咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是381-390 订阅
排序:
Exploring Quantum Computing Use Cases for Critical National Infrastructures KFUPM - College of computer Science & Engineering  7
Exploring Quantum Computing Use Cases for Critical National ...
收藏 引用
7th international conference on Future networks and distributed systems, ICFNDS 2023
作者: Alghamdi, Maryah Alghamdi, Sara King Fahd University Of Petroleum And Minerals Saudi Arabia Aramco Cyberani Saudi Arabia
Quantum computing is one of the evolving fields within computer science. It leverages benefits from physics, mathematics, and quantum principles in order to develop a computer with capabilities not ever witnessed befo... 详细信息
来源: 评论
Integrity, Resilience and security of 5G Transport networks Based on SDN/NFV Technologies  24th
Integrity, Resilience and Security of 5G Transport Networks ...
收藏 引用
24th international conference on distributed computer and Communication networks, DCCN 2021
作者: Buzhin, I. Bessonov, M. Mironov, Y. Farkhadov, M.P. Moscow Technical University of Communications and Informatics Moscow Russia V.A. Trapeznikov Institute for Control Sciences of Russian Academy of Science Moscow Russia
5G networks are being actively implemented in many countries around the world. The goal of introducing technologies that make up the new standard is to reduce information transmission delays, increase transmission spe... 详细信息
来源: 评论
A Survey on Vehicular Ad hoc networks security Attacks and Countermeasures  6
A Survey on Vehicular Ad hoc Networks Security Attacks and C...
收藏 引用
6th international conference on Future networks and distributed systems, ICFNDS 2022
作者: Abuarqoub, Abdelrahman Alzu'Bi, Ahmad Hammoudeh, Mohammad Ahmad, Arslan Al-Shargabi, Bassam Cardiff School of Technologies Cardiff Metropolitan University Wales Cardiff United Kingdom Department of Computer Science Jordan University of Science and Technology Irbid22110 Jordan Department of Information and Computer Science King Fahd University of Petroleum and Minerals Saudi Arabia Faculty of Information Technology Middle East University Amman Jordan
Vehicular Ad hoc networks (VANETs), a subcategory of Mobile ad hoc networks (MANETs), is a promising approach that is now evolving, gaining attention and momentum. VANET consists of highly mobile nodes and roadside in... 详细信息
来源: 评论
Enhancing security Features in Wireless Sensor networks using AI based Deep Learning Methods
Enhancing Security Features in Wireless Sensor Networks usin...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Muhammad Puzhakkalaveettil M. Praveena Department of Computer Science Dr.S.N.S Rajalakshmi College of Arts and Science Coimbatore India
Wireless sensor networks (WSNs) are crucial for a wide range of applications. However, their open architecture and limited resources make them vulnerable to intrusion. Improve the security of WSNs by incorporating adv... 详细信息
来源: 评论
Novel Cyber Incident Management System for 5G-based Critical Infrastructures  12
Novel Cyber Incident Management System for 5G-based Critical...
收藏 引用
12th IEEE international conference on Intelligent Data Acquisition and Advanced Computing systems: Technology and Applications, IDAACS 2023
作者: Polozhentsev, Artem Gnatyuk, Sergiy Berdibayev, Rat Sydorenko, Viktoriia Zhyharevych, Oksana National Aviation University Kyiv Ukraine Yessenov University Aktau Kazakhstan State Scientific and Research Institute of Cybersecurity Technologies and Information Protection Kyiv Ukraine Almaty University of Power Energy and Telecommunication Almaty Kazakhstan Lesya Ukrainka Volyn National University Lutsk Ukraine
Modern critical infrastructure with diverse systems requires a security information and event management (SIEM) system for unified monitoring against cyber threats. This system collects log data, performs real-time an... 详细信息
来源: 评论
Lightweight Collaborative Inferencing for Real-Time Intrusion Detection in IoT networks  19
Lightweight Collaborative Inferencing for Real-Time Intrusio...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE international conference on Ubiquitous Intelligence and Computing, 2022 IEEE international conference on Autonomous and Trusted Vehicles conference, 22nd IEEE international conference on Scalable Computing and Communications, 2022 IEEE international conference on Digital Twin, 8th IEEE international conference on Privacy Computing and 2022 IEEE international conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Morales, Gabriel A. Xu, Jingye Zhu, Dakai Slavin, Rocky The University of Texas at San Antonio Department of Computer Science San AntonioTX United States
The security in Internet-of-Things (IoT) networks becomes increasingly important with the growing popularity of IoT devices and their wide applications (e.g., critical infrastructure monitoring). However, traditional ... 详细信息
来源: 评论
DDoS Detection and Prediction Techniques-A Survey
DDoS Detection and Prediction Techniques-A Survey
收藏 引用
2023 international conference on Computational Intelligence and Sustainable Engineering Solution, CISES 2023
作者: Goyal, Ashtha Matta, Priya Gautam, Pratiksha Graphic Era Deemed to Be University Graphic Era Hill University Department of Computer Science and Engineering Dehradun India Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India Hindustan College of Science and Technology Department of Computer Science and Engineering Mathura India
The distributed Denial of service (D-DoS) attack continues to attract excess of assiduity in the cyber security world, owing to the tremendous damage it may bring to an organization's assets. Consequently, as inte... 详细信息
来源: 评论
Efficient Intrusion Detection Model based on LSTM and RNN
Efficient Intrusion Detection Model based on LSTM and RNN
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: C. Valarmathi S. John Justin Thangaraj Department of CSE Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai India
Background: Consequently, there is an increase in network security vulnerabilities, making it difficult for network managers to protect their networks against all types of cyberattacks. Numerous methods for detecting ... 详细信息
来源: 评论
WiCHORD: A Chord Protocol Application on P2P LoRa Wireless Sensor networks  13
WiCHORD: A Chord Protocol Application on P2P LoRa Wireless S...
收藏 引用
13th international conference on Information, Intelligence, systems and Applications, IISA 2022
作者: Balatsouras, Christos-Panagiotis Karras, Aristeidis Karras, Christos Tsolis, Dimitrios Sioutas, Spyros Group Computer Engineering and Informatics Department Patras26504 Greece
On the modern era of Internet of Things (IoT) and Industry 4.0 there is a growing need for reliable wireless long range communications. LoRa is an emerging technology for effective long range communications which can ... 详细信息
来源: 评论
Federated Learning Approaches to Diverse Machine Learning Model: A Review  7th
Federated Learning Approaches to Diverse Machine Learning Mo...
收藏 引用
7th international conference on Information and Communication Technology for Intelligent systems, ICTIS 2023
作者: Sharma, Sunena Kumar, Sunil Department of Computer Science and Engineering Guru Jambheshwar University of Science and Technology Hisar125001 India
Federated learning is a distributed machine learning technique that allows several data owners to jointly train shared models without exchanging their confidentials data as the need for centralized. It has become incr... 详细信息
来源: 评论