咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是331-340 订阅
排序:
Eclipse Attack Defense Method Based on distributed Storage and Reference Value System  23
Eclipse Attack Defense Method Based on Distributed Storage a...
收藏 引用
23rd IEEE international conference on Communication Technology, ICCT 2023
作者: Li, Lin Fu, Yiming Wang, Tao Zhao, Haili Mi, Rongxin Liu, Zhicheng Chen, Zixuan Feng, Hao Xiao, Yvchi National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China School of Information and Communication Engineering Beijing Information Science and Technology University Beijing China Changan Communication Technology Co. Ltd Beijing China
This paper proposes a blockchain protection method based on distributed storage and reference value systems to prevent solar eclipse attacks in blockchain networks. Despite the inherent reliability and security provid... 详细信息
来源: 评论
Influence of Access Points’ Height and High Signal Relation in WLAN Fingerprinting-Based Indoor Positioning systems’ Accuracy  1
收藏 引用
26th international conference on distributed computer and Communication networks: Control, Computation, Communications, DCCN 2023
作者: Nicholaus, Mrindoko R. Ruambo, Francis A. Masanga, Elijah E. Muthanna, Mohammed Saleh Ali Lashchev, Andrei Computer Science and Engineering Department College of Information and Communication Technology Mbeya University of Science and Technology 131 Mbeya Tanzania United Republic of Information Systems and Technology Department College of Information and Communication Technology Mbeya University of Science and Technology 131 Mbeya Tanzania United Republic of School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Research and Development Department Aifrruis Laboratories Mbeya Tanzania United Republic of Institute of Computer Technologies and Information Security Southern Federal University Taganrog347922 Russia
Wireless Local Area Network (WLAN) Fingerprinting-based Indoor Positioning systems (IPS) offer several key advantages over other indoor positioning technologies, including cost-effectiveness with high accuracy and pas... 详细信息
来源: 评论
A Parallelizable Counterfactual Generation Method Based on Gradient Optimization  29
A Parallelizable Counterfactual Generation Method Based on G...
收藏 引用
29th IEEE international conference on Parallel and distributed systems, ICPADS 2023
作者: Ding, Haorun Jiang, Xuesong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China State Key Laboratory of High-end Server and Storage Technology Jinan China
Post-hoc explanations are important for people to understand the predictions of explanation models. One class of methods in post-hoc explanation is the generation of counterfactuals, where a hypothetical example is ob... 详细信息
来源: 评论
Multilingual Knowledge Graph Completion via Multimodal Decouple and Relation-based Ensemble Inference  29
Multilingual Knowledge Graph Completion via Multimodal Decou...
收藏 引用
29th IEEE international conference on Parallel and distributed systems, ICPADS 2023
作者: Liu, Xiaojing Jiang, Xuesong Yi, Fengge Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
The objective of Multimodal Knowledge Graph Completion (MKGC) is to forecast absent entities within a knowledge graph by leveraging additional textual and visual modalities. Existing studies commonly utilize a singula... 详细信息
来源: 评论
Machine Learning Approach for Mitigating security Threats in IoT Environment  5
Machine Learning Approach for Mitigating Security Threats in...
收藏 引用
5th international conference on Inventive Research in Computing Applications, ICIRCA 2023
作者: Saini, Harnit Bala, Saroj Ida, S.Jhansi Kumar, K. Suresh Swetha, Shankerpally Divyabarathi, P. Ajay Kumar Garg Engineering College Department of Cse Ghaziabad India Ajay Kumar Garg Engineering College Department of Mca Ghaziabad India R.M.K Engineering College Department of Computer Science and Business Systems Kavaraipettai India Kongu Engineering College Department of Cse Erode India Cvr College of Engineering Department of Information Technology Telangana India Bannari Amman Institute of Technology Department of Artificial Intelligence and Data Science Erode India
In today's world, a huge amount of data and information is transferred through wireless networks. The Internet of Things (IoT) is a complex network that consists of diverse sensors, devices, and things, which ofte... 详细信息
来源: 评论
Long-Distance Pipeline Intrusion Warning Based on Environment Embedding from distributed Optical Fiber Sensing  32nd
Long-Distance Pipeline Intrusion Warning Based on Environmen...
收藏 引用
32nd international conference on Artificial Neural networks (ICANN)
作者: Zhu, Chengyuan Pu, Yanyun Lyu, Zhuoling Qian, Jiren Yang, Kaixiang Zhejiang Univ Hangzhou 310007 Zhejiang Peoples R China Zhejiang Univ Huzhou Inst Huzhou 313000 Zhejiang Peoples R China Zhejiang Zheneng Nat Gas Operat Co Ltd Hangzhou Peoples R China
Pipeline is one of the most important transportation modes of oil and gas. However, it is different from the single-scene environments in fields such as security and high-speed railway, as the environment along the le... 详细信息
来源: 评论
Multiple-Round Aggregation of Abstract Semantics for Secure Heterogeneous Federated Learning  24th
Multiple-Round Aggregation of Abstract Semantics for Secur...
收藏 引用
24th international conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Zhang, Jiao Li, Xiong Liang, Wei School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
Federated Learning (FL) provides a valuable framework that allows for the collaborative training of models across distributed networks while maintaining the privacy of the data involved. The concept of secure aggregat... 详细信息
来源: 评论
Network and System security - 17th international conference, NSS 2023, Proceedings
Network and System Security - 17th International Conference,...
收藏 引用
Network and System security - 17th international conference, NSS 2023, Proceedings
The proceedings contain 21 papers. The special focus in this conference is on Network and System security. The topics include: Resilience of Blockchain Overlay networks;t3E: A Practical Solution to Trusted T...
来源: 评论
Towards a Resilient Multi-Agent Controller: Securing and Mitigating Overhead in Tactical SDN  11
Towards a Resilient Multi-Agent Controller: Securing and Mit...
收藏 引用
11th IEEE international conference on Software Defined systems, SDS 2024
作者: Rettore, Paulo H. L. Zisner, Philipp Lawisch, Marcio Kloth, Sean De Freitas, Edison Pignaton Sevenich, Peter Federal University of Rio Grande Do Aul Porto Alegre Brazil Bonn Germany University of Bonn Institute of Computer Science Bonn Germany
This study proposes a resilient multi-agent controller for Software-defined Tactical networks (SDTNs) to ensure both secure and available control plane communication. The methodology consists of a Cyber Defense Agent ... 详细信息
来源: 评论
25th international Symposium on Stabilization, Safety, and security of distributed systems, SSS 2023
25th International Symposium on Stabilization, Safety, and S...
收藏 引用
25th international Symposium on Stabilization, Safety, and security of distributed systems, SSS 2023
The proceedings contain 44 papers. The special focus in this conference is on international Symposium on Stabilization,Safety, and security of distributed systems. The topics include: Improved Paths to Stability ...
来源: 评论