咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是251-260 订阅
排序:
Role of Neural Network, Fuzzy, and IoT in Integrating Artificial Intelligence as a Cyber security System  2
Role of Neural Network, Fuzzy, and IoT in Integrating Artifi...
收藏 引用
2nd international conference on Electronics and Renewable systems, ICEARS 2023
作者: Das, Papri Illa, Manikumari Pokhariyal, Rajesh Latoria, Akhilesh Hemlata Saini, DilipKumar Jang Bahadur Auro University School of Information Technology Gujarat Surat India India Graphic Era Deemed to Be University Department of Computer Science & Engineering Uttarakhand Dehradun248002 India Central University of Haryana Department of Computer Science and Engineering Haryana Mahendergarh India Sawmi Rama Himalayan University Department of Computer Science & Engineering Dehradun India
The "Internet of Things"has a vast number interconnected devices. These interconnected devices collect vital data that may have a significant effect on the company, society, and the environment as a whole. I... 详细信息
来源: 评论
Investigating the Reliability of Vehicle-to-Vehicle and Vehicle-to-Infrastructure Communication  4th
Investigating the Reliability of Vehicle-to-Vehicle and Vehi...
收藏 引用
4th international conference on Innovations in Computational Intelligence and computer Vision, ICICV 2024
作者: Kumari, Ashish Kumar, Shailender Raw, Ram Shringar CSE Delhi Technological University New Delhi110042 India Maharaja Surajmal Institute of Technology C-4 Janakpuri New Delhi110058 India Netaji Subhas University of Technology New Delhi110031 India
The distributed structure of wireless communication along the decentralized structure of vehicular ad hoc networks makes them susceptible to attacks. The reduction of attacks by providing safety is the ... 详细信息
来源: 评论
LDVNet: Lightweight and Detail-Aware Vision Network for Image Recognition Tasks in Resource-Constrained Environments  29
LDVNet: Lightweight and Detail-Aware Vision Network for Imag...
收藏 引用
29th IEEE international conference on Parallel and distributed systems, ICPADS 2023
作者: Liu, Yuchen Liang, Hu Qiu, Ran Zhao, Shengrong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In many underwater application scenarios, recognition tasks need to be executed promptly on computationally limited platforms. However, models designed for this field often exhibit spatial locality, and existing works... 详细信息
来源: 评论
An Effective Intrusion Detection System in Cloud Computing Environment  3rd
An Effective Intrusion Detection System in Cloud Computing E...
收藏 引用
3rd international conference on Mobile Radio Communications and 5G networks, MRCN 2022
作者: Dixit, Sarvottam Hussain, Gousiya Department of Computer Science and Engineering Mewar University Chittorgarh India
Cloud computing is gaining popularity in the domain of computer science and is commonly called as a new data hosting technology;thanks to the cost reimbursement inflicted upon companies, the technology is becoming ver... 详细信息
来源: 评论
distributed Architecture for Interoperable Signaling Interlocking  4th
Distributed Architecture for Interoperable Signaling Interlo...
收藏 引用
4th international conference on networks, Intelligent systems and security (NISS)
作者: Abourahim, Ikram Amghar, Mustapha Eleuldj, Mohsine Mohammed V Univ Rabat Rabat Morocco
The interoperability in railway systems and especially in railway signaling interlocking is an issue for mobility need and to master the evolution of technology. Today, traffic of trains need a continuous communicatio... 详细信息
来源: 评论
The Markov Model of the Needham-Schroeder Protocol  25th
The Markov Model of the Needham-Schroeder Protocol
收藏 引用
25th international conference on distributed computer and Communication networks, DCCN 2022
作者: Shukmanova, A.A. Yermakov, A.S. Paltashev, T.T. Mamyrova, A.K. Ziro, A.A. Kazakh National Technical University Almaty Kazakhstan Caspian University Almaty Kazakhstan ITMO University Saint Petersburg Russia Turan University Almaty Kazakhstan
A user-friendly Markov model of procedures for the Needham-Schroeder information security algorithm is developed. To implement the development, auxiliary system models of three asynchronous execution algorithms are us... 详细信息
来源: 评论
A distributed Data Mesh Paradigm for an Event-based Smart Communities Monitoring Product  14
A Distributed Data Mesh Paradigm for an Event-based Smart Co...
收藏 引用
14th international conference on Ambient systems, networks and Technologies networks, ANT 2023 and The 6th international conference on Emerging Data and Industry 4.0, EDI40 2023
作者: Pongpech, Worapol Alex NIDA Seri Thai Rd Bangkok10110 Thailand
The recent pandemic events in Thailand, Covid-19 in 2018, demonstrated the need for an event-based smart monitoring system. While a distributed multi-level architecture has emerged as an architecture of choice for a l... 详细信息
来源: 评论
Enhanced security in e-Tendering System Using Blockchain with Efficient Smart Contracts and Hybrid Cryptography  5th
Enhanced Security in e-Tendering System Using Blockchain wit...
收藏 引用
5th international conference on Trends in Computational and Cognitive Engineering, TCCE 2023
作者: Gupta, Amritesh Kumar Dwivedi, Rajendra Kumar Department of Information Technology and Computer Application Madan Mohan Malaviya University of Technology Gorakhpur Gorakhpur India
Many organizations use tendering including government to obtain goods and services from the providers of the service and manufacturing companies. There has been an advanced evolution in the process from traditional ha... 详细信息
来源: 评论
Application of Hyperledger Blockchain Technology to Logistics Supply Chain with IoT  4
Application of Hyperledger Blockchain Technology to Logistic...
收藏 引用
4th international conference on Evolutionary Computing and Mobile Sustainable networks, ICECMSN 2024
作者: Sayar, Ahmet Kurtbas, Muhammet Cuneyd Sancaktar, Caglayan Kabak, Rana Dudu Cakmak, Sukru Department of Computer Engineering Kocaeli University Kabaoglu Baki Komsuoglu Avenue No:515 Umuttepe Kocaeli İzmit41010 Turkey Atez Software Technologies R&D Center Skyland B Blok No: 4B İstanbul Turkey
Product movement tracking stands as a pivotal aspect of logistics operations. The ever-expanding application of IoT technologies holds significant potential to enhance product tracking in logistics. However, the rapid... 详细信息
来源: 评论
Validating δ-Currency Using Model Checking
Validating δ-Currency Using Model Checking
收藏 引用
international conference on Data Science and Network Engineering, ICDSNE 2023
作者: Prabhu, Shreekanth M. Department of Computer Science and Engineering CMR Institute of Technology Bengaluru India
In recent years, there is a surfeit of digital currencies, virtual currencies, and cryptocurrencies. These currencies serve as alternatives to fiat currencies in the form of physical currencies or deposits in banks. S... 详细信息
来源: 评论