咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 87 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 5,104 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 496 篇 security
  • 355 篇 wireless sensor ...
  • 312 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 202 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 149 篇 cryptography
  • 147 篇 computer science
  • 142 篇 computational mo...
  • 142 篇 internet
  • 140 篇 data security

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...
  • 6 篇 the islamic univ...
  • 6 篇 graphic era deem...

作者

  • 9 篇 hammoudeh mohamm...
  • 9 篇 obaidat mohammad...
  • 8 篇 igor kotenko
  • 8 篇 eyas el-qawasmeh
  • 7 篇 yanmin zhu
  • 7 篇 barolli leonard
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 mohammad s. obai...
  • 6 篇 shahid raza
  • 6 篇 thiemo voigt
  • 6 篇 natrayan l
  • 6 篇 das sajal k.
  • 6 篇 mohammad hammoud...
  • 6 篇 keromytis angelo...
  • 5 篇 isaac woungang
  • 5 篇 ma jianfeng
  • 5 篇 lionel m. ni
  • 5 篇 wehrle klaus

语言

  • 4,987 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5104 条 记 录,以下是31-40 订阅
排序:
Implementation of Blockchain Technology to Enhance Data security for Cloud Computing  1
Implementation of Blockchain Technology to Enhance Data Secu...
收藏 引用
1st IEEE international conference on Advances in Computing, Communication and Networking, ICAC2N 2024
作者: Kumari, Poonam Singh, Meeta Manav Rachna International Institute of Research and Studies Department of Computer Science and Engineering Haryana Faridabad India
Cloud computing, the fastest-growing IT technology, offers flexibility and scalability with pay-per-use models, but it raises concerns about data security due to third-party storage and online accessibility. Effective... 详细信息
来源: 评论
The Virtual computer networks Lab: On the Design and Implementation of a Location Independent networks Laboratory in Higher Education  17
The Virtual Computer Networks Lab: On the Design and Impleme...
收藏 引用
17th international conference on computer Supported Education, CSEDU 2025
作者: Baun, Christian Kappes, Martin Cocos, Henry-Norbert Koch, Malte Petrozziello, Maurizio Department of Computer Science and Engineerung Frankfurt University of Applied Sciences Nibelungeplatz 1 Frankfurt am MainD-60318 Germany
This paper describes a novel virtual platform for university teaching, which in particular allows the creation and use of complex IT infrastructures even for non-experts. Until now, complex network infrastructures in ... 详细信息
来源: 评论
Comparative Analysis of 5G security Mechanisms  6
Comparative Analysis of 5G Security Mechanisms
收藏 引用
6th international conference on Information systems and computer networks, ISCON 2023
作者: Sachdeva, Tanya Kumar, Siddhant Diwakar, Manoj Singh, Prabhishek Pandey, Neeraj Kumar Choudhary, Savita Graphic Era Deemed to Be University Dehradun India Bennett University School of Computer Science Engineering and Technology Greater Noida India Dit University School of Computing Dehradun India Sir M. Visvesvaraya Institute of Technology Bengaluru India
As networks continue to expand, they become increasingly heterogeneous, accommodating a diverse range of devices, from sensors and IoT to clients and servers. This ecosystem is highly distributed, with network facilit... 详细信息
来源: 评论
Generating Synthetic Tabular Data for DDoS Detection Using Generative Models  22
Generating Synthetic Tabular Data for DDoS Detection Using G...
收藏 引用
IEEE 22nd international conference on Trust, security and Privacy in Computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Saka, Samed Al-Ataby, Ali Selis, Valerio Univ Liverpool Dept Elect Engn & Elect Liverpool Merseyside England
distributed denial-of-service (DDoS) attacks are a type of cyber attack that overwhelms a target server, service or network with a flood of malicious traffic, making it unavailable to legitimate users. These attacks h... 详细信息
来源: 评论
Comprehensive Strategies for Optimizing Health Policy Outcomes: Integrating Data Workforce Capacities, and Mental Health Support
Comprehensive Strategies for Optimizing Health Policy Outcom...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Aruna, S. Basavaraj, G.N. Usha, B.A. Mohan, B.A. Vani, B.A. Bms Institute of Technology and Management Department of Cyber Security Bengaluru India Bms Institute of Technology and Management Department of Information Science and Engineering Bengaluru India Sri Krishna Institute of Technology Department of Information Science and Engineering Bengaluru India
The study assesses health policy and health systems. performance with emphasis on the health workforce and use of Big Data Analytics (BDA) for strengthening health systems. Some Issues for which it raises concern are ... 详细信息
来源: 评论
distributed 5G distribution network differential protection scheme based on 'State Grid Core' lightweight encryption  8
Distributed 5G distribution network differential protection ...
收藏 引用
8th international conference on Electrical, Mechanical and computer Engineering, ICEMCE 2024
作者: Wang, Jinshuai Chen, Mengqi Guo, Guangming Wang, Rining State Grid Information and Communication Industry Group Co Ltd. Beijing China
In order to enhance the safe and stable operation capability of distribution networks with a large number of distributed power sources connected, research on differential protection for distribution networks is consta... 详细信息
来源: 评论
Secure Remote Access to Local Network with distributed Tunnel Management
Secure Remote Access to Local Network with Distributed Tunne...
收藏 引用
2024 international conference on Advances in Data Engineering and Intelligent Computing systems, ADICS 2024
作者: Priyan Kishore, M.S. Chandana Sathwika, U. Malarvel, Muthukumaran Hindustan Institute Of Technology And Science Department Of Computer Science And Engineering Chennai India
The proliferation of distributed networks and the increasing demand for remote collaboration and maintenance have highlighted the need for secure and controlled remote access solutions. This paper presents a novel app... 详细信息
来源: 评论
Deep Learning for Enhanced Spectrum Sensing in Cognitive Radio networks with Blockchain-based security  3
Deep Learning for Enhanced Spectrum Sensing in Cognitive Rad...
收藏 引用
3rd IEEE international conference on Blockchain and distributed systems security, ICBDS 2024
作者: Solanki, Surendra Brahma, Banalaxmi Manipal University Jaipur Department of Artificial Intelligence & Machine Learning Rajasthan Jaipur India Dr. B. R Ambedkar National Institute of Technology Department of Computer Science and Engineering Punjab Jalandhar India
The growing need for wireless communication requires the optimum use of spectrum. Cognitive Radio (CR) technology enables the utilization of unused frequency channels through the identification and exploitation of the... 详细信息
来源: 评论
6G-SECUREIDS: Blockchain-Enhanced Secure Knowledge Transfer for distributed Intrusion Detection systems in Advanced networks  6
6G-SECUREIDS: Blockchain-Enhanced Secure Knowledge Transfer ...
收藏 引用
6th international conference on Networking and Advanced systems, ICNAS 2023
作者: Sakraoui, Sabrina Derdour, Makhlouf Ahmim, Ahmed Badji Mokhtar Annaba University Networks and Systems Laboratory Department of Computer Science Annaba Algeria Oum El Bouaghi University Networks and Systems Laboratory Department of Computer Science Oum El Bouaghi Algeria Mohamed-Cherif Messaadia University Networks and Systems Laboratory Dpt. of Mathematics and Computer Science Souk Ahras Algeria
As the development of wireless networks advances towards the deployment of 6G technology, ensuring robust security measures becomes crucial. In this paper, we propose 6G-SECUREIDS, a novel intrusion detection system d... 详细信息
来源: 评论
Securing Mobile Adhoc Network with Quantum Key Distribution: An Experimental Analysis  4
Securing Mobile Adhoc Network with Quantum Key Distribution:...
收藏 引用
4th international conference on Sustainable Expert systems, ICSES 2024
作者: Thapa, Sneha Bandyopadhyay, Anjan Gourisaria, Mahendra Kumar Singh, Satyendr Patra, Sudhansu Shekhar School of Computer Engineering Kalinga Institute of Industrial Technology Odisha Bhubaneswar India Bml Munjal University Computer Science & Engineering Department Gurugram India
Mobile adhoc networks (MANETs) are characterized by their dynamic and decentralized nature, making them inherently vulnerable to security threats. This paper proposes a novel security framework that integrates Quantum... 详细信息
来源: 评论