咨询与建议

限定检索结果

文献类型

  • 4,982 篇 会议
  • 280 册 图书
  • 89 篇 期刊文献

馆藏范围

  • 5,351 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,876 篇 工学
    • 2,567 篇 计算机科学与技术...
    • 1,716 篇 软件工程
    • 978 篇 信息与通信工程
    • 373 篇 电气工程
    • 304 篇 控制科学与工程
    • 183 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 121 篇 电子科学与技术(可...
    • 121 篇 安全科学与工程
    • 112 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 44 篇 交通运输工程
  • 615 篇 理学
    • 368 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 101 篇 统计学(可授理学、...
    • 85 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 185 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 240 篇 法学
    • 165 篇 法学
    • 81 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 500 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,230 篇 英文
  • 90 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5351 条 记 录,以下是31-40 订阅
排序:
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer security, ESORICS 2024
19th International Workshop on Data Privacy Management, DPM ...
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer security, ESORICS 2024
The proceedings contain 33 papers. The special focus in this conference is on Data Privacy Management. The topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
来源: 评论
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer security, ESORICS 2024
19th International Workshop on Data Privacy Management, DPM ...
收藏 引用
19th international Workshop on Data Privacy Management, DPM 2024, 8th international Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the security of Industrial Control systems and of Cyber-Physical systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in computer security, ESORICS 2024
The proceedings contain 33 papers. The special focus in this conference is on Data Privacy Management. The topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
来源: 评论
DDoS Attacks: Detection Techniques, Challenges, and Modern Practices
DDoS Attacks: Detection Techniques, Challenges, and Modern P...
收藏 引用
2025 IEEE international Students' conference on Electrical, Electronics and computer Science, SCEECS 2025
作者: Redekar, Ramesh Bharati, Rajesh Dr. D. Y. Patil Institute of Technology Department of Computer Engineering Pimpri Pune India
Internet, one of the essential components of today's civilization, serves numerous purposes for individuals, businesses, and society. However, its extensive use has sparked concerns, especially regarding privacy a... 详细信息
来源: 评论
UARC:Unsupervised Anomalous Traffic Detection with Improved U-Shaped Autoencoder and RetNet Based Multi-clustering  26th
UARC:Unsupervised Anomalous Traffic Detection with Improved ...
收藏 引用
26th international conference on Information and Communications security, ICICS 2024
作者: Xie, Yunyang Chen, Kai Li, Shenghui Li, Bingqian Zhang, Ning Hubei Key Laboratory of Distributed System Security Hubei Engin eering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University Technology Wuhan430074 China
With the ongoing advancement of deep learning, modern network intrusion detection systems increasingly favor utilizing deep learning networks to improve their ability to learn traffic characteristics. To address the c... 详细信息
来源: 评论
Internet of Things Applicable Authentication and Authorization Based on a Two-Layer Blockchain Approach
Internet of Things Applicable Authentication and Authoriza...
收藏 引用
international conference on Power Engineering and Intelligent systems, PEIS 2024
作者: Kothari, Rakshit Jain, Kalpana Choudhary, Naveen Department of Computer Science and Engineering College of Technology and Engineering Maharana Pratap University of Agriculture and Technology Udaipur India
The Internet of Things (IoT) connects billions of devices and generates massive amounts of data. However, IoT systems face major security challenges, especially regarding authentication and authorization. Centralized ... 详细信息
来源: 评论
Application of Hyperledger Blockchain Technology to Logistics Supply Chain with IoT  4
Application of Hyperledger Blockchain Technology to Logistic...
收藏 引用
4th international conference on Evolutionary Computing and Mobile Sustainable networks, ICECMSN 2024
作者: Sayar, Ahmet Kurtbas, Muhammet Cuneyd Sancaktar, Caglayan Kabak, Rana Dudu Cakmak, Sukru Department of Computer Engineering Kocaeli University Kabaoglu Baki Komsuoglu Avenue No:515 Umuttepe Kocaeli İzmit41010 Turkey Atez Software Technologies R&D Center Skyland B Blok No: 4B İstanbul Turkey
Product movement tracking stands as a pivotal aspect of logistics operations. The ever-expanding application of IoT technologies holds significant potential to enhance product tracking in logistics. However, the rapid... 详细信息
来源: 评论
distributed Denial of Service Attack Detection by Machine Learning Techniques  22
Distributed Denial of Service Attack Detection by Machine Le...
收藏 引用
22nd international Learning and Technology conference, L and T 2025
作者: Jewani, Varkha K. Ajmire, Prafulla E. Atique, Mohd. Sharma, Bhisham Dhaou, Imed Ben Awadhesh Chaurasia, Suhashini Sant Gadge Baba Amravati University Amravati India Chitkara University Centre of Research Impact and Outcome Punjab Rajpura140401 India Dar Al-Hekma University Hekma School of Engineering Computing and Design Department of Computer Science Jeddah Saudi Arabia RTM Nagpur University Department of Computer Science Nagpur India
The exponential expansion of computer networks and the internet makes it clear that there is a chance of being attacked and harmed. In the meantime, one of the most crucial defensive measures against the more complex ... 详细信息
来源: 评论
Virtual Collaboration, Organizations, and networks (VCONs)  58
Virtual Collaboration, Organizations, and Networks (VCONs)
收藏 引用
58th Hawaii international conference on System Sciences, HICSS 2025
作者: Nordbäck, Emma Blomqvist, Kirsimarja Lasfer, Assia Hekkala, Riitta Hanken School of Economics Finland LUT Business School Finland Université Laval Canada Aalto University Finland
This minitrack for HICSS-58 highlights the historical development and continued importance of geographically distributed collaboration and virtual work in organizations and networks. In recent years, the practice has ... 详细信息
来源: 评论
Enhancing Healthcare Recommendations for Special-Need Patients Using Deep Learning and Blockchain security  15th
Enhancing Healthcare Recommendations for Special-Need Patien...
收藏 引用
15th international conference on Intelligent Computing and Networking, IC-ICN 2024
作者: Mudhafar, Mustafa Raparthi, Mohan Thota, Vijayakumar Sivakumar, B.N. Degadwala, Sheshang Department of Medical Physics College of Applied Medical Sciences University of Kerbala Karbala56001 Iraq Alphabet Life Science DallasTX75063 United States NSB Business School Bangalore University Bangalore India Department of Computer Engineering Sigma University Gujarat Vadodara India
Special needs patients deserve increasingly specialised and secure healthcare supervision as the healthcare environment evolves. Our ground-breaking approach combines deep learning and blockchain security to enhance h... 详细信息
来源: 评论
Federated Clustering Defense: Mitigating Data Exposure in Collaborative Learning
Federated Clustering Defense: Mitigating Data Exposure in Co...
收藏 引用
2025 international conference on Emerging Technologies for Intelligent systems, ETIS 2025
作者: Radhakrishnan, Anuja Krishna, Sathya Bama Sathyabhama Institute of Science & Technology Department of Computer Science and Engineering Chennai India
The development of intelligent industrial applications is being driven globally by advancements in the next generation of Internet of Things (IoT) technologies. At the same time, artificial intelligence (AI) technolog... 详细信息
来源: 评论