for in-vehicle networks, constant communication with the outside world dramatically incre... 详细信息
来源: 评论
CNN-LSTM Model for Mitigation of DDoS Attacks in Software-Defined networks
CNN-LSTM Model for Mitigation of DDoS Attacks in Software-De...
收藏 引用
2024 international conference on Science, Engineering and Business for Driving Sustainable Development Goals, SEB4SDG 2024
作者: Jimoh, Ebunayo Rachael Oladele, Tinuke Omolewa Oladele, Oluwabunmi Titilope Akinlolu, Azeez Olawale Akanbi, Mulikat Bola Olabanke, Olasehinde-Williams University of Ilorin Faculty of Communication and Information Sciences Department of Computer Science Ilorin Nigeria University of Ilorin Faculty of Communication and Information Sciences Department of Information Technology Ilorin Nigeria Fountain University Department of Mathematical and Computer Sciences Osogbo Nigeria Kwara State Polytechnic Computer Science Department Kwara State Ilorin Nigeria University of Ilorin Centre for Open and Distance Learning Department of Computer Science Ilorin Nigeria
The Internet, as the world's largest computer network, has evolved beyond a mere repository of information to become an indispensable tool driving modern society. Its dynamic nature enables communication, interact... 详细信息
来源: 评论
Secure Edge IoT Intrusion Detection Framework for Industrial IoT via Blockchain Integration  4
Secure Edge IoT Intrusion Detection Framework for Industrial...
收藏 引用
4th international conference on Blockchain Technology and Information security, ICBCTIS 2024
作者: Goel, Punit Khatri, Dignesh Kumar Gangu, Krishna Ayyagiri, Aravind Mokkapati, Chandrasekhara Hussien, Rami Riad Maharaja Agrasen Himalayan Garhwal University Department of Management Uttarakhand India Gujarat University Department of Computer Science & Engineering Gujarat India Chaitanya Bharathi Institute of Technology Osmania University Department of Mechanical Engineering Hyderabad India Wichita State University Department of Computer Science & Engineering DublinCA United States Jawaharlal Nehru Technological University Department of Cs & It Hyderabad India The Islamic University Najaf Iraq
In essence, blockchain is a distributed, secure ledger that contains a hierarchical network of blocks that maintains a record of all transactions. Bringing cloud capabilities closer to computation tasks is the goal of... 详细信息
来源: 评论
CNN-Based Detection of DDoS Attacks in Multi-Cloud Environments
CNN-Based Detection of DDoS Attacks in Multi-Cloud Environme...
收藏 引用
2024 international conference on Communication, computer Sciences and Engineering, IC3SE 2024
作者: Verma, Rashmi Jailia, Manisha Kumar, Munish Kaliraman, Bhawna Banasthali Vidyapith Department Of Computer Science And Engineering Rajasthan Tonk India Koneru Lakshmaiah Education Foundation Department Of Computer Science And Engineering Vaddeswaram India Dpg Institute Of Technology And Management Department Of Computer Science And Engineering Gurugram India
With the increasing reliance on cloud computing services, ensuring the security of cloud-based infrastructures has become paramount. This paper proposes a novel approach utilizing Convolutional Neural networks (CNNs) ... 详细信息
来源: 评论
An Intense Systematic Review of Mobile Agent Based Harmful Threats and Attack Detection systems in IOT networks  3
An Intense Systematic Review of Mobile Agent Based Harmful T...
收藏 引用
3rd international conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2023
作者: Vigenesh, M. Ravivarman, G. Singh, Prabhdeep Vaseem Akram, Shaik Sharma, Deepti Tiwari, Mohit Karpagam Academy of Higher Education Department of CSE Coimbatore India Karpagam Academy of Higher Education Department of EEE Tamil Nadu Coimbatore India Graphic Era Deemed to Be University Department of Computer Science and Engineering Uttarakhand Dehradun India Uttaranchal University Uttaranchal Institute of Technology India Uttaranchal University Department of Management Dehradun India Bharati Vidyapeeth's College of Engineering Department of Computer Science and Engineering Delhi India
A breach is detected by an intrusion detection system (IDS) by analysing events that are deemed risky from a security standpoint in systems and networks. Due to a surge in occurrences involving network security, organ... 详细信息
来源: 评论
A High-Payload Image Steganography Based on Shamir’s Secret Sharing Scheme  1
收藏 引用
7th international conference on Microelectronics and Telecommunication Engineering, ICMETE 2023
作者: Tyagi, Sanjive Alsaad, Maysara Mazin Garg, Sharvan Kumar Department of CSE Swami Vivekanand Subharti University Uttar Pradesh Meerut India Department of Computer Science Gujarat University Ahmedabad India Department of CSE Swami Vivekanand Subharti University Uttar Pradesh Meerut India
This paper introduces an image steganography system that hides a high capacity of confidential data by utilizing a distributed computing scheme that offers the embedding of smaller, equally segmented confidential imag... 详细信息
来源: 评论
Comparison of Machine Learning Models for Classification of DDoS Attacks  5
Comparison of Machine Learning Models for Classification of ...
收藏 引用
5th international conference on Cybernetics and Intelligent systems, ICORIS 2023
作者: Prima, Felix Dylan, Leonardo Gunawan, Alexander Agung Santoso Bina Nusantara University School of Computer Science Mathematics Department Jakarta11480 Indonesia Bina Nusantara University School of Computer Science Computer Science Department Jakarta11480 Indonesia
distributed Denial of Service (DDoS) is one of the major threats for security networks and systems. The DDoS attack is flooding a network with huge packets to weaken the performance of the network. The ability to accu... 详细信息
来源: 评论
Impacts of High Denisty Cloud Computing on Data Protection and security Management for 6G Networking  2
Impacts of High Denisty Cloud Computing on Data Protection a...
收藏 引用
2nd international conference on Disruptive Technologies, ICDT 2024
作者: Mallikarjunaradhya, Vinay Yennapusa, Haritha Palle, Ranadeep Reddy Suganyadevi, K. Gupta, Nidhi Legal Tech Platform Thomson Reuters Toronto Canada University of Central Missouri Department of Computer Science AustinTX United States University of Houston Department of Computer Science AustinTX United States Sri Eshwar College of Engineering Department of Ece Tamil Nadu Coimbatore India G.L. Bajaj Institute of Technology and Management Department of Computer Science and Engineering Greater Noida India
Data protection and security management in the 6G era is a key challenge due to the emergence of high density cloud computing. The availability of high density cloud computing technologies creates a platform for massi... 详细信息
来源: 评论
Comparing the Supersonic Cloud Computing Model to Enhance the Networking and security in Traditional Data Centers  2
Comparing the Supersonic Cloud Computing Model to Enhance th...
收藏 引用
2nd international conference on Disruptive Technologies, ICDT 2024
作者: Palle, Ranadeep Reddy Mallikarjunaradhya, Vinay Yennapusa, Haritha Suganyadevi, K. Gupta, Nidhi University of Houston Department of Computer Science AustinTX United States Thomson Reuters Legal Tech Platform Toronto Canada University of Central Missouri Department of Computer Science AustinTX United States Sri Eshwar College of Engineering Department of Ece Tamil Nadu Coimbatore India G.L. Bajaj Institute of Technology and Management Department of Computer Science and Engineering Greater Noida India
The Comparing the supersonic cloud computing model to enhance the networking and security in Traditional Data Centers study aimed to analyse the differences between traditional data centers and cloud computing models.... 详细信息
来源: 评论
IoV Cyber Defense: Advancing DDoS Attack Detection with Gini Index in Tree Models  4
IoV Cyber Defense: Advancing DDoS Attack Detection with Gini...
收藏 引用
4th international conference on Emerging Trends in networks and computer Communications, ETNCC 2024
作者: Dilshad, Muhammad Almas, Bushra Tariq, Noshina Jazri, Husin Bin Alwakid, Ghadah Naif Khan, Jan Sher Kumar, Pranav Kumar, Rahul Institute of Information Technology QuaidiAzam University Islamabad Pakistan Air University Department of Avionic Engineering Islamabad Pakistan School of Computer Science Taylor's University Subang Jaya Malaysia Jouf University Department of Computer Sciences Sakaka Saudi Arabia Lovely Professional University Division of Research and Development Phagwara144411 India KKR and KSR institute of technology and sciences Andhra Pradesh Guntur India
In today's ever-changing world of cybersecurity, where smart devices and the Internet of Vehicles (IoV) are everywhere, it is crucial to have a strong defense against attacks. This paper introduces an intelligent ... 详细信息
来源: 评论