咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是461-470 订阅
排序:
An Intelligent Early Warning Support System for Financial Crisis based on Fully Homomorphic Encryption Algorithm
An Intelligent Early Warning Support System for Financial Cr...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Fanling Kong College of Finance and Economics Guangdong University of Science &Technology Dongguan China
The financial crisis has an important impact on social and economic development, and the existing economic management methods cannot achieve massive data analysis, so on this basis This paper proposes an intelligent e... 详细信息
来源: 评论
Big Data Framework to Detect and Mitigate distributed Denial of Service(DDoS) Attacks in Software-Defined networks (SDN)
Big Data Framework to Detect and Mitigate Distributed Denial...
收藏 引用
2023 international conference on Electrical, computer, Communications and Mechatronics Engineering, ICECCME 2023
作者: Hamedani, Amirreza Fazely Aziz, Muzzamil Wieder, Philipp Yahyapour, Ramin Göettingen University Department of Computer Science Göttingen Germany EScience Group Göttingen Germany
The software-defined network is in recent years come into the sight of so many network designers as a successor to the traditional network. This type of network is vulnerable to DDoS attacks, targeting a different par... 详细信息
来源: 评论
A Review on Blockchain Strategies and Its Applications  7th
A Review on Blockchain Strategies and Its Applications
收藏 引用
7th international conference on Smart Trends in Computing and Communications, SmartCom 2023
作者: Mishra, Priyanka Ganesan, R. Department of Computer Science Engineering Vellore Institute of Technology Tamil Nadu Chennai600127 India
Blockchain was acquainted with the fundamental innovation with empowering digital currency exchanges among untrusted parties. Today, its potential transformative is contrasted with that of the World Wide Web. With dis... 详细信息
来源: 评论
security Issues in IoT: A Review  7
Security Issues in IoT: A Review
收藏 引用
7th international conference on Parallel, distributed and Grid Computing, PDGC 2022
作者: Sharma, Monika Bindal, Amit Kumar M M Engineering College Department of Computer Science and Engineering Ambala Mullana India
Internet of Things (IoT) has only recently come into existence. Since the inception of IoT, the majority of IoT studies, have been on a strategic level, including planning, architecture, standardization, and the most ... 详细信息
来源: 评论
Dynamic Trust Management in IoT networks using Reputation-Based systems
Dynamic Trust Management in IoT Networks using Reputation-Ba...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: D J Samatha Naidu Upma Jain Shruthi S K. B. V. Brahma Rao Syed Mohammad Uzair Iqbal Natrayan L Department of Master of Computer Applications Annamacharya PG College of Computer Studies India Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun India Department of Artificial Intelligence and Machine Learning BMS Institute of Technology and Management Bengaluru India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation India Department of Law Symbiosis Law School Symbiosis International (Deemed University) Pune India Department of Mechanical Engineering Saveetha School of Engineering SIMATS India
The Internet of Things (IoT) enables intelligent data exchange across many kinds of interconnected devices in a diverse and unpredictable physical setting. The Internet of Things (IoT) network used in this study is a ... 详细信息
来源: 评论
Trust Monitoring in a Cyber-Physical System for security Analysis Based on distributed Computing
Trust Monitoring in a Cyber-Physical System for Security Ana...
收藏 引用
international conference on Actual Problems of Applied Mathematics and computer systems, APAMCS 2022
作者: Basan, Elena Lapina, Maria Lesnikov, Alexander Basyuk, Anatoly Mogilny, Anton Southern Federal University Taganrog Russia North Caucasus Federal University Stavropol Russia
Cyber-physical systems are widely used. Nevertheless, security issues are quite acute for them. First of all, because the system must work constantly without downtime and failures. The Cyber-Physical System (CPS) must... 详细信息
来源: 评论
Using IOT and WSNs Technology for Monitoring an Aquaponic Greenhouse System
Using IOT and WSNs Technology for Monitoring an Aquaponic Gr...
收藏 引用
international conference on Embedded & distributed systems (EDiS)
作者: Achouak Touhami Amina Bourouis Tariq Benahmed Sana Touhami Nawal Touhami Khelifa Benahmed Dept. Mathematics and Computer Science Ali Kafi university center Tindouf Algeria Dept. Mathematics and Computer Science Tahri Mohammed university Bechar Algeria Dept. Electrical Engineering Ahmed Draria university Adrar Algeria
The increasing population, climate fluctuations, soil erosion, limited water resources, and concerns about food security highlight the need for effective and sustainable approaches to food production. Aquaponics repre... 详细信息
来源: 评论
A Comparative Analysis of IoT Protocols for Resource Constraint Devices and networks  6
A Comparative Analysis of IoT Protocols for Resource Constra...
收藏 引用
6th international conference on Future networks and distributed systems, ICFNDS 2022
作者: Holm, Sara Hammoudeh, Mohammad School of Computing and Mathematics Manchester Metropolitan University Manchester Manchester United Kingdom Information & Computer Science King Fahd University of Petroleum and Minerals Dhahran Dhahran Saudi Arabia
Communication standards and protocols are detrimental to the success of any Internet of Things (IoT) system or application. Selecting a communication standard and a suitable middleware or messaging protocol for IoT co... 详细信息
来源: 评论
security and Privacy Enabled Framework for Online Social networks using Blockchain  4
Security and Privacy Enabled Framework for Online Social Net...
收藏 引用
4th international conference on Electronics and Sustainable Communication systems, ICESC 2023
作者: Kumar, Arvind Vyas, Tushar Ahmed, Saleem Girdharwal, Nitin Vijayakumar, E. Thangavelu, Arivanantham Mriirs Haryana Faridabad India Jecrc University Department of CSE Rajasthan Jaipur India Oryx Universal College Doha Qatar Madhya Pradesh Indore India KIT- Kalaignar Karunanidhi Institute of Technology Tamilnadu Coimbatore India Dr. D. Y. Patil College of Engineering and Innovation Computer Engineering MaharashtraVarale Talegaon Pune India
Users may easily deal with data overload concerns while navigating Online Social networks (OSN) through suggestion engines. In addition, it increases a number of privacy-related issues, particularly for users who woul... 详细信息
来源: 评论
EAVA: Adaptive and Fast Edge-assisted Video Analytics on Mobile Device  29
EAVA: Adaptive and Fast Edge-assisted Video Analytics on Mob...
收藏 引用
29th IEEE international conference on Parallel and distributed systems, ICPADS 2023
作者: Su, Yingying Cao, Chenhong Li, Jiangtao Li, Yufeng Shanghai University Purple Mountain Laboratories School of Computer Engineering and Science China
Mobile video analytics applications, such as smart driving, VR/AR, and video surveillance, have become increasingly popular due to the proliferation of mobile devices. These applications typically use compute-intensiv... 详细信息
来源: 评论