咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是211-220 订阅
排序:
Federated Clustering Defense: Mitigating Data Exposure in Collaborative Learning
Federated Clustering Defense: Mitigating Data Exposure in Co...
收藏 引用
2025 international conference on Emerging Technologies for Intelligent systems, ETIS 2025
作者: Radhakrishnan, Anuja Krishna, Sathya Bama Sathyabhama Institute of Science & Technology Department of Computer Science and Engineering Chennai India
The development of intelligent industrial applications is being driven globally by advancements in the next generation of Internet of Things (IoT) technologies. At the same time, artificial intelligence (AI) technolog... 详细信息
来源: 评论
Attack Detection in Smart Home IoT networks: A Survey on Challenges, Methods and Analysis  14th
Attack Detection in Smart Home IoT Networks: A Survey on Cha...
收藏 引用
14th EAI international conference on Broadband Communications, networks, and systems, BROADNETS 2024
作者: Rreddy, M. Vinay Kuma Lathigara, Amit Reddy, Muthangi Kantha RK University Gujarat India Computer Engineering RK University Gujarat India Shri Vishnu Engineering College for Women Andhra Pradesh India
The ubiquity of Internet of Things (IoT) gadgets in smart homes has transformed our interactions with our living environments by providing never-before-seen levels of automation and convenience. However, because IoT d... 详细信息
来源: 评论
Proposing a novel approach based on GAN neural networks to address data poisoning attacks in federated learning  29
Proposing a novel approach based on GAN neural networks to a...
收藏 引用
29th international computer conference, computer Society of Iran, CSICC 2025
作者: Rahmat, Mohammad Ghabel Zarafshan, Faraneh Department of Computer Engineering Karaj Branch Islamic Azad University Karaj Iran
Data poisoning attacks are one of the serious threats in federated learning, which can disrupt the performance of the central model by injecting poisoned data into local nodes. These attacks are particularly significa... 详细信息
来源: 评论
Vulnerability Assessment of security Breach and Deadly Threat in Cloud Computing Environment  15
Vulnerability Assessment of Security Breach and Deadly Threa...
收藏 引用
15th IEEE international conference on Computational Intelligence and Communication networks, CICN 2023
作者: Gupta, Ashish Sinha, Shreya Singh, Harsh Kumar Bhushan, Bharat Sharda University Computer Science and Engineering Greater Noida India
Cloud computing allows us to access available systems and pay for what we require whenever needed. When there is access to the internet, it uses some techniques like Service-Oriented Architecture (SOA), virtualization... 详细信息
来源: 评论
A Survey on distributed Denial of Service Attack - Detection Mechanisms and Mitigation Mechanisms in the Cloud Environment  10
A Survey on Distributed Denial of Service Attack - Detection...
收藏 引用
10th IEEE Uttar Pradesh Section international conference on Electrical, Electronics and computer Engineering, UPCON 2023
作者: Kandikattu, Chris Harry Panguluri, Sam Sangeeth Kumar, Sandeep Bulla, Suneetha Shaik, Abdul Raheem Koneru Lakshmaiah Educational Foundations Department of Computer Science and Engineering Vijayawada India
It is evident that problems associated with vast amounts of information occur with complicated systems and processes that act collaboratively to provide services. Also, other related issues such as security problems, ... 详细信息
来源: 评论
The Smart Development of Multichip Communication systems with The Help of Short Transmission Nodes  2
The Smart Development of Multichip Communication Systems wit...
收藏 引用
2nd IEEE international conference on distributed Computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Sunil, M.P. Devaraj Verma, C. Department of Electronics and Communication Engineering Bangalore India Department of Computer Science and Engineering Bangalore India
Multichip communication systems offer faster and more efficient data transmission and processing than single-chip systems. Multichip communication systems are made up of multiple chips that are interconnected and comm... 详细信息
来源: 评论
26th international Symposium on Stabilization, Safety, and security of distributed systems, SSS 2024
26th International Symposium on Stabilization, Safety, and S...
收藏 引用
26th international Symposium on Stabilization, Safety, and security of distributed systems, SSS 2024
The proceedings contain 33 papers. The special focus in this conference is on Stabilization, Safety, and security of distributed systems. The topics include: Invited Paper: Gathering Oblivious Robots in the ...
来源: 评论
A Novel Private Encryption Model in IoT Under Cloud Computing Domain
A Novel Private Encryption Model in IoT Under Cloud Computin...
收藏 引用
Proceedings of the international conference on Intelligent systems and Network, ICISN 2023
作者: Yadala, Sucharitha Pundru, Chandra Shaker Reddy Solanki, Vijender Kumar Department of Computer Science and Engineering VNR Vignana Jyothi Institute of Engineering and Technology TS Hyderabad India School of Computer Science and Engineering Lovely Professional University Punjab Phagwara India Department of Computer Science and Engineering CMR Institute of Technology Hyderabad India
The presence of the Internet of Things (IoT) works with the assortment and diffusion of metropolitan information data. In any case, it can release clients’ very own security data in brilliant urban areas. Many works ... 详细信息
来源: 评论
distributed-computing based versatile healthcare services framework for diagnostic markers  2nd
Distributed-computing based versatile healthcare services fr...
收藏 引用
2nd international conference on Next-Generation Computing and Information systems, ICNGCIS 2023
作者: Chunduri, Venkata Posinasetty, Bhargavi Son, Mukesh Byeon, Haewon Department of Mathematics & Computer Science Indiana State University United States The University of Southern Mississippi HattiesburgMS United States Dr. D. Y. Patil Vidyapeeth Pune Dr. D. Y. Patil School of Science & Technology Pune Tathawade India Department of Digital Anti-Aging Healthcare Inje University Gimhae Korea Republic of
Recently, there has been a boom in imaginative medical services technologies that have enhanced the delivery of medical care data. Human-to-human and gadget-to-gadget networks are crucial in people’s lives and functi... 详细信息
来源: 评论
Securing networks: Leveraging Machine Learning for Enhanced DDoS Detection  1
Securing Networks: Leveraging Machine Learning for Enhanced ...
收藏 引用
1st international conference on Software, systems and Information Technology, SSITCON 2024
作者: Chauhan, Som Byahatti, Prajval Patel, Sunil Kumar Manipal University Jaipur Department of Computer Science & Engineering Jaipur India
The growing complexity of distributed Denial of Service (DDoS) attacks poses a serious threat to network security, making the development of effective detection and mitigation techniques essential. This study tackles ... 详细信息
来源: 评论