咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 87 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 5,104 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 496 篇 security
  • 355 篇 wireless sensor ...
  • 312 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 202 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 149 篇 cryptography
  • 147 篇 computer science
  • 142 篇 computational mo...
  • 142 篇 internet
  • 140 篇 data security

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...
  • 6 篇 the islamic univ...
  • 6 篇 graphic era deem...

作者

  • 9 篇 hammoudeh mohamm...
  • 9 篇 obaidat mohammad...
  • 8 篇 igor kotenko
  • 8 篇 eyas el-qawasmeh
  • 7 篇 yanmin zhu
  • 7 篇 barolli leonard
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 mohammad s. obai...
  • 6 篇 shahid raza
  • 6 篇 thiemo voigt
  • 6 篇 natrayan l
  • 6 篇 das sajal k.
  • 6 篇 mohammad hammoud...
  • 6 篇 keromytis angelo...
  • 5 篇 isaac woungang
  • 5 篇 ma jianfeng
  • 5 篇 lionel m. ni
  • 5 篇 wehrle klaus

语言

  • 4,987 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5104 条 记 录,以下是11-20 订阅
排序:
Dynamic Trust Management in IoT networks using Reputation-Based systems
Dynamic Trust Management in IoT Networks using Reputation-Ba...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Naidu, D J Samatha Jain, Upma Shruthi, S. Rao, K. B. V. Brahma Iqbal, Syed Mohammad Uzair Natrayan, L. Annamacharya Pg College of Computer Studies Department of Master of Computer Applications India Graphic Era Deemed to Be University Department of Computer Science & Engineering Dehradun India Bms Institute of Technology and Management Department of Artificial Intelligence and Machine Learning Bengaluru India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering India Symbiosis Law School Department of Law Pune India Simats Saveetha School of Engineering Department of Mechanical Engineering India
The Internet of Things (IoT) enables intelligent data exchange across many kinds of interconnected devices in a diverse and unpredictable physical setting. The Internet of Things (IoT) network used in this study is a ... 详细信息
来源: 评论
Advanced security for IoT networks: A Novel Approach to Intrusion Detection and Feature Selection
Advanced Security for IoT Networks: A Novel Approach to Intr...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Mittal, Akhil Nedunoori, Venkata Ieee Department of Cybersecurity Ieee Department of Software Engineering
The quick development of Internet of Things (IoT) has brought about concerns regarding the security of interconnected networks and devices. This requires the utilization of effective Intrusion Detection System (IDS) t... 详细信息
来源: 评论
Potential Possibilities of Voice Pattern Recognition by a distributed Fiber Optic Sensor  23rd
Potential Possibilities of Voice Pattern Recognition by a Di...
收藏 引用
23rd international conference on Next Generation Wired/Wireless networks and systems (NEW2AN) / 16th conference on Internet of Things and Smart Spaces (RuSMART)
作者: Gubareva, Olga Yu Dashkov, Michael V. Makarov, Igor S. Gureev, Vladimir O. Evtushenko, Alexander S. PovolzhskiyState Univ Telecommun & Informat Lva Tolstogo 23 Samara 443010 Russia
Currently, ensuring information security (IS) is one of the priorities of a state's national policy. One of the most important tasks of IS is the precise identification of users within information systems. Biometr... 详细信息
来源: 评论
Optimized Biometric Authentication using MTCNN and Dynamic Signature Detection: A Unified Approach for Enhanced security
Optimized Biometric Authentication using MTCNN and Dynamic S...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Harakannanavar, Sunil S Keerthana, G V. Jayasree Shubha, K. Srushti, S.K. Nitte Meenakshi Institute of Technology Department of Electronics and Communication Engineering Bangalore India
Automatic photo and signature detection using MTCNN (Multi-task Cascaded Convolutional networks) is a vital component in various applications such as identity verification and document processing. MTCNN, initially des... 详细信息
来源: 评论
TruChain: A Blockchain-based Access Control to Improve the security of Smart Water Grid systems  17
TruChain: A Blockchain-based Access Control to Improve the S...
收藏 引用
17th international conference on COMmunication systems and networks, COMSNETS 2025
作者: Mondal, Susmita Chakraborty, Suchetana Indian Institute of Technology Department of Computer Science and Engineering Jodhpur India
Water is a significant resource in day-to-day life, and it usually requires technological association for comprehensive management. Smart Water Grids (SWG) typically use cyberphysical systems (CPS) to monitor several ... 详细信息
来源: 评论
Quantum Cryptography Techniques for Enhancing security in IoT Communications
Quantum Cryptography Techniques for Enhancing Security in Io...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Naga, Suresh Bysani Venkata Kotiyal, Arnav Battula, R.S.S. Raju Patil, Harshal Dharangutti, Yogesh Natrayan, L. Eightfold.ai Ex - Cohesity CA United States Graphic Era Deemed to Be University Department of Computer Science & Engineering Dehradun India Aditya University Department of Computer Applications Surampalem India Iilm University School of Computer Science & Engineering Greater Noida India Department of Law Pune India School of Engineering Simats Department of Mechanical Engineering Saveetha Kuthambakkam India
A system of wirelessly communicative sensors embedded in a person's clothing. In order to remotely monitor and treat a patient's health, sensor devices are embedded in clothing, skin, and the human body itself... 详细信息
来源: 评论
Image Cryptography using AES-256 Algorithm
Image Cryptography using AES-256 Algorithm
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Chandel, Taniska Gangodkar, Ninad Gautam, Abhiraj Lohumi, Yogesh Ghazi, Mohd Rehan Goyal, Ashtha University Department of Computer Science and Engineering Dehradun India Graphic Era Hill University School of Computing Dehradun India
Due to the advancement of technology, information security and user privacy have become a critical issue resulting in the use of various encryption techniques. Especially with the increasing use of social networking, ... 详细信息
来源: 评论
Optimal Codes for distributed Storage
Optimal Codes for Distributed Storage
收藏 引用
international conference on Computing, Networking and Communications (ICNC)
作者: Ren, Jian Li, Jian Li, Tongtong Michigan State Univ Dept ECE E Lansing MI 48824 USA Beijing Jiaotong Univ Sch Elect & Informat Engn Beijing Peoples R China
Regenerating codes are a class of distributed storage codes that allow for efficient repair of failed nodes, as compared to traditional erasure codes, which enables it to achieve high data reliability, security, and c... 详细信息
来源: 评论
security threat detection performance analysis of a distributed architecture WSN  19
Security threat detection performance analysis of a distribu...
收藏 引用
19th international conference on Future networks and Communications, FNC 2024 / 21st international conference on Mobile systems and Pervasive Computing, MobiSPC 2024 / 14th international conference on Sustainable Energy Information Technology, SEIT 2024
作者: Arreaga, Nestor X. Estrada, Rebeca Blanc, Sara Noboa, Andres Vera, Nelson ESPOL Polytechnic University Escuela Superior Politecnica del Litoral Campus Gustavo Galindo Km. 30.5 Via Perimetral Guayaquil090902 Ecuador ITACA Universitat Politecnica de Valencia Camino de Vera s/n Valencia Valencia46022 Spain
IoT technologies are becoming more and more common in our daily activities because the networks they create are capable of collecting information, monitoring and controlling remotely. However, these devices are not ex... 详细信息
来源: 评论
Comparison Of Emotion Through Text Analysis Using Various Deep Learning Models  3
Comparison Of Emotion Through Text Analysis Using Various De...
收藏 引用
3rd IEEE international conference on Blockchain and distributed systems security, ICBDS 2024
作者: Trimukhe, Harshita Sanjay Pagare, Rutuja Anil Salunke, Shreya Sandeep Rafeeque, Afeefa Noor, Rasheed Baig, Salman Mmantc Malegaon Computer Engineering Department Malegaon India
In this study, we investigate the efficacy of Convolutional Neural networks (CNN), Recurrent Neural networks (RNN), Long Short-Term Memory networks (LSTM), and Bidirectional LSTMs (BiLSTM) for emotion classification t... 详细信息
来源: 评论