咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是281-290 订阅
排序:
DCNN-based load balancing and computation offloading of Intelligent Video Surveillance with Edge Computing
DCNN-based load balancing and computation offloading of Inte...
收藏 引用
2023 international conference on Evolutionary Algorithms and Soft Computing Techniques, EASCT 2023
作者: Koparde, Shweta Sujatha, G. Jangirala, Srinivas Kumar, P. Santhosh Dr. Dy Patil Institute of Technology Computer Engineering Pune India Kommuri Pratap Reddy Institute of Technology Computer Science and Engineering Ghatkeshar India O.P. Jindal Global University Jindal Global Business School Sonipat India Srm Institute of Science and Technology Information Technology College of Engineering and Technology Ramapuram Chennai India
In this study, we offer a distributed Intelligent Video Surveillance (DIVS) system that is set up in an environment of edge computing and is based on Deep Learning (DL). For the DIVS system, we developed a distributed... 详细信息
来源: 评论
security Landscape of Anomaly based Defence Mechanisms in Edge Environments  9
Security Landscape of Anomaly based Defence Mechanisms in Ed...
收藏 引用
9th international conference on Smart Computing and Communications, ICSCC 2023
作者: Wath, Aditya Kurian, Tom Martin, John Paul Indian Institute of Information Technology Kottayam Department of Computer Science and Engineering Kerala Kottayam India
Edge computing is a computational paradigm that brings computation closer to the end user. Even though real-time applications benefit from the extremely low response time of such a computing paradigm, the heterogeneit... 详细信息
来源: 评论
Hebbian Continual Representation Learning  56
Hebbian Continual Representation Learning
收藏 引用
56th Annual Hawaii international conference on System Sciences, HICSS 2023
作者: Morawiecki, Pawel Wolczyk, Maciej Krutsylo, Andrii Śmieja, Marek Polish Academy of Sciences Institute of Computer Science Poland Faculty of Mathematics and Computer Science Jagiellonian University Poland
Continual Learning aims to bring machine learning into a more realistic scenario, where tasks are learned sequentially and the independent and identically distributed assumption is not preserved. Although this setting... 详细信息
来源: 评论
The Combination of P-BFT and RAFT: A New Approach to Building networks that Provide Reliability and security  23rd
The Combination of P-BFT and RAFT: A New Approach to Buildin...
收藏 引用
23rd international conference on Computational Science and its Applications (ICCSA)
作者: Bogdanov, Alexander Shchegoleva, Nadezhda Khvatov, Valery Dik, Gennady Kiyamov, Jasur Dik, Aleksandr St Petersburg Univ St Petersburg Russia St Petersburg State Marine Tech Univ St Petersburg Russia DGT Technol AG Toronto ON Canada St Petersburg LLC Syst Technol St Petersburg Russia
The article considers two data processing algorithms in distributed systems: P-BFT and Raft. Both algorithms are designed to ensure data consistency and avoid conflicts in distributed environments. However, they have ... 详细信息
来源: 评论
A Mutual Intrusion Detection System for MANET to Address DDoS attacks using Data Mining Techniques  2
A Mutual Intrusion Detection System for MANET to Address DDo...
收藏 引用
2nd international conference on Sustainable Computing and Data Communication systems, ICSCDS 2023
作者: Bala, K. Renjith, P.N. Latha, M. Santhanalakshmi, S.T. School of Computing Bharath Institute of Higher Education and Research Department of Computer Science and Engineering Tamilnadu Chennai600073 India Department of Computer Science and Engineering VIT Chennai Campus Tamilnadu Chennai600127 India Srm Institute of Science and Technology Department of Information Technology Ramapuram Campus Tamilnadu Chennai600089 India Panimalar Engineering College Department of Computer Science and Engineering Tamil Nadu Chennai600123 India
A type of wireless communication network called a mobile ad hoc network (MANET) is composed of numerous flexible components that can move in any of the network's many directions. The Intrusion Detection System (ID... 详细信息
来源: 评论
A Review on Privacy Preservation in Cloud Computing and Recent Trends  7th
A Review on Privacy Preservation in Cloud Computing and Rece...
收藏 引用
7th international conference on Microelectronics and Telecommunication Engineering, ICMETE 2023
作者: Swain, Srutipragyan Pattnaik, Prasant Kumar Dash, Banchhanidhi School of Computer Engineering KIIT Deemed to Be University Bhubaneswar India
Cloud computing is a distributed computing architectural model that offers on-demand computing services via the Internet. It includes servers, computing resources, applications, data storage, development tools, etc. H... 详细信息
来源: 评论
Securing D2D Therapeutic Hiking Group in 5G networks for Partial Coverage Scenario  31
Securing D2D Therapeutic Hiking Group in 5G Networks for Par...
收藏 引用
31st international conference on Software, Telecommunications and computer networks, SoftCOM 2023
作者: Zemmoudj, Salah Bermad, Nabila University of Bejaia Research Unit LaMOS Faculty of Exact Sciences Bejaia06000 Algeria
Therapeutic hiking is a popular recreational activity that promotes physical exercise, nature exposure, and mental well-being. The potential of Device-to-Device (D2D) communication in 5G networks to enhance group comm... 详细信息
来源: 评论
Secure Authentication of IoT Devices Using Upgradable Smart Contract and Fog-Blockchain Technology  7th
Secure Authentication of IoT Devices Using Upgradable Smart ...
收藏 引用
7th international conference on Data Management, Analytics and Innovation, ICDMAI 2023
作者: Dinde, Shital H. Shirgave, S.K. Department of Technology Shivaji University Maharashtra Kolhapur India Department of Computer Science and Engineering DKTE’s Textile and Engineering Institute Maharashtra Ichalkaranji India
There are many new challenges related to the security of the Internet of Things networks due to the rapid growth of the technology. One of the main challenges is device security and authentication. Due to their limite... 详细信息
来源: 评论
Federated Learning in Malware Detection  28
Federated Learning in Malware Detection
收藏 引用
28th IEEE international conference on Emerging Technologies and Factory Automation, ETFA 2023
作者: Serpanos, Dimitrios Xenos, Georgios University of Patras Computer Technology Institute and Press DIOPHANTUS Dept. of Electrical and Computer Engineering Patras Greece University of Patras Campus Computer Technology Institute and Press DIOPHANTUS Patras Greece
Malware detection constitutes a fundamental step in safe and secure computational systems, including industrial systems and the Internet of Things (IoT). Modern malware detection is based on machine learning methods t... 详细信息
来源: 评论
Shaping the Future of Mobile Edge Computing with Innovative Architectures and Designs for Web3.0 over 5G/6G networks  13
Shaping the Future of Mobile Edge Computing with Innovative ...
收藏 引用
13th IEEE international conference on Communication systems and Network Technologies, CSNT 2024
作者: Malviya, Ashwini Lora, Chandra Prakash Kannagi, A. Atlas SkillTech University Department of UGDX Maharashtra Mumbai India Vivekananda Global University Department of Chemistry Jaipur India Department of Computer Science and Information Technology Bangalore India
Web3.0 apps, with their emphasis on decentralization, real-time processing, and low latency, hold the key to MEC's bright future. This calls for an all-encompassing, future-oriented strategy in MEC architecture an... 详细信息
来源: 评论