咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是191-200 订阅
排序:
Integration of Blockchain in computer Networking: Overview, Applications, and Future Perspectives for Software-defined Networking (SDN), Network security, and Protocols  10
Integration of Blockchain in Computer Networking: Overview, ...
收藏 引用
10th international conference on Software Defined systems, SDS 2023
作者: Hossain Faruk, Md Jobair Cheng, Jerry Q. New York Institute of Technology Department of Computer Science United States
The rapid advancement and increasing complexity of computer networks have created a need for robust, secure, and scalable solutions in order to manage and protect network resources. Blockchain, an emerging distributed... 详细信息
来源: 评论
Enhancing Intrusion Detection in Smart Grids: A Machine Learning-based Defense Against DDoS Attacks with Imbalance-Aware Optimization  3
Enhancing Intrusion Detection in Smart Grids: A Machine Lear...
收藏 引用
3rd international conference on Electronics and Renewable systems, ICEARS 2025
作者: Mahaveerakannan, R. Kumar, T. Rajesh Balamanigandan, R. Vasarao, Parnandi Srinu Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai602105 India Swarnandhra College of Engineering and Technology Department of Computer Science and Engineering West Godavari District Andhra Pradesh Narsapur India
The presence of numerous bidirectional communication devices connecting customers to the grid makes smart grid networks particularly vulnerable to network attacks. As an instance of a network attack that could impact ... 详细信息
来源: 评论
Design and Comprehensive Review on Number of Different States of the Art Works Related to Botnet Attack Detection
Design and Comprehensive Review on Number of Different State...
收藏 引用
2024 MIT Art, Design and Technology School of Computing international conference, MITADTSoCiCon 2024
作者: Bobade, Sandip Y. Apare, Ravindra S. Borhade, Ravindra H. SMT. Kashibai Navale College of Engineering SPPU Computer Engineering Dept Pune India Trinity College of Engineering and Research SPPU IT Department Pune India College of Engineering SPPU STES Smt. Kashibai Navale Department of Computer Engineering Pune India
The Internet of Things is a novel example for communication which use the internet to connect a extensive range of common place things. A new age of clever gadgets that are effortlessly integrated into our day-To-day ... 详细信息
来源: 评论
Industrial Network Protocol security Enhancement Using Programmable Switches  14
Industrial Network Protocol Security Enhancement Using Progr...
收藏 引用
14th IEEE international conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023
作者: Hu, Zheng Lin, Hui Waind, Luke Qu, Yanfeng Chen, Gong Jin, Dong University of Arkansas Computer Science and Computer Engineering FayettevilleAR United States The University of Rhode Island Electrical Computer and Biomedical Engineering KingstonRI United States Illinois Institute of Technology Computer Science ChicagoIL United States
There has been a growing concern regarding the security of industrial network protocols in Supervisory Control and Data Acquisition (SCADA) systems. These protocols are vulnerable to a plethora of security threats, in... 详细信息
来源: 评论
A Short Survey of AI-driven Load Distribution for Electronic Health Record Management with Recent Deployed Techniques, Research Gaps and Challenges  5
A Short Survey of AI-driven Load Distribution for Electronic...
收藏 引用
5th international conference on Smart Electronics and Communication, ICOSEC 2024
作者: Suryanarayanaraju, S. Naik, M.Chandra Jagan Mohan, R.N.V. Giet University Department of Computer Science & Engineering Odisha Gunupur765022 India Department of Computer Science & Engineering Chinamiram534204 India
With the arrival of Artificial Intelligence (AI), the Internet of Things (IoT), machine learning, and deep learning methodologies, data-driven medical applications have appeared as a promising solution for implementin... 详细信息
来源: 评论
XMeta-OS: A Conceptual Framework for Unified Resource Management in distributed Edge-Cloud Environments  3rd
XMeta-OS: A Conceptual Framework for Unified Resource Manag...
收藏 引用
3rd international conference on Advances in Computing Research, ACR 2025
作者: Zacharioudakis, Eleftherios Kakoulli, Elena Evripidou, Salomi Intelligent Systems Laboratory Department of Computer Science Neapolis University Pafos Pafos Cyprus National Technical University of Ukraine Igor Sikorsky Kyiv Polytechnic Institute Kyiv Ukraine Electrical Engineering and Computer Engineering and Informatics Cyprus University of Technology Limassol Cyprus
This paper introduces XMeta-OS, a meta-operating system specially designed with Linux as its foundation to unify and optimize resource management for the distributed edge-cloud when dynamic use of GPU resources is pos... 详细信息
来源: 评论
DDoS-Net: Classifying DDoS Attacks in Wireless Sensor networks with Hybrid Deep Learning  6
DDoS-Net: Classifying DDoS Attacks in Wireless Sensor Networ...
收藏 引用
6th international conference on Electrical Engineering and Information and Communication Technology, ICEEICT 2024
作者: Reza, Farhana Brac University Department of Computer Science and Engineering Dhaka1212 Bangladesh
With the ubiquitous deployment of Wireless Sensor networks (WSNs) in diverse applications, ensuring their security against cyber threats is imperative. One significant challenge is the susceptibility of WSNs to Distri... 详细信息
来源: 评论
QoS Based Hybrid Swarm Intelligent Intrusion Detection System for Network security  14
QoS Based Hybrid Swarm Intelligent Intrusion Detection Syste...
收藏 引用
14th international conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Karthikeyan, N. Bhargav, Jajjara Kavitha, M.S. Karthik, S. Sns College of Technology Department of Computer-Science and Engineering Coimbatore India
The proliferation of Internet usage and the wide range of military applications have prompted scholars to consider the development of intelligent systems that can aid users and applications in obtaining services by pr... 详细信息
来源: 评论
Ensuring Confidentiality and Integrity of Electronic Health Records in Blockchain Through Multi-Attribute Access Control
Ensuring Confidentiality and Integrity of Electronic Health ...
收藏 引用
international Health Informatics conference, IHIC 2023
作者: Mahapatro, Smita Basha, Syed Muzamil Department of Computer Science and Engineering REVA University Bengaluru560064 India
The digitalization of traditional healthcare data, such as Electronic Health Records (EHR), presents significant challenges for healthcare organizations. Sharing and storing EHRs can be difficult, and accessing the in... 详细信息
来源: 评论
Decentralized Metaverse: Towards a Secure, Autonomous, and Inclusive Virtual World
Decentralized Metaverse: Towards a Secure, Autonomous, and I...
收藏 引用
2023 IEEE international conference on Electrical, computer and Energy Technologies, ICECET 2023
作者: Alsamhi, Saeed Hamood Hawbani, Ammar Kumar, Santosh Porwol, Lukasz Curry, Edward Insight Centre for Data Analytics University of Galway Galway Ireland School of Computer Science Shenyang Aerospace University Shenyang China Computer Science and Engineering Iiit Naya Raipur Chhattisgarh India
The metaverse is a universal and immersive virtual world, which are components of cyber-physical-social systems (CPSS). The traditional centralized approach to building a metaverse poses risks to user privacy, securit... 详细信息
来源: 评论