咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是451-460 订阅
排序:
Towards Smarter Maritime security: Apriori Algorithm Optimization in Serverless Environments  16
Towards Smarter Maritime Security: Apriori Algorithm Optimiz...
收藏 引用
16th international conference on Ambient systems, networks and Technologies networks, ANT 2025 / 8th international conference on Emerging Data and Industry 4.0, EDI40 2025
作者: Shahin, Mahtab Rahimpour, Saeed Ghasempouri, Tara Bauk, Sanja Fahringer, Thomas Draheim, Dirk Estonian Maritime Academy Tallinn University of Technology Tallinn Estonia Department of Computer Systems Tallinn University of Technology Tallinn Estonia Distributed and Parallel Systems Group University of Innsbruck Tirol Austria Information Systems Group Tallinn University of Technology Tallinn Estonia
This paper presents an optimized implementation of the Apriori algorithm tailored for large-scale data mining in cloud-native, serverless environments, utilizing real-world fuel datasets. Our approach achieves a 28% r... 详细信息
来源: 评论
Enhanced DDoS Detection using Machine Learning
Enhanced DDoS Detection using Machine Learning
收藏 引用
international conference on Information systems and computer networks (ISCON)
作者: Rashmikiran Pandey Mrinal Pandey Alexey Nazarov Department of Radio Engineering and Cybernetics Moscow Institute of Physics and Technology Moscow Russia Federal Research Center Computer Science and Control Russian Academy of Sciences Moscow Russia
The rapid growth of internet population poses a serious challenge to the security of internet resources. The security is directly affected by the hits of Denial of Services (DoS) attack which is rampant nowadays. With... 详细信息
来源: 评论
Fusion of Dynamic Hypergraph and Clinical Event for Sequential Diagnosis Prediction  29
Fusion of Dynamic Hypergraph and Clinical Event for Sequenti...
收藏 引用
29th IEEE international conference on Parallel and distributed systems, ICPADS 2023
作者: Zhang, Xin Peng, Xueping Guan, Hongjiao Zhao, Long Qiao, Xinxiao Lu, Wenpeng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Sydney Australia
Sequential diagnosis prediction (SDP) is a challenging task, aiming to predict patients' future diagnoses based on their historical medical records. While methods based on graph neural networks (GNNs) have proven ... 详细信息
来源: 评论
A Cooperative Feature Removal Mechanism for Cell Outage Detection in Wireless Telecommunication networks  19th
A Cooperative Feature Removal Mechanism for Cell Outage Det...
收藏 引用
19th international conference on Critical Information Infrastructures security, CRITIS 2024
作者: Wrona, Andrea Gentile, Simone De Santis, Emanuele Giuseppi, Alessandro Pietrabissa, Antonio Delli Priscoli, Francesco Department of Computer Control and Management Engineering "Antonio Ruberti" Sapienza University of Rome via Ariosto 25 Lazio Rome00185 Italy Department of Electrical and Information Engineering Polytechnic of Bari via Re David 200 Puglia Bari70125 Italy
In the domain of crisis management for telecommunications infrastructures, the autonomous detection of cell outages within cellular networks is of paramount importance for prompt identification and resolution in ensur... 详细信息
来源: 评论
Robust Authentication Protocols for IoT Devices in High-Density networks
Robust Authentication Protocols for IoT Devices in High-Dens...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Senthilkumar Thangavel Arnav Kotiyal Ancy Thomas Harshal Patil Shirish Kulkarni Natrayan L Distributed Systems Cloud Solutions & Machine Learning Expert Paypal Inc California USA Department of Computer Science & Engineering Graphic Era Dehradun India Department of Computer Science and Engineering RNSIT Bangalore India School of Computer Science & Engineering IILM University Greater Noida India Department of Law Symbiosis Law School Symbiosis International (Deemed University) Pune India Department of Mechanical Engineering Saveetha School of Engineering SIMATS Kuthambakkam India
Internet of things (IoT) gadgets have transformed several industries, including engineering, medicine, and more, thanks to the meteoric rise in the number of connected smart devices. The core principle of using the In... 详细信息
来源: 评论
A Novel Approach: Biomedical Image Encryption for Healthcare Applications
A Novel Approach: Biomedical Image Encryption for Healthcare...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Kaparapu Satish Babu G. Sreelakshmi G. Vallathan S. Senthilkumar Department of ECE Geethanjali College of Engineering & Technology Hyderabad India Department of CSE Vinayaka Mission’s Kirupananda Variyar Engineering College Vinayaka Mission’s Research Foundation (DU) Salem India
The rapid advancement in healthcare technology systems and transmission methods has enabled the acquisition, distribution, and management of data across medical devices, greatly enhancing traditional hospital informat... 详细信息
来源: 评论
A Scalable Blockchain-Based Trust Management Strategy for Vehicular networks  17th
A Scalable Blockchain-Based Trust Management Strategy for Ve...
收藏 引用
17th international conference on Wireless Algorithms, systems, and Applications (WASA)
作者: Li, Minghao Zhao, Gansen Lai, Ruilin South China Normal Univ Sch Comp Sci Guangzhou 510631 Peoples R China
In recent years, the dynamic environment on the Internet of Vehicles led vehicular communication networks' trust management mechanism to become a research hotspot. Most of the existing trust management in vehicula... 详细信息
来源: 评论
Blockchain based Secure and Effective Authentication Mechanism for 5G networks  1
Blockchain based Secure and Effective Authentication Mechani...
收藏 引用
1st IEEE international conference on Blockchain and distributed systems security, ICBDS 2022
作者: Bala, R. Manoharan, R. Puducherry Technological University Dept. of Computer Science and Engineering Puducherry India
5G technology's rapid development revolutionized the field of cellular networks by providing higher data rate up to 10 Gbit/s using millimetre waves. Though 5G network can carry huge data with a higher speed than ... 详细信息
来源: 评论
Binary Malware Detection via Heterogeneous Information Deep Ensemble Learning  29
Binary Malware Detection via Heterogeneous Information Deep ...
收藏 引用
29th IEEE international conference on Parallel and distributed systems, ICPADS 2023
作者: Song, Runhan Li, Lun Cui, Lei Liu, Qiqi Gao, Jin Chinese Academy of Sciences Institute of Information Engineering Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China Zhongguancun Laboratory Beijing China
Dynamic malware detection refers to detecting mal-ware by inferring the run-time trace of malware, i.e., a sequence of API calls. In this paper, we proposed HeteroNet, a novel dynamic malware detection model. The main... 详细信息
来源: 评论
An Intelligent Early Warning Support System for Financial Crisis based on Fully Homomorphic Encryption Algorithm
An Intelligent Early Warning Support System for Financial Cr...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Fanling Kong College of Finance and Economics Guangdong University of Science &Technology Dongguan China
The financial crisis has an important impact on social and economic development, and the existing economic management methods cannot achieve massive data analysis, so on this basis This paper proposes an intelligent e... 详细信息
来源: 评论