咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是411-420 订阅
排序:
Securing Mobile Adhoc Network with Quantum Key Distribution: An Experimental Analysis
Securing Mobile Adhoc Network with Quantum Key Distribution:...
收藏 引用
Sustainable Expert systems (ICSES), international conference on
作者: Sneha Thapa Anjan Bandyopadhyay Mahendra Kumar Gourisaria Satyendr Singh Sudhansu Shekhar Patra School of Computer Engineering Kalinga Institute of Industrial Technology Bhubaneswar Odisha Computer Science & Engineering Department BML Munjal University Gurugram
Mobile adhoc networks (MANETs) are characterized by their dynamic and decentralized nature, making them inherently vulnerable to security threats. This paper proposes a novel security framework that integrates Quantum... 详细信息
来源: 评论
Enforcing Web security Constraints for LLM-driven Robot Agents for Online Transactions
Enforcing Web Security Constraints for LLM-driven Robot Agen...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Shraddha Pradipbhai Shah Aditya Vilas Deshpande School of Computer and Information Sciences University of the Cumberlands Kentucky USA
The integration of Large Language Models (LLMs) into autonomous robotic agents for conducting online transactions poses significant cybersecurity challenges. This study aims to enforce robust cybersecurity constraints... 详细信息
来源: 评论
UAV Aided Post Disaster Relief networks using Blockchain Technology: Challenges and Solutions
UAV Aided Post Disaster Relief Networks using Blockchain Tec...
收藏 引用
international conference on Parallel distributed and Grid Computing (PDGC)
作者: Balaram Pal Soumyajit Paul Ashok Kumar Turuk Munshi Mustafijur Rahaman Sanjeev Patel Dept. of Computer Science Engineering Bengal Institute of Technology Kolkata India Dept. of Computer Science Engineering GCECT Kolkata India Dept. of Computer Science Engineering National Institute of Technology Rourkela India
This paper investigates integrating blockchain technology into UAV-aided disaster relief networks (UDRNs). It addresses challenges such as inefficient resource coordination, security vulnerabilities in smart contracts... 详细信息
来源: 评论
Harris Corner Detection Algorithm based Long Short-Term Memory for Detecting distributed Denial of Service Anomalies in Software Defined networks
Harris Corner Detection Algorithm based Long Short-Term Memo...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Rashmi Cigiri Gotte Ranjith Kumar Haider Alabdeli Y.M. Mahaboob John S. Kaliappan Malla Reddy Engineering College for Women (UGC-Autonomous) Hyderabad India Department of Computer Science & Artificial Intelligence SR University Warangal India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of ECE Mahendra College of Engineering Salem India Department of Research and Development Lovely Professional University Phagwara India
Software-Defined Networking (SDN) is the innovative development in network technology with a number of attractive features, including management and flexibility. Despite these advantages, SDN was compromised by Distri... 详细信息
来源: 评论
Evaluation of Deep Neural Network Quality by CleanAI Coverage Metrics Library  17
Evaluation of Deep Neural Network Quality by CleanAI Coverag...
收藏 引用
17th international conference on INnovations in Intelligent systems and Applications, INISTA 2023
作者: Ayubi, Abdul Hannan Taskin, Furkan Caglar, Osman Asik, Sergen Baglum, Cem Yayan, Ugur Eskisehir Osmangazi University Computer Engineering Department Eskisehir Turkey Eskisehir Osmangazi University Software Engineering Department Eskisehir Turkey
The increasing use of AI-based systems in critical domains necessitates the assessment of their quality and reliability. However, there is a lack of readily available tools for analyzing metrics related to the structu... 详细信息
来源: 评论
Intrusion Detection System Using Ensemble Machine Learning in Cloud Environment  2nd
Intrusion Detection System Using Ensemble Machine Learning i...
收藏 引用
2nd international conference on Emerging Technologies and Intelligent systems, ICETIS 2022
作者: Manzoor, Saba Ahmad, Musheer Alhadawi, Hussam S. Department of Computer Engineering Jamia Millia Islamia New Delhi110025 India Department of Computer Techniques Engineering Dijlah University College Baghdad10011 Iraq College of Engineering University of Warith Al-Anbiyaa Karbala Iraq
Due to the expeditious evolution of advanced computing innovations, new organizational and operational strategies call for adoption. In the last few years, cloud computing has emerged and evolved as one such example t... 详细信息
来源: 评论
A Comparison of security Analysis Methods for Smart Contracts Built on the Ethereum Blockchain  3rd
A Comparison of Security Analysis Methods for Smart Contra...
收藏 引用
3rd international conference on Innovations in Computational Intelligence and computer Vision, ICICV 2022
作者: Kushwaha, Satpal Singh Joshi, Sandeep Manipal University Jaipur Jaipur India
Blockchain technology is one of the superior technologies of recent times. It is a decentralized distributed ledger to record transactions in an immutable way. Smart contracts are digital contracts, i.e., an auto exec... 详细信息
来源: 评论
Various Modulation Types Classification on the Air by Convolutional Neural Network  7
Various Modulation Types Classification on the Air by Convol...
收藏 引用
7th international conference on Future networks and distributed systems, ICFNDS 2023
作者: Hammadi, Yousif I Alsaeedi, Mokhalad Abdulameer Kadhim Mahmood, Omar Abdulkareem Sameen, Aws Zuhair Muthanna, Mohammed Saleh Ali Aziz, Ahmed Bilad Alrafidain University College Diyala Iraq Department Of Communications Engineering College Of Engineering University Of Diyala Baqubah32001 Iraq Department Of Medical Instrumentation Engineering Techniques College Of Medical Techniques Al-Farahidi University Baghdad Iraq Institute Of Computer Technologies And Information Security Southern Federal University Taganrog344006 Russia Department Of Computer Science Faculty Of Computer And Artificial Intelligence Benha University Egypt Department Of International Business Management Tashkent State University Of Economics Tashkent Uzbekistan
Deep learning (DL), a relatively recent AI technique, has been successfully applied to the problem of automated modulation categorization (AMC), with promising results. An essential part of developing the spectrum-sen... 详细信息
来源: 评论
An Innovative Markovian Environment for Intrusion Detection in IoT networks
An Innovative Markovian Environment for Intrusion Detection ...
收藏 引用
international conference on computer and Applications (ICCA)
作者: Eslam Hesham Abeer Hamdy Khaled Nagaty Computer Networks The British University in Egypt Cairo Egypt Software Engineering The British University in Egypt Cairo Egypt Computer Science The British University in Egypt Cairo Egypt
Recently, cyberattacks on IoT (Internet of Things) and IIoT (Industrial Internet of Things) networks have become increasingly complicated and more frequent. These attacks have posed considerable threats such as Distri... 详细信息
来源: 评论
Lattice Cryptography-Based Geo-Encrypted Contact Tracing for Infection Detection  1
收藏 引用
4th international conference on Advances in distributed Computing and Machine Learning, ICADCML 2023
作者: Dhiman, Mayank Gupta, Nitin Singh Jadon, Kuldeep Gupta, Ujjawal Kumar, Yashwant Department of Computer Science and Engineering National Institute of Technology Hamirpur Himachal Pradesh India
The world has already witnessed many epidemic diseases in the past years, like H1N1, SARS, Ebola, etc. Now, Covid-19 has also been added to list, which is declared as pandemic by World Health Organization. One of the ... 详细信息
来源: 评论