咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是371-380 订阅
排序:
Optimized Biometric Authentication using MTCNN and Dynamic Signature Detection: A Unified Approach for Enhanced security
Optimized Biometric Authentication using MTCNN and Dynamic S...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Sunil S Harakannanavar G V. Jayasree Keerthana Shubha K Srushti S. K Department of Electronics and Communication Engineering Nitte Meenakshi Institute of Technology Bangalore India
Automatic photo and signature detection using MTCNN (Multi-task Cascaded Convolutional networks) is a vital component in various applications such as identity verification and document processing. MTCNN, initially des... 详细信息
来源: 评论
Ensuring Data security and Routing Efficiency in Warehouse Sensor networks Using Wireless Blockchain Technology  11th
Ensuring Data Security and Routing Efficiency in Warehouse S...
收藏 引用
11th international conference on Intelligent Computing and Applications, ICRTC 2023
作者: Anitha Rajakumari, P. Karthick, S. Mahapatra, Rajendra Prasad Parwekar, Pritee Department of Computer Science and Engineering SRM Institute of Science and Technology Delhi-NCR Campus Ghaziabad India
The integration of wireless sensor networks (WSNs) and blockchain technology has gained significant attention in recent years due to its potential in addressing security and privacy concerns in various applications. I... 详细信息
来源: 评论
A Comparative Study of Neural networks Algorithms in Cyber-security to Detect Domain Generation Algorithms Based on Mixed Classes of Data
A Comparative Study of Neural Networks Algorithms in Cyber...
收藏 引用
international conference on Advanced Intelligent systems for Sustainable Development, AI2SD 2022
作者: Hassaoui, Mohamed Hanini, Mohamed El Kafhali, Said Hassan First University of Settat Settat Morocco
Domain Generation Algorithms (DGAs) are often used to generate huge amounts of domain names to maintain command and control (C2) between the infected computer and the master bot. Blacklist approaches become ineffectiv... 详细信息
来源: 评论
Optimization of Data Encryption Algorithms in Information Construction
Optimization of Data Encryption Algorithms in Information Co...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Shuai Zhu Yi You Bo Zhou Chuanting Chen Xueqin Yi Network Information Center Hankou University Wuhan China School of Computer Science and Technology Hankou University Wuhan China Library and Information Center Wuhan University of Engineering Science Wuhan China School of Music Hankou University Wuhan China Board Office Hankou University Wuhan China
Data encryption algorithms play a crucial role in information construction, effectively protecting data security. The problems in traditional research include a lack of targeting, a balance between efficiency and safe... 详细信息
来源: 评论
6G Enabled Smart IoT in Healthcare System: Prospect, Issues and Study Areas  1
6G Enabled Smart IoT in Healthcare System: Prospect, Issues ...
收藏 引用
1st international conference on Artificial Intelligence for Innovations in Healthcare Industries, ICAIIHI 2023
作者: Matre, Priti Vivek Kumbhare, Ashish Gedam, Ravi Sharma, Animesh Vaishnav, Naveen Kumar Naidu, Dileep Yashwantrao Chavan College of Engineering Dept. of Information Technology Maharashtra Nagpur India The Icfai University Faculty of Science and Technology Chhattisgarh Raipur India G H Raisoni University Department of Computer Science and Engineering Madhya Pradesh Saikheda India
The Internet of Medical Things, (IoMT) requires extensive and intelligent connection, enormous bandwidth, minimal latency, extremely high data rates, and enhanced healthcare experiences. In contrast to the current 5G ... 详细信息
来源: 评论
Intrusion Detection in Wireless Sensor networks using Machine Learning  4
Intrusion Detection in Wireless Sensor Networks using Machin...
收藏 引用
4th international conference on Evolutionary Computing and Mobile Sustainable networks, ICECMSN 2024
作者: Fares, Hajar Vibhute, Amol D. Mouniane, Yassine Bouijij, Habiba Equipe of Telecommunication and Detection Faculty of Science Abdelmalek Essaadi University Tetouan Morocco MH Pune411016 India Natural Resources and Sustainable Development Laboratory Faculty of Sciences Ibn Tofail University B.P 242 Kenitra Morocco ENSIAS SSLAB Mohammed v University in Rabat Rabat Morocco
Attackers are continuously enhancing their techniques to attack confidential data. Thus, the classical security solutions based on cryptography and older detection systems must be revised, especially for a network dat... 详细信息
来源: 评论
Sentences Similarity Model Based on Fusion of Semantic, Syntactic and Word Order Multi-Features  4
Sentences Similarity Model Based on Fusion of Semantic, Synt...
收藏 引用
4th international conference on Information Science, Parallel and distributed systems, ISPDS 2023
作者: Zhou, Ya Zhao, Ning Huang, Guimin Deng, Nanxiao Guo, Qingkai School of Computer Science and Information Security Guilin University of Electronic Technology Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China
In sentence similarity research methods, sentence similarity is often calculated from semantic aspects, however, the influence of other features is ignored. For example, the influence of sentence syntactic structure a... 详细信息
来源: 评论
A Robust Remote User Authentication Scheme for Supply Chain Management Using Blockchain Technology
A Robust Remote User Authentication Scheme for Supply Chain ...
收藏 引用
international conference on Data Science and Network Engineering, ICDSNE 2023
作者: Singh, Inderpal Singh, Balraj Rana, Arun Kumar School of Computer Science and Engineering Phagwara India Lovely Professional University Punjab Phagwara India Galgotia College of Engineering Uttar Pradesh Greater Noida India
For a company’s product life cycle to be faster, more efficient, and more effective, supply chain management (SCM) is critical. Nevertheless, present SCM systems must be improved to ensure genuine products and transa... 详细信息
来源: 评论
Decentralized Road Conditions Assessment for Smart Mobility Management in Abu Dhabi  19
Decentralized Road Conditions Assessment for Smart Mobility ...
收藏 引用
19th IEEE international Wireless Communications and Mobile Computing (IEEE IWCMC)
作者: Albasir, A. Ben-Othman, J. Zayed Univ Coll Technol Innovat CTI Dubai U Arab Emirates Univ Paris Saclay CNRS Cent Supelec Paris France Univ Sorbonne Paris Nord Villetaneuse France
Mobility management is crucial for urban planning, and accurate road condition information is necessary for safe and efficient transportation. In the context of this study, mobility refers to the quality of the road a... 详细信息
来源: 评论
Protecting Bitcoins Frequency Count Against Double-Spend Attacks  5
Protecting Bitcoins Frequency Count Against Double-Spend Att...
收藏 引用
5th international conference on Smart systems and Inventive Technology, ICSSIT 2023
作者: Nisha, M. Sharon Rajakumar, G. Jenifer, P. Benita, B. Department of Computer Science and Engineering Francis Xavier Engineering College Tamil Nadu Tirunelveli India Department of Electronics and Communication Engineering Francis Xavier Engineering College Tamil Nadu Tirunelveli India
Bitcoin is a distributed cryptocurrency that verifies transactions using the Proof-of-Work system. It is now being accepted as payment by an increasing number of establishments, particularly quick-service restaurants ... 详细信息
来源: 评论