咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是321-330 订阅
排序:
Optimizing Energy Management and Load Balancing Through AI-Driven Quantum Approximate Optimization  4
Optimizing Energy Management and Load Balancing Through AI-D...
收藏 引用
4th IEEE international conference on Mobile networks and Wireless Communications, ICMNWC 2024
作者: Manjunath Kamath, K. Manasa, M. Anitha, B.S. Mahadevi Tlajiya, Falguni Chavan, Sangramjit Department of Cyber Security Karkala India Brindavan College of Engineering Department of Artificial Intelligence and Machine Learning Bengaluru India Sarada Vilas College Department of Computer Science Mysuru India Parul institute of Engineering and Technology Parul University Department of Electrical Engineering Gujarat India Pune India
The integration of Quantum Approximate Optimization Algorithm (QAOA) and Quantum Annealing (QA) offers a promising approach to addressing energy management and load balancing challenges in modern power systems. This s... 详细信息
来源: 评论
Deployment of Co-operative Farming Ecosystems Using Blockchain  22nd
Deployment of Co-operative Farming Ecosystems Using Blockcha...
收藏 引用
22nd international conference on Hybrid Intelligent systems, HIS 2022 and the 18th international conference on Information Assurance and security, IAS 2022
作者: Mahapatra, Aishwarya Gupta, Pranav Swarnkar, Latika Gupta, Deeya Kar, Jayaprakash Centre for Cryptography Cyber Security and Digital Forensics Department of Computer Science & Engineering Department of Communication & Computer Engineering The LNM Institute of Information Technology Jaipur India
Blockchain has helped us in designing and developing decentralised distributed systems. This, in turn, has proved to be quite beneficial for various industries grappling with problems regarding a centralised system. S... 详细信息
来源: 评论
Simulation of distributed Denial of Service Attack Against Ethereum Smart Contract on the Blockchain
Simulation of Distributed Denial of Service Attack Against E...
收藏 引用
international conference on computer Vision and Internet of Things 2023, ICCVIoT 2023
作者: Jeyakkannan, N. Subathra, G. Karthika, R. Lavanya, A. Kirupanithi, Nancy Rathinam Technical Campus Coimbatore India Sathyabama Institute of Science and Technology Chennai India
The perception and functional infrastructure of smart networks are changing as a result of the advent of blockchain technology and the proliferation of IoT-driven devices. Deploying Ethereum's smart contracts, the... 详细信息
来源: 评论
hcaPCG: A Heterogeneous and communication-avoid PCG with Jacobi preconditioner on SW26010-Pro architecture  29
hcaPCG: A Heterogeneous and communication-avoid PCG with Jac...
收藏 引用
29th IEEE international conference on Parallel and distributed systems, ICPADS 2023
作者: Tian, Min Liu, Yue Wang, Li Chen, Yanyan Liu, Qi Pan, Jingshan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks China Jinan Institute of Supercomputing Technology Jinan Key Laboratory of High Performance Computing China
Due to its efficiency and versatility, the preconditioned conjugate gradient algorithm has long been a staple in the realm of iterative linear system solvers. In this paper, we proposed an optimized preconditioned con... 详细信息
来源: 评论
Design of a Method for Setting IoT security Standards in Smart Cities  18th
Design of a Method for Setting IoT Security Standards in Sma...
收藏 引用
18th international conference on Mobile Web and Intelligent Information systems (MobiWIS)
作者: Svecova, Hana Univ Hradec Kralove Fac Management & Informat Rokitanskeho 62 Hradec Kralove 50003 Czech Republic
Legal norms of international standards have so far been developed inconsistently and non-comprehensively. Cities, municipalities, regional self-governments or state security forces have no support in legislation or in... 详细信息
来源: 评论
An Exploration of Evaluating the Performance of Malware Detection in the Cloud Environment
An Exploration of Evaluating the Performance of Malware Dete...
收藏 引用
2023 international conference on computer Communication and Informatics, ICCCI 2023
作者: Kaipu, Charan Nivas Reddy Karthik, Gopu Umadevi, Konala Sree Koushik, Koneru Kamal Pavan Kumar, T. Kavitha, S. Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Guntur India
Numerous businesses now adopt cloud computing, putting their server, storage, and application resources on a network in the cloud somewhere online. Data from the user is stored on cloud at a low price, making cloud co... 详细信息
来源: 评论
RPA-Code for Secure Binary Sequence Generation from Graph-Based Scanning  7
RPA-Code for Secure Binary Sequence Generation from Graph-Ba...
收藏 引用
7th international conference on Future networks and distributed systems, ICFNDS 2023
作者: Bounceur, Ahcene Hammoudeh, Mohammad Hassine, Jameleddine Bezoui, Madani Ahmed, Adel Fadhl Felemban, Muhamad Kfupm Information And Computer Science Department Dhahran Saudi Arabia Cesi Lineact France
This article introduces a novel method for generating random binary sequences from Random Polar Angles (RPA). These sequences can be derived from an image, akin to QR-Codes, making them suitable for cryptographic appl... 详细信息
来源: 评论
Machine Learning for Cloud-Based DDoS Attack Detection: A Comprehensive Algorithmic Evaluation  14
Machine Learning for Cloud-Based DDoS Attack Detection: A Co...
收藏 引用
14th international conference on Cloud Computing, Data Science and Engineering, Confluence 2024
作者: Naithani, Anukriti Singh, Shailendra Narayan Kant Singh, Krishna Kumar, Sushil Computer Science and Engineering Aset Amity University Noida India Computer Science and Engineering Nit Kurukshetra India
distributed denial of service attacks, in the recent times, have become a critical threat to not only private server connections but also meta scale cloud computing environments. This research paper furnishes a detail... 详细信息
来源: 评论
Enhancements to ODXT SSE Scheme: Algorithm Optimization and Leakage Suppression
Enhancements to ODXT SSE Scheme: Algorithm Optimization and ...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Prathit Aswar Syed Taqi Ali Dept. of Computer Science and Engineering Visvesvaraya National Institute of Technology Nagpur India
A Dynamic SSE (Searchable symmetric encryption) scheme should support updates and keyword searches with outsourced symmetrically encrypted data while minimizing the amount of data revealed to the untrusted server. For... 详细信息
来源: 评论
Ensuring Data Protection Using Machine Learning Integrating with Blockchain Technology  10th
Ensuring Data Protection Using Machine Learning Integrating ...
收藏 引用
10th international conference on Innovations in computer Science and Engineering, ICICSE 2022
作者: Diwan, Princy Khandelwal, Brijesh Dewangan, Bhupesh Kumar Department of Computer Science and Engineering Amity School of Engineering Amity University Raipur India Department of Computer Science and Engineering School of Engineering O. P. Jindal University Raigarh496109 India
In recent years, the emergence of blockchain technology (blockchain) has become a singular, most tumultuous, and trending technology. The decentralized info in blockchain underscores information security and confident... 详细信息
来源: 评论