咨询与建议

限定检索结果

文献类型

  • 4,982 篇 会议
  • 280 册 图书
  • 89 篇 期刊文献

馆藏范围

  • 5,351 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,876 篇 工学
    • 2,567 篇 计算机科学与技术...
    • 1,716 篇 软件工程
    • 978 篇 信息与通信工程
    • 373 篇 电气工程
    • 304 篇 控制科学与工程
    • 183 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 121 篇 电子科学与技术(可...
    • 121 篇 安全科学与工程
    • 112 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 44 篇 交通运输工程
  • 615 篇 理学
    • 368 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 101 篇 统计学(可授理学、...
    • 85 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 185 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 240 篇 法学
    • 165 篇 法学
    • 81 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 500 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,230 篇 英文
  • 90 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5351 条 记 录,以下是11-20 订阅
排序:
Group authentication algorithm based on region grouping and aggregate signcryption  4
Group authentication algorithm based on region grouping and ...
收藏 引用
4th international conference on Network Communication and Information security, ICNCIS 2024
作者: Li, Yong Gu, Jian Qiu, Jinyi He, Wenbo Zuo, Jiashuo State Grid Shaoxing Power Supply Company Zhejiang Shaoxing312000 China Department of Electronic and Communication Engineering North China Electric Power University Hebei Baoding071003 China
With the rapid development of the power Internet of Things and the increasing number of IoT devices and application scenarios, new requirements are put forward for the reliability and efficiency of equipment access ce... 详细信息
来源: 评论
Exploring Artificial Intelligence’s Potential in Developing Advanced distributed Denial of Service Defense Strategies
Exploring Artificial Intelligence’s Potential in Developing...
收藏 引用
international conference on Computing and Machine Learning, CML 2024
作者: Alhindi, Ahmad Computer Science and Artificial Intelligence Department College of Computer and Information Systems Makkah Saudi Arabia
Facing the growing menace of distributed denial of service (DDoS) attacks, there’s a critical demand for enhanced detection mechanisms. This necessitates a shift from traditional methodologies to more advanced, dynam... 详细信息
来源: 评论
Atlas: Towards Real-Time Verification in Large-Scale networks via a Native distributed Architecture  25
Atlas: Towards Real-Time Verification in Large-Scale Network...
收藏 引用
20th European conference on computer systems, EuroSys 2025, co-located 30th ACM international conference on Architectural Support for Programming Languages and Operating systems, ASPLOS 2025
作者: Ma, Mingxiao Zhang, Yuehan Wang, Jingyu He, Bo Zhao, Chenyang Qi, Qi Zhuang, Zirui Sun, Haifeng Guo, Lingqi Guo, Yuebin Zhang, Gong Liao, Jianxin State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Pengcheng Laboratory China *** China Huawei Technologies China
Data plane verification (DPV) can be critical in ensuring the network operates correctly. To be useful in practice, they need to be: (1) fast so as to prevent significant packet loss or security violations;(2) scalabl... 详细信息
来源: 评论
Enhancing Electric Vehicle Charging systems with distributed Edge Intelligence  16
Enhancing Electric Vehicle Charging Systems with Distributed...
收藏 引用
16th international conference on Ambient systems, networks and Technologies networks, ANT 2025 / 8th international conference on Emerging Data and Industry 4.0, EDI40 2025
作者: Rahmani, Rahim Stojcevska, Biljana Department of Computer and Systems Sciences Stockholm University Sweden American University of Europe Skopje North Macedonia
The rapid proliferation of electric vehicles (EVs) and the corresponding expansion of charging systems, driven by global regulatory mandates, present significant challenges to the electric grid. These systems also gen... 详细信息
来源: 评论
Towards Smarter Maritime security: Apriori Algorithm Optimization in Serverless Environments  16
Towards Smarter Maritime Security: Apriori Algorithm Optimiz...
收藏 引用
16th international conference on Ambient systems, networks and Technologies networks, ANT 2025 / 8th international conference on Emerging Data and Industry 4.0, EDI40 2025
作者: Shahin, Mahtab Rahimpour, Saeed Ghasempouri, Tara Bauk, Sanja Fahringer, Thomas Draheim, Dirk Estonian Maritime Academy Tallinn University of Technology Tallinn Estonia Department of Computer Systems Tallinn University of Technology Tallinn Estonia Distributed and Parallel Systems Group University of Innsbruck Tirol Austria Information Systems Group Tallinn University of Technology Tallinn Estonia
This paper presents an optimized implementation of the Apriori algorithm tailored for large-scale data mining in cloud-native, serverless environments, utilizing real-world fuel datasets. Our approach achieves a 28% r... 详细信息
来源: 评论
security Vulnerability Detection and Defense of Smart Home systems Based on the Internet of Things  6th
Security Vulnerability Detection and Defense of Smart Home S...
收藏 引用
6th international conference on Cyber security Intelligence and Analytics, CSIA 2024
作者: Zhao, Zhenghui Chen, Miao Chongqing Medical and Pharmaceutical College Chongqing401331 China
With the widespread application of IoT (Internet of Things) technology in smart homes, the security protection of systems has received more attention. In response to the problems of incomplete vulnerability detection ... 详细信息
来源: 评论
distributed Self-fault Outlier Detection in Wireless Sensor Network Based on Machine Learning  6th
Distributed Self-fault Outlier Detection in Wireless Sensor ...
收藏 引用
6th international conference on Computational Intelligence in Pattern Recognition, CIPR 2024
作者: Padhi, Ruchika Mudulli, Debendra Gouda, Bhabani Sankar C. V. Raman Global University Odisha Bhubaneswar India School of Computer Science NIST Institute of Science and Technology Odisha Brahmapur India
Due to a wide range of essential applications, resource limitations, and intermittent irregular responses from cluster sensor nodes, different cluster sensor node faults and failures of distributed wireless sensor net... 详细信息
来源: 评论
A distributed Technique of Optimization Problems Solving Based on Efficient Workload Assignment  27th
A Distributed Technique of Optimization Problems Solving Ba...
收藏 引用
27th international conference on distributed computer and Communication networks, DCCN 2024
作者: Klimenko, Anna Institute of IT and Security Technologies Russian State University for Humanities Moscow Russia
Currently, the efficiency improvement of complex technical systems is an urgent scientific task, which in numerous cases is formalized via optimization problem and solved by some well-known optimization methods. Metah... 详细信息
来源: 评论
Enhancing Intrusion Detection in Smart Grids: A Machine Learning-based Defense Against DDoS Attacks with Imbalance-Aware Optimization  3
Enhancing Intrusion Detection in Smart Grids: A Machine Lear...
收藏 引用
3rd international conference on Electronics and Renewable systems, ICEARS 2025
作者: Mahaveerakannan, R. Kumar, T. Rajesh Balamanigandan, R. Vasarao, Parnandi Srinu Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai602105 India Swarnandhra College of Engineering and Technology Department of Computer Science and Engineering West Godavari District Andhra Pradesh Narsapur India
The presence of numerous bidirectional communication devices connecting customers to the grid makes smart grid networks particularly vulnerable to network attacks. As an instance of a network attack that could impact ... 详细信息
来源: 评论
14th EAI international conference on Wireless and Satellite systems, WiSATS 2024
14th EAI International Conference on Wireless and Satellite ...
收藏 引用
14th EAI international conference on Wireless and Satellite systems, WiSATS 2024
The proceedings contain 62 papers. The special focus in this conference is on Wireless and Satellite systems. The topics include: A DQN-Based Routing Algorithm for Load Balancing in LEO Satellite networks;design of Sa...
来源: 评论