咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,231 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5348 条 记 录,以下是21-30 订阅
排序:
Improving Accuracy in Network Intrusion Detection via Machine Learning Algorithms: An In-Depth Examination
Improving Accuracy in Network Intrusion Detection via Machin...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Suriya Prakash, J. Trishlaa, S. Soniya, R. Lakshmanan, V. Kiran, S. Department of Cse Ramnagara India Rajarajeshwari College of Engineering Department of Artificial Intelligence and Machine Learning Bengaluru India Sri Eshwar College of Engineering Department of Computer Science and Engineering Coimbatore India Nitte Meenakshi Institute of Technology Department of Mathematics Bengaluru India
Intrusion detection is essential for securing computer networks by monitoring and analyzing activity to detect and respond to unauthorized access and malicious behavior. By examining network traffic and system logs, i... 详细信息
来源: 评论
Enhanced Hybrid Deep Learning Model for distributed Denial of Service Attack Detection in IoT Environments
Enhanced Hybrid Deep Learning Model for Distributed Denial o...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Sharmila Kumari, N. Vimala, H.S. Pruthvi, C.N. Shreyas, J. Uvce Dept. of Cse Bengaluru India Dayananda Sagar College of Engineering Dept. of Cse Bengaluru India Manipal Academy of Higher Education Dept. of Information Technology Manipal Bengaluru India
security concerns have grown significantly with the proliferation of Internet of Things (IoT) devices, particularly in light of distributed Denial of Service (DDoS) attacks. Network resources may be overloaded by thes... 详细信息
来源: 评论
Detecting Cyberattacks to Federated Learning on Software-Defined networks  15th
Detecting Cyberattacks to Federated Learning on Software-Def...
收藏 引用
15th international conference on Management of Digital Ecosystems (MEDES)
作者: Babbar, Himanshi Rani, Shalli Singh, Aman Gianini, Gabriele Chitkara Univ Chitkara Univ Inst Engn & Technol Rajpura 140401 Punjab India Univ Europea Atlantico Santander 39011 Spain Univ Int Iberoamer Arecibo PR 00613 USA Univ Int Iberoamer Campeche 24560 Mexico Univ Milan Via Celoria 18 I-20133 Milan Italy
Federated learning is a distributed machine-learning technique that enables multiple devices to learn a shared model while keeping their local data private. The approach poses security challenges, such as model integr... 详细信息
来源: 评论
Federated Learning-Based Solution for DDoS Detection in SDN
Federated Learning-Based Solution for DDoS Detection in SDN
收藏 引用
international conference on Computing, Networking and Communications (ICNC)
作者: Mateus, Jovita Zodi, Guy-Alain Lusilao Bagula, Antoine UWC Dept Comp Sci Cape Town South Africa NUST Dept Comp Sci Windhoek Namibia
One major threat to Software Defined Network (SDN) environments and other computing systems is distributed Denial of Service (DDoS) attacks. For the longest time, conventional Machine Learning (ML) techniques have bee... 详细信息
来源: 评论
Safeguarding E Commerce and Preventing Financial Fraud with AdaBoost CNN Cybersecurity Approach
Safeguarding E Commerce and Preventing Financial Fraud with ...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Malathi, V. Shammi, L. Unni, Manu Vasudevan Babulal Nadaf, Akabarsaheb Devi, S. Rukmani Thangam, E. Dr. N.G.P Arts and Science College Department of Computer Science with Cyber Security Coimbatore India East Point College of Engineering and Technology Deptartment of Computer Science Bengaluru India St. Claret College Autonomous Department of Management Bangalore India Abhijit Kadam Institute of Management Ame Social Sciences Solapur India Saveetha College of Liberal Arts and Sciences Simats Deemed to Be University Department of Computer Science Chennai India Ramco Institute of Technology Department of Eee Rajapalayam India
Examining the cyber security risks faced by companies and e-commerce platforms is the focus of this research. People in the corporate world and those in academia are curious about the technology applications of e-comm... 详细信息
来源: 评论
Fortifying Network security via Intelligent Traffic Analysis with Hybrid IDS
Fortifying Network Security via Intelligent Traffic Analysis...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Afreen, Syed Kranthi, S. Raasheed, Abdul Velagapudi Ramakrishna Siddhartha Engineering College Dept. of Information Technology Vijayawada India
With growth in technology, hacking and cyberattacks have increased hence the importance of network security. They also do not cease to invent new ways of penetrating the network, hence the need to install measures suc... 详细信息
来源: 评论
Next-Gen SDN security: Quantum Keying Meets AI Analytics
Next-Gen SDN Security: Quantum Keying Meets AI Analytics
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Virushabadoss, S. Anithaashri, T.P. Nivedha, M. Krishnan, S. Hari Karuppannan, Anand Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Dept. of Computer Science and Engineering Chennai India Arasu Engineering College Department of Electronics and Communication and Engineering Kumbakonam India Sanskrithi School of Engineering Department of Electronics and Communication and Engineering Puttaparthi India Gnanamani College of Technology Department of Electronics and Communication and Engineering Namakkal India
This paper suggests a complete security architecture that blends quantum key distribution (QKD) with cutting-edge machine learning methods to improve the Software-Defined Networking (SDN) control plane. By creating se... 详细信息
来源: 评论
AI based security in computer vision and machine learning algorithms for hand sign recognition  3
AI based Security in computer vision and machine learning al...
收藏 引用
3rd IEEE international conference on Blockchain and distributed systems security, ICBDS 2024
作者: Thorat, Nilesh N. Kulal, Nilesh M. Baburao, Khedekar Vilas Hirve, Sumit Arun Kolekar, Sachin Sangore, Rohidas Mit Art Design and Technology University Department of Computer Science and Engineering Pune India
In order to facilitate intuitive control and communication across a variety of areas, hand gesture recognition is an essential component of human-computer interaction systems. In this paper, a real-time hand gesture r... 详细信息
来源: 评论
Adaptive Defense Mechanisms Against Zero-Day Attacks in Wireless Sensor networks
Adaptive Defense Mechanisms Against Zero-Day Attacks in Wire...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Chaturvedi, Abhay Kukreti, Sanjeev Durga Bhavani, A. Nizampatnam, Venkata Naga Ravi Kiran Kaur, Davinder Natrayan, L. Gla University Department of Electronics & Communication Engineering Chaumuhan India Graphic Era Deemed to Be University Department of Computer Science & Engineering Dehradun India Bms Institute of Technology and Management Department of Computer Science and Engineering Bengaluru India Expert Network Security Engineer Acxiom Llc Department of Computer Networks AustinTX United States Symbiosis Law School Department of Law Pune India Saveetha School of Engineering Simats Department of Mechanical Engineering Kuthambakkam India
Important fields including healthcare, environmental monitoring, and military operations are seeing a rise in the use of wireless sensor networks (WSNs). But they are susceptible to complex cyber dangers, especially z... 详细信息
来源: 评论
Navigating IoT security Assessment: Current Methods, Challenges and Future Directions  14
Navigating IoT Security Assessment: Current Methods, Challen...
收藏 引用
14th international conference on Advanced computer Information Technologies, ACIT 2024
作者: Abdulhamid, Alhassan Kabir, Sohag Ghafir, Ibrahim Lei, Ci University of Bradford Faculty of Engineering and Digital Technologies Bradford United Kingdom
Rapid growth of Internet of Things (IoT) applications h as significantly transformed h uman interaction with technology, providing unprecedented convenience and connectivity in our daily lives. Securing a complex netw... 详细信息
来源: 评论