咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是471-480 订阅
排序:
Facial Emotion Detection and Recommendation using Deep learning
Facial Emotion Detection and Recommendation using Deep learn...
收藏 引用
Blockchain and distributed systems security (ICBDS), IEEE international conference on
作者: Ansari Abu Affan Mustafa Kamal Ah. Dhananjay Dinkar Deore Mubashshera Mirza Gufran Beg Sufiyan M Ahsan Ansari Afeefa Rafeeque Md. Salman Baig Computer Department MMANTC (SPPU Pune) Malegaon (Nashik) Maharashtra
Facial emotion detection has emerged as a key focus in psychology, leveraging computer vision and machine learning to decode human emotions through facial expressions. By analyzing behaviors, actions, poses, and speec... 详细信息
来源: 评论
Efficiency-enhanced Blockchain-based Client Selection in Heterogeneous Federated Learning  6
Efficiency-enhanced Blockchain-based Client Selection in Het...
收藏 引用
6th IEEE international conference on Blockchain, Blockchain 2023
作者: Lei, Zhiqi Gai, Keke Yu, Jing Wang, Shuo Zhu, Liehuang Raymond Choo, Kim-Kwang Beijing Institute of Technology School of Computer Science and Technology Beijing100081 China Yangtze Delta Region Academy of Beijing Institute of Technology Zhejiang Jiaxing314000 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Institute of Information Engineering Chinese Academy of Sciences Beijing China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
In Federated Learning (FL), blockchain has been extensively used to achieve distributed and tamper-resistant data processing. However, typical Blockchain-based Federated Learning (BFL) rarely considers clients' re... 详细信息
来源: 评论
Denial of Service (DoS) Attacks in SDN-Based VANETs: A Study
Denial of Service (DoS) Attacks in SDN-Based VANETs: A Study
收藏 引用
international conference on Parallel distributed and Grid Computing (PDGC)
作者: Jyotsana Sardana Sunil Kumar Dharminder Kumar Kamlesh Dutta Dept. of Computer Science & Engg Guru Jambeshwar University of Science and Technology Hisar Haryana India Dept. of AI & Data Science Guru Jambeshwar University of Science and Technology Hisar Haryana India Dept. of Computer Science & Engg Gurugram University Gurugram Haryana India Dept. of Computer Science & Engg National Institute of Technology Hamirpur H.P India
Vehicular ad hoc networks (VANETs) play a vital role in ensuring the success of Intelligent transport systems (ITS), but the architecture of VANETs is vulnerable to several security attacks. There are also some challe... 详细信息
来源: 评论
Navigating IoT security Assessment: Current Methods, Challenges and Future Directions
Navigating IoT Security Assessment: Current Methods, Challen...
收藏 引用
international conference on Advanced computer Information Technologies (ACIT)
作者: Alhassan Abdulhamid Sohag Kabir Ibrahim Ghafir Ci Lei Faculty of Engineering and Digital Technologies University of Bradford Bradford United Kingdom
Rapid growth of Internet of Things (IoT) applications h as significantly transformed h uman interaction with technology, providing unprecedented convenience and connectivity in our daily lives. Securing a complex netw... 详细信息
来源: 评论
Towards Privacy-First security Enablers for 6G networks: The PRIVATEER Approach  23rd
Towards Privacy-First Security Enablers for 6G Networks: The...
收藏 引用
23rd international conference on Embedded computer systems: Architectures, Modeling, and Simulation, SAMOS 2023
作者: Masouros, Dimosthenis Soudris, Dimitrios Gardikis, Georgios Katsarou, Victoria Christopoulou, Maria Xilouris, George Ramón, Hugo Pastor, Antonio Scaglione, Fabrizio Petrollini, Cristian Pinto, António Vilela, João P. Karamatskou, Antonia Papadakis, Nikolaos Angelogianni, Anna Giannetsos, Thanassis Villalba, Luis Javier García Alonso-López, Jesús A. Strand, Martin Grov, Gudmund Bikos, Anastasios N. Ramantas, Kostas Santos, Ricardo Silva, Fábio Tsampieris, Nikolaos National Technical University of Athens Athens Greece R&D Department Space Hellas S.A Athens Greece NCSR "Demokritos" Institute of Informatics and Telecommunications Agia Paraskevi Greece Telefonica I+D Madrid Spain RHEA Group Wavre Belgium INESC TEC Porto Portugal Infili Technologies S.A Zografou Greece Ubitech Ltd Digital Security & Trusted Computing Group Chalandri Greece Universidad Complutense de Madrid Madrid Spain Kjeller Norway Iquadrat Informatica S.L Barcelona Spain Polytechnic of Porto Porto Portugal ERTICO-ITS Europe Brussels Belgium
The advent of 6G networks is anticipated to introduce a myriad of new technology enablers, including heterogeneous radio, RAN softwarization, multi-vendor deployments, and AI-driven network management, which is expect... 详细信息
来源: 评论
Next-Gen SDN security: Quantum Keying Meets AI Analytics
Next-Gen SDN Security: Quantum Keying Meets AI Analytics
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: S. Virushabadoss Anithaashri T. P M. Nivedha S. Hari Krishnan Anand Karuppannan Dept. of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai India Department of Electronics and Communication and Engineering Arasu Engineering College Kumbakonam India Department of Electronics and Communication and Engineering Sanskrithi School of Engineering Puttaparthi India Department of Electronics and Communication and Engineering Gnanamani College of Technology Namakkal India
This paper suggests a complete security architecture that blends quantum key distribution (QKD) with cutting-edge machine learning methods to improve the Software-Defined Networking (SDN) control plane. By creating se... 详细信息
来源: 评论
Face Mask Detection under the Threat of Covid-19 Virus  1
Face Mask Detection under the Threat of Covid-19 Virus
收藏 引用
1st IEEE international conference on Blockchain and distributed systems security, ICBDS 2022
作者: Dange, B.J. Khalate, S.S. Kshirsagar, D.B. Gunjal, S.N. Khodke, H.E. Bhaskar, T. Sanjivani College of Engineering Kopargaon Savitribai Phule Pune University Dept. of Computer Engineering Pune India
For wearing a mask, Covid19 has a new identity. Detecting masked faces with accuracy and efficiency is becoming increasingly important. Face mask recognition is a tough task because of the high occlusions that cause t... 详细信息
来源: 评论
CPADP: Novel Processor for Efficient Threat Detection in CPS using RISC and DC-GCNN
CPADP: Novel Processor for Efficient Threat Detection in CPS...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: K. Sravan Kumar G. Suresh Usthulamuri Penchalaiah Sundeep Kumar K E. Prasanthi Department of ECE Geethanjali Institute of Science and Technology India Dept. of ECE Geethanjali Institute of Science and Technology India Dept. of CSE Geethanjali Institute of Science and Technology India
In the realm of cybersecurity for cyber-physical systems (CPS), the need for robust and efficient intrusion detection mechanisms has become increasingly critical. The existing CPS had limited processing capabilities o... 详细信息
来源: 评论
Image Cryptography using AES-256 Algorithm
Image Cryptography using AES-256 Algorithm
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Taniska Chandel Ninad Gangodkar Abhiraj Gautam Yogesh Lohumi Mohd Rehan Ghazi Ashtha Goyal Department of Computer Science and Engineering Graphic Era (Deemed to be) University Dehradun India School of Computing Graphic Era Hill University Dehradun India
Due to the advancement of technology, information security and user privacy have become a critical issue resulting in the use of various encryption techniques. Especially with the increasing use of social networking, ... 详细信息
来源: 评论
Quantum Cryptography Techniques for Enhancing security in IoT Communications
Quantum Cryptography Techniques for Enhancing Security in Io...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Suresh Bysani Venkata Naga Arnav Kotiyal R.S.S. Raju Battula Harshal Patil Yogesh Dharangutti Natrayan L Eightfold.ai Ex - Cohesity California USA Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun India Department of Computer Applications Aditya University Surampalem India School of Computer Science & Engineering IILM University Greater Noida India Department of Law Symbiosis Law School Symbiosis International (Deemed University) Pune India Department of Mechanical Engineering Saveetha School of Engineering SIMATS Kuthambakkam India
A system of wirelessly communicative sensors embedded in a person's clothing. In order to remotely monitor and treat a patient's health, sensor devices are embedded in clothing, skin, and the human body itself... 详细信息
来源: 评论