咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是4811-4820 订阅
排序:
Research and experiments of network attack defence system
Research and experiments of network attack defence system
收藏 引用
2004 IEEE international conference on systems, Man and Cybernetics, SMC 2004
作者: Li, Jian Zhang, Guo-Yin Gu, Guo-Chang Coll. of Comp. Sci. and Technology Harbin Engineering University Nan-Tong Street 145# Harbin 150001 HeiLongJiang China
Due to the rapid growth of the network technologies, new form network attacks are emerging endlessly. Hence it has become very critical to protect computer networks from malicious attackers who try to interrupt the fu... 详细信息
来源: 评论
Intelligent assessment of distributed security in TCP/IP networks
收藏 引用
7th IEEE international conference on High Speed networks and Multimedia Communications, HSNMC 2004
作者: Cardoso, Rui Costa Freire, Mário Marques Department of Informatics University of Beira Interior Rua Marquês d’Ávila e Bolama CovilhãP-6200-001 Portugal
With the increase of the dynamics of networks interconnection, security issues became a critical point that needs to be considered. The widely adopted solution considers a mix of routers, switches, firewalls and virtu... 详细信息
来源: 评论
R-Chain: A Self-Maintained Reputation Management System in P2P networks  17
R-Chain: A Self-Maintained Reputation Management System in P...
收藏 引用
17th international conference on Parallel and distributed Computing systems, PDCS 2004
作者: Liu, Lintao Zhang, Shu Ryu, Kyung Dong Dasgupta, Partha Dept of Computer Science and Engineering Arizona State University TempeAZ85287 United States
Trust management is a critical component in P2P file sharing systems due to the free riding and security problem. In this paper, we propose a lightweight reputation management system, R-Chain, where each peer maintain... 详细信息
来源: 评论
On the construction of virtual multicast backbone for wireless ad hoc networks
On the construction of virtual multicast backbone for wirele...
收藏 引用
2004 IEEE international conference on Mobile Ad-Hoc and Sensor systems
作者: Wu, Ya-Feng Xu, Yin-Long Chen, Guo-Liang Wang, Kun Department of Computer Science and Technology University of Science and Technology of China National High Performance Computing Center Hefei
With the proliferation of portable computing devices and ascending popularity of group-oriented computing, wireless ad hoc network multicasting remains a challenging research subject. While Virtual Multicast Backbone ... 详细信息
来源: 评论
An efficient replication scheme for data grids
An efficient replication scheme for data grids
收藏 引用
2004 12th IEEE international conference on networks, ICON 2004 - Unity in Diversity
作者: Nam, Dong Su Youn, Chan-Hyun Jeong, Sangjin Shim, Eun Bo Lee, Eun Young Park, Eung Ki National Security Research Institute KT 62-1 Hwaam-dong Yuseong-gu Daejeon 305-348 Korea Republic of School of Engineering Information and Communications University 119 Munjiro Yuseong-gu Daejeon 305-714 Korea Republic of Protocol Engineering Center Electronics and Telecommunications Research Institute 161 Gajeong-dong Yuseong-gu Daejeon 305-350 Korea Republic of Dept. of Mechanical Engineering Kwangwon National University 192-1 Hyoja 2-dong Chunchon Kangwon-do 200-701 Korea Republic of
Grid replication service improves availability in terms of storing multiple data at the distributed locations, however there is not any economic scheme to decide the location of multiple replicas. In this paper, we in... 详细信息
来源: 评论
2nd international conference on Trust Management, iTrust 2004
收藏 引用
2nd international conference on Trust Management, iTrust 2004
The proceedings contain 30 papers. The special focus in this conference is on Trust Management. The topics include: The legal framework governing forensics in an online environment;a policy and domain services framewo...
来源: 评论
IFIP TC11 19th international Information security conference, SEC 2004
IFIP TC11 19th International Information Security Conference...
收藏 引用
IFIP TC11 19th international Information security conference, SEC 2004
The proceedings contain 35 papers. The special focus in this conference is on Information security. The topics include: An abstract reduction model for computer security risk;remediation graphs for security patch mana...
来源: 评论
1st international Workshop on Mobility Aware Technologies and Applications, MATA 2004
收藏 引用
1st international Workshop on Mobility Aware Technologies and Applications, MATA 2004
The proceedings contain 36 papers. The special focus in this conference is on Context-Aware Support for Mobile systems, Context-Aware Applications, networks, Service and Network Management. The topics include: Mobilit...
来源: 评论
CBRBrain: Provide content based routing service over Internet backbone
CBRBrain: Provide content based routing service over Interne...
收藏 引用
Proceedings - 13th international conference on computer Communications and networks, ICCCN 2004
作者: Song, Wen-Zhan Li, Xiang-Yang Department of Computer Science Illinois Institute of Technology 10 W. 31st Street Chicago IL 60616 United States
Peer-to-peer(P2P) networking has come to a family of technologies and techniques for organizing distributed applications, which takes advantage of resources available at the Internet edges. In this paper, we propose a... 详细信息
来源: 评论
international conference on Formal Techniques for Networked and distributed systems, FORTE 2004 held in conjunction with 1st international Workshop on Theory Building and Formal Methods in Electronic/Mobile Commerce, TheFormEMC 2004, 1st European Performance Engineering Workshop, EPEW 2004 and 1st international Workshop on Integration of Testing Methodologies, ITM 2004
International Conference on Formal Techniques for Networked ...
收藏 引用
international conference on Formal Techniques for Networked and distributed systems, FORTE 2004 held in conjuction with 1st international Workshop on Theory Building and Formal Methods in Electronic/Mobile Commerce, TheFormEMC 2004, 1st European Performance Engineering Workshop, EPEW 2004 and 1st international Workshop on Integration of Testing Methodologies, ITM 2004
The proceedings contain 27 papers. The special focus in this conference is on Testing, Performance, and M/E-Commerce. The topics include: Formal analysis of the internet open trading protocol;life-cycle e-commerce tes...
来源: 评论