咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是201-210 订阅
排序:
Reduce Low-Frequency distributed Denial of Service Threats by Combining Deep and Active Learning  1
收藏 引用
9th international conference on Cyber security, Privacy in Communication networks, ICCS 2023
作者: Shukla, Aditya Kumar Sharma, Ashish Sengar, Sandeep Singh Department of Computer Engineering and Applications GLA University NH#2 Delhi Mathura Highway Post Ajhai Uttar Pradesh Mathura India Department of Computer Science Cardiff School of Technologies Cardiff Metropolitan University Cardiff United Kingdom
This study introduces substantial contributions to the field of Low-Rate Detection of Distribution Denial of Service (DDoS) Attacks, leveraging convolutional neural networks (CNNs) with an attention mechanism and inco... 详细信息
来源: 评论
Clustering by Improved PSO based Jaya Algorithm for Energy Optimization of Wireless Sensor networks  5
Clustering by Improved PSO based Jaya Algorithm for Energy O...
收藏 引用
5th IEEE international conference on Electrical, computer and Communication Technologies, ICECCT 2023
作者: Malarvizhi, P. Kavithaa, G. Computer Science and Engineering Knowledge Institute of Technology Salem India Electronics and Communication Engineering Government College of Engineering Salem India
In recent years, industries have automated processes which mean the amount of human participation has decreased, resulting in the Fourth Industrial Revolution. A highly distributed self-organizing system known as a Wi... 详细信息
来源: 评论
User Mobility Prediction in 5G networks Using Recurrent Neural networks
User Mobility Prediction in 5G Networks Using Recurrent Neur...
收藏 引用
2024 IEEE international conference on Communication, Computing and Signal Processing, IICCCS 2024
作者: Shrestha, Anubhav Sharma, Vikalp Hussein, Layth Aishwarya, M. Satyanarayana, A.N. Saimanohar, T. Chandigarh Group of Colleges Chandigarh Engineering College Department of Computer Application Punjab Jhanjeri Mohali140307 India Ies College of Technology Department of Computer Science & Engineering M.P. Bhopal India The Islamic University College Of Technical Engineering Department Of Computers Techniques Engineering Najaf Iraq The Islamic University Of Al Diwaniyah College Of Technical Engineering Department Of Computers Techniques Engineering Al Diwaniyah Iraq Prince Shri Venkateshwara Padmavathy Engineering College Chennai India Sreenidhi Institute of Science and Technology Ece Department Hyderabad India Saveetha Institute of Medical and Technical Sciences Department CSE-AI Tamilnadu Chennai India
The use of new possibilities introduced by 5G networks also creates new problems and concerns, specifically in the field of user mobility in wireless communication systems. In this paper, the Authors investigate the e... 详细信息
来源: 评论
Network Intrusion Detection Using Deep Belief Network (DBN)  2
Network Intrusion Detection Using Deep Belief Network (DBN)
收藏 引用
2nd international conference of Intelligent Methods, systems and Applications, IMSA 2024
作者: Elsersy, Wael Farouk Samy, Moataz Elshamy, Ahmed Faculty of Computer Science Giza Egypt
The escalating Interconnectedness of devices has given rise to a surge in cyber-security threats, particularly zero-day attacks, which pose a significant challenge to traditional Intrusion Detection systems (IDSs). Th... 详细信息
来源: 评论
Blockchain-Based Cryptocurrency Payment System Model for Business-To-Consumer E-Commerce Platforms  1
收藏 引用
international conference on. Cryptology and Network security with Machine Learning, ICCNSML 2023
作者: Pal, Prashnatita Sahana, Bikash Chandra Poray, Jayanta Bhattacharya, Rituparna Department of Electronics and Communication Engineering National Institute of Technology Patna India St. Thomas College of Engineering and Technology Kolkata Kolkata India Department of Computer Science and Engineering Techno India University Kolkata India
Payment gateways are necessary for securing online transactions on e-commerce platforms, but there is still a problem with the restricted use of cryptocurrency as a payment method. Due to lengthy confirmation periods ... 详细信息
来源: 评论
Evolutionary Patterns in Modern-Era Cloud-Based Healthcare Technologies  1
收藏 引用
8th international conference on Information and Communication Technology for Competitive Strategies, ICTCS 2023
作者: Shrivastava, Vishal Pathak, Vibhakar Mishra, Saumya Buri, Ram Babu Sharma, Sangeeta Mishra, Chandrabhan Computer Science and Engineering Arya College of Engineering & I.T. Jaipur India
distributed computing plays a pivotal role in revolutionizing the management of clinical data within the healthcare sector. This technology facilitates the global exchange of healthcare documents through electronic co... 详细信息
来源: 评论
distributed Primal-Dual Interior Point Framework for Analyzing Infeasible Combined Transmission and Distribution Grid networks  58
Distributed Primal-Dual Interior Point Framework for Analyzi...
收藏 引用
58th Hawaii international conference on System Sciences, HICSS 2025
作者: Ali, Muhammad Hamza Pandey, Amritanshu University of Vermont United States
The proliferation of distributed energy resources has heightened the interactions between transmission and distribution (T&D) systems, necessitating novel analyses for the reliable operation and planning of interc... 详细信息
来源: 评论
A Novel Software Defined security Framework for SDN  18th
A Novel Software Defined Security Framework for SDN
收藏 引用
18th international conference on Risks and security of Internet and systems (CRiSIS)
作者: Basu, Srijita Raun, Neha Firdaush Ghosal, Avishek Chatterjee, Debanjan Maitra, Debarghya Mazumdar, Chandan Jadavpur Univ Ctr Distributed Comp Kolkata India Jadavpur Univ Kolkata India
Software Defined security (SDS) entails the security implementation of a network, based on certain applications. It can be portrayed as a virtualized abstraction of the essential security features into a single softwa... 详细信息
来源: 评论
Virtual Private Network Blockchain-based Dynamic Access Control Solution for Inter-organisational Large Scale IoT networks  1
收藏 引用
17th international conference on Risks and security of Internet and systems (CRiSIS)
作者: Trabelsi, Rahma Fersi, Ghofrane Jmaiel, Mohamed Univ Sfax Natl Sch Engineers Sfax ReDCAD Lab BP 1173 Sfax 3038 Tunisia Digital Res Ctr Sfax BP 275 Sfax 3021 Tunisia
Access control management in IoT environment faces big challenges. Unfortunately, it is hard to implement current access control standards on smart objects due to the complexity of access control solutions and the lim... 详细信息
来源: 评论
Harnessing Machine Learning for Enhanced distributed Computing in Wireless Network systems
Harnessing Machine Learning for Enhanced Distributed Computi...
收藏 引用
2024 international conference on Communication, computer Sciences and Engineering, IC3SE 2024
作者: Rashmi, K. Anandhi, R.J. Singh, Navdeep Kumar, V. Surya Pavan Gupta, Krashnkant Albawi, Ali Institute Of Aeronautical Engineering Department Of Computer Science And Engineering Telangana Hyderabad India New Horizon College Of Engineering Department Of Information Science Engineering Bangalore India Lovely Professional University Phagwara India Mlr Institute Of Technology Department Of CSE-AI&ML Telangana Hyderabad India Amity University Greater Noida Department Of Electronics & Communication Engineering India College Of Medical Technology The Islamic University Radiology Techniques Department Najaf Iraq
A complete wireless network system for flexible resource sharing, spectrum management, security, and cross-layer optimization is described in this paper. Five algorithms comprise the system. These are ADS, QoS-ML, CLO... 详细信息
来源: 评论