咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 370 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 616 篇 理学
    • 370 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 40 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是391-400 订阅
排序:
19th international Symposium on distributed Computing and Artificial Intelligence, DCAI 2022
19th International Symposium on Distributed Computing and Ar...
收藏 引用
19th international Symposium on distributed Computing and Artificial Intelligence, DCAI 2022
The proceedings contain 22 papers. The special focus in this conference is on distributed Computing and Artificial Intelligence. The topics include: computer Vision: A Review on 3D Object Recognition;An IoUT-Base...
来源: 评论
A Batch-Service Queueing Assisted Blockchain System for Supply Chain Management
A Batch-Service Queueing Assisted Blockchain System for Supp...
收藏 引用
international conference on Data Science and Network Engineering, ICDSNE 2023
作者: Dash, Bibhuti Bhusan De, Utpal Chandra Pattnayak, Parthasarathi Satapathy, Rabinarayan Behera, Sibananda Patra, Sudhansu Shekhar School of Computer Applications KIIT Deemed to be University Bhubaneswar India Faculty of Emerging Technologies Sri Sri University Cuttack India Trident Academy of Creative Technology Bhubaneswar India
In recent years, blockchains have attracted a great deal of interest from researchers, engineers, and institutions. Additionally, the implementation of blockchains has begun to revitalisea large number of applications... 详细信息
来源: 评论
Detection and Analysis of DDoS Attack Using a Collaborative Network Monitoring Stack  16
Detection and Analysis of DDoS Attack Using a Collaborative ...
收藏 引用
16th international conference on security of Information and networks, SIN 2023
作者: Moosa, Muhammad Aashiq Vangujar, Apurva K. Mahajan, Dnyanesh Pramod National College of Ireland Department of Computing Dublin Ireland School of Computer Science It University College Cork Cork Ireland
In recent years, distributed Denial of Service (DDoS) attacks have become common and have evolved into a standard method of targeting entities. These attacks can be used to make money or to damage the network and syst... 详细信息
来源: 评论
Performance Evaluation of Consensus Algorithms for Permissioned Blockchain networks  14
Performance Evaluation of Consensus Algorithms for Permissio...
收藏 引用
14th international conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Kalwad, Triveni Aramani, Vinuta Attar, Needa Fatima Raikar, Neha Narayan, D.G. Pawar, Manjula Shettar, Pooja Kle Technological University Department of Computer Science and Engineering Hubballi India
The ever-evolving technological landscape demands systems that can ensure trust, security, transparency, and traceability. To meet these requirements, blockchain technology has emerged that uses decentralized ledgers ... 详细信息
来源: 评论
A Cutting-Edge Method on Big Data Analytics Recent Developments for Business Operations and security Management  6th
A Cutting-Edge Method on Big Data Analytics Recent Developme...
收藏 引用
6th international conference on Smart Computing and Informatics, SCI 2024
作者: Razzhivin, Oleg Anatolevich Ollanazarov, Bekmurod Davlatmuratovich Okagbue, Hilary Izuchukwu Andryushchenko, Iryna Evgenievna Department of Theory and Methods of Physical Culture and Life Safety of Elabuga Institute Kazan Federal University Kazan Russia Department of Tourism Urgench State University Urgench Uzbekistan Sydani Institute for Research and Innovation Sydani Group Abuja Nigeria Department of Mathematics Covenant University Ota Nigeria Khorezm University of Economics Urgench Uzbekistan Mamun University Khiva Uzbekistan Department of Finance Banking and Insurance National University "Zaporizhzhia Polytechnic" Zaporizhzhia Ukraine
The management of a corporation could be significantly enhanced by the use of big data. There has not been enough statistical investigation to determine the importance of large data in the malignancy of the highly fun... 详细信息
来源: 评论
Addressing Data Poisoning and Model Manipulation Risks using LLM Models in Web security
Addressing Data Poisoning and Model Manipulation Risks using...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Shraddha Pradipbhai Shah Aditya Vilas Deshpande School of Computer and Information Sciences University of the Cumberlands Kentucky USA
Data poisoning and model manipulation represent significant threats to cybersecurity, where adversaries intentionally inject malicious data into training sets, leading to compromised machine learning models. This stud... 详细信息
来源: 评论
Application of Deep Learning for Intrusion Detection and Cyber-Attack Detection Using Internet of Things networks
Application of Deep Learning for Intrusion Detection and Cyb...
收藏 引用
2023 international conference on Data Science and Network security, ICDSNS 2023
作者: Gautam, Anjali Rathare, Saloni Bhatnagar, Gunjan Ikhar, Sharyu Dari, Sukhvinder Singh Gupta, Varun Kumar School of Engineering and Technology K. R. Mangalam University Department of Computer Science and Engineering Haryana Gurugram India Invertis University Department of Law Uttar Pradesh Bareilly India School of Engineering and Computer Dev Bhoomi Uttarakhand University Uttarakhand India Viit Pune Department of Aids India Pune India School of Computer Science and Applications Iimt University Meerut India
The ability to deploy such systems throughout a region, or perhaps a nation, will increase as IoT infrastructure develops. Although Internet of Things (IoT) devices are capable of offering intelligent services, the ma... 详细信息
来源: 评论
Enhancing Multi-UAV Path Planning Efficiency with security through Integration of Priority-Based Ant Lion Optimization Algorithm  6
Enhancing Multi-UAV Path Planning Efficiency with Security t...
收藏 引用
6th international conference on Next Generation Data-Driven networks, NGDN 2024
作者: Guan, Yunchong Sturdy So, Wei Zhi Peng, Su Zhang, Yihang Zhang, Yuanhao Wang, Yang Hakim, Fahreza Prima Abdullah, Mumtaz Zain Shenyang Aerospace University School of Computer Science Liaoning Shenyang China Haikou China
The research endeavors to revolutionize Multi-Robot systems (MRS) through a cutting-edge hybrid strategy, amalgamating Priority-Based Algorithms (PBA) and Ant Lion Optimization (ALO) algorithms. This innovative approa... 详细信息
来源: 评论
A Knowledge Graph-Based Deep Learning Framework for Efficient Content Similarity Search of Sustainable Development Goals Data
收藏 引用
Data Intelligence 2023年 第3期5卷 663-684页
作者: Irene Kilanioti George A.Papadopoulos School of Electrical and Computer Engineering National Technical University of Athens9 Heroon Polytechneiou St.Zografou Campus Athens15780Greece Department of Computer Science University of Cyprus1 University AvenueAglantziaCY-2109NicosiaCyprus
Sustainable development denotes the enhancement ofliving standards in the present without compromising future generations'*** Development Goals(SDGs)quantify the accomplishment of sustainable development and pave ... 详细信息
来源: 评论
Usability Comparison of Level E-Commerce Platform in Indonesia: A Case Study of Tokopedia, Bukalapak, and Shopee  1
收藏 引用
3rd international conference on Smart Computing and Cyber security—Strategic Foresight, security Challenges and Innovation, SMARTCYBER 2023
作者: Rosa, Sri Listia Kadir, Evizal Abdul Apriyani, Cici Evizal, Muhammad Fikri Department of Informatics Engineering Universitas Islam Riau Riau Pekanbaru28284 Indonesia Department of Computer Science and Information Engineering National Dong Hwa University Hualien County974 Taiwan
E-commerce is a common platform for trading in this era and used online platform where buyer and seller have met the transaction. Usability is the process of optimizing the interaction between the user and the system,... 详细信息
来源: 评论