咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,231 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5348 条 记 录,以下是151-160 订阅
排序:
Impacts of High Denisty Cloud Computing on Data Protection and security Management for 6G Networking  2
Impacts of High Denisty Cloud Computing on Data Protection a...
收藏 引用
2nd international conference on Disruptive Technologies, ICDT 2024
作者: Mallikarjunaradhya, Vinay Yennapusa, Haritha Palle, Ranadeep Reddy Suganyadevi, K. Gupta, Nidhi Legal Tech Platform Thomson Reuters Toronto Canada University of Central Missouri Department of Computer Science AustinTX United States University of Houston Department of Computer Science AustinTX United States Sri Eshwar College of Engineering Department of Ece Tamil Nadu Coimbatore India G.L. Bajaj Institute of Technology and Management Department of Computer Science and Engineering Greater Noida India
Data protection and security management in the 6G era is a key challenge due to the emergence of high density cloud computing. The availability of high density cloud computing technologies creates a platform for massi... 详细信息
来源: 评论
IoV Cyber Defense: Advancing DDoS Attack Detection with Gini Index in Tree Models  4
IoV Cyber Defense: Advancing DDoS Attack Detection with Gini...
收藏 引用
4th international conference on Emerging Trends in networks and computer Communications, ETNCC 2024
作者: Dilshad, Muhammad Almas, Bushra Tariq, Noshina Jazri, Husin Bin Alwakid, Ghadah Naif Khan, Jan Sher Kumar, Pranav Kumar, Rahul Institute of Information Technology QuaidiAzam University Islamabad Pakistan Air University Department of Avionic Engineering Islamabad Pakistan School of Computer Science Taylor's University Subang Jaya Malaysia Jouf University Department of Computer Sciences Sakaka Saudi Arabia Lovely Professional University Division of Research and Development Phagwara144411 India KKR and KSR institute of technology and sciences Andhra Pradesh Guntur India
In today's ever-changing world of cybersecurity, where smart devices and the Internet of Vehicles (IoV) are everywhere, it is crucial to have a strong defense against attacks. This paper introduces an intelligent ... 详细信息
来源: 评论
Comparing the Supersonic Cloud Computing Model to Enhance the Networking and security in Traditional Data Centers  2
Comparing the Supersonic Cloud Computing Model to Enhance th...
收藏 引用
2nd international conference on Disruptive Technologies, ICDT 2024
作者: Palle, Ranadeep Reddy Mallikarjunaradhya, Vinay Yennapusa, Haritha Suganyadevi, K. Gupta, Nidhi University of Houston Department of Computer Science AustinTX United States Thomson Reuters Legal Tech Platform Toronto Canada University of Central Missouri Department of Computer Science AustinTX United States Sri Eshwar College of Engineering Department of Ece Tamil Nadu Coimbatore India G.L. Bajaj Institute of Technology and Management Department of Computer Science and Engineering Greater Noida India
The Comparing the supersonic cloud computing model to enhance the networking and security in Traditional Data Centers study aimed to analyse the differences between traditional data centers and cloud computing models.... 详细信息
来源: 评论
Improving Prediction Accuracy in IoT Network security Against DDoS Attacks by Combining RIPPER and KNN Algorithms  8
Improving Prediction Accuracy in IoT Network Security Agains...
收藏 引用
8th international conference on Electrical, Telecommunication and computer Engineering, ELTICOM 2024
作者: Juliansyah, Handrino Sihombing, Poltak Fahmi, Fahmi Universitas Sumatera Utara Faculty of Computer Science and Information Technology North Sumatera Medan Indonesia Universitas Sumatera Utara Faculty of Engineering Electrical Engineering Dept North Sumatera Medan Indonesia
The Internet of Things (IoT) is a network of linked devices comprising interconnected devices that communicate through internet, integrating sensors, software and other technologies. As the number of connected devices... 详细信息
来源: 评论
12th and 13th international conference on Cloud Computing and Services Science, CLOSER 2022 and CLOSER 2023
12th and 13th International Conference on Cloud Computing an...
收藏 引用
12th and 13th international conference on Cloud Computing and Services Science, CLOSER 2022 and CLOSER 2023
The proceedings contain 10 papers. The special focus in this conference is on Cloud Computing and Services Science. The topics include: Evaluating Microservices Communication Relationships for Scheduling Containers on...
来源: 评论
Cryptographic Ledger for Cyber security in Smart Grid  2
Cryptographic Ledger for Cyber Security in Smart Grid
收藏 引用
2nd international conference on Edge Computing and Applications, ICECAA 2023
作者: Elanchezhiyan, E. Kalaiselvi, K. Banumathy, D. Srm Institute of Science and Technology Faculty of Engineering and Technology Department of Networking and Communications Tamilnadu Kattankulathur603203 India Paavai Engineering College Department of Computer Science and Engineering Tamilnadu Namakkal637018 India
In addition to the physical security of energy networks, cyber security is essential to protecting these systems as well. Cyber threats can stem from malicious hackers who have infiltrated the networks to gain unautho... 详细信息
来源: 评论
Blockchain-Based Virtual Skin System for Metaverse: Design and Implementation  15
Blockchain-Based Virtual Skin System for Metaverse: Design a...
收藏 引用
15th international conference on Cyber-Enabled distributed Computing and Knowledge Discovery, CyberC 2023
作者: Meng, Debin Li, Jinbo Wang, Mingyu Wang, Guanghui Henan University School of Software Kaifeng China Henan International Joint Laboratory of Intelligent Network Theory and Key Technology Kaifeng China
The virtual skin system is an enabling component for the applications and services in the Metaverse. Traditional virtual skin systems are usually designed with a unified style, which can still be improved to meet cust... 详细信息
来源: 评论
Octopus: Experiences with a Hybrid Event-Driven Architecture for distributed Scientific Computing
Octopus: Experiences with a Hybrid Event-Driven Architecture...
收藏 引用
2024 Workshops of the international conference for High Performance Computing, Networking, Storage and Analysis, SC Workshops 2024
作者: Pan, Haochen Chard, Ryan Zhou, Sicheng Kamatar, Alok Vescovi, Rafael Hayot-Sasson, Valerie Bauer, Andre Gonthier, Maxime Chard, Kyle Foster, Ian Southern University of Science and Technology Department of Computer Science China Illinois Institute of Technology Department of Computer Science ChicagoIL United States University of Chicago Department of Computer Science ChicagoIL United States Argonne National Laboratory Data Science and Learning Division LemontIL United States
Scientific research increasingly relies on distributed computational resources, storage systems, networks, and instruments, ranging from HPC and cloud systems to edge devices. Event-driven architecture (EDA) benefits ... 详细信息
来源: 评论
Feature Selection Using COA with Modified Feedforward Neural Network for Prediction of Attacks in Cyber-security  2
Feature Selection Using COA with Modified Feedforward Neural...
收藏 引用
2nd international conference on distributed Computing and Optimization Techniques, ICDCOT 2024
作者: Vallabhaneni, Rohith Nagamani, H.S. Harshitha, P. Sumanth, S. University of the Cumberlands United States Govt. Smt Vhd Central Institute of Home Science Department of Computer Science Bengaluru India Nitte Meenakshi Institute of Technology Department of Aiml Bengaluru India Government College for Women Department of Computer Science and Applictaions Kolar India
Research on network intrusion detection, prediction, and mitigation systems has been ongoing due to the exponential rise in cyber-attacks in recent times. The prediction of future network invasions is still an open re... 详细信息
来源: 评论
Blockchain-Based Central Bank Digital Currencies: A Comprehensive Survey  13th
Blockchain-Based Central Bank Digital Currencies: A Comprehe...
收藏 引用
13th international conference on computer Engineering and networks (CENet)
作者: Chen, Shuo Liu, Zhiwei Xu, Xiang Gao, Haoyu Hong Lei Liu, Chao Hainan Univ Sch Cyberspace Secur Haikou 570228 Hainan Peoples R China Oxford Hainan Blockchain Res Inst Chengmai 571924 Peoples R China Blockhouse Technol Ltd Oxford OX2 6XJ England SSC Holding Co Ltd Chengmai 571924 Peoples R China
In this information age, real currency is transitioning to digital currency. Blockchain technology has introduced smart contracts and distributed ledger technology, leading to new research directions in various fields... 详细信息
来源: 评论