咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是4831-4840 订阅
排序:
Choosing of technical and economic indices for knowledge base of perimeter security systems
Choosing of technical and economic indices for knowledge bas...
收藏 引用
international IEEE conference on Intelligent systems, IS
作者: P.E. Bykovyy Institute of computer Information Technologies Ternopil Academy of National Economy Ternopil Ukraine
An intelligent procedure is proposed for choosing technical and economic indices of the distributed components of a perimeter security system. This procedure is intended for preparation of input data for the creation ... 详细信息
来源: 评论
On providing anonymity in wireless sensor networks
On providing anonymity in wireless sensor networks
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: A. Wadaa S. Olariu L. Wilson M. Eltoweissy K. Jones Department of Computer Science Old Dominion University Norfolk VA USA Department of Computer Science Virginia Technology Falls Church VA USA NASA-Langley Research Center Hampton VA USA
Securing wireless sensor networks against denial of service attacks that disrupt communications or target nodes serving key roles in the network, e.g. sinks or routers, is instrumental to network availability and perf... 详细信息
来源: 评论
A source identification scheme against DDoS attacks in cluster interconnects
A source identification scheme against DDoS attacks in clust...
收藏 引用
Proc. -ICPP 2004 on Mobile and Wireless Networking, High Perform. Sci. and Eng. Comput., Netw. Des. and Archit., Opt.Netw. Control and Manage., Ad Hoc and Sensor Netw., Compile and Run Time Tech. for Parallel Comput.
作者: Lee, Manhee Kim, Eun Jung Lee, Cheol Won Department of Computer Science Texas A and M University College Station TX 77840 United States National Security Research Institute Daejeon 305-350 Korea Republic of
Designing secure clusters has recently become a critical issue to make these systems robust to attacks from the Internet. The distributed Denial of Service (DDoS) attack is one of the most serious problems in the curr... 详细信息
来源: 评论
Performing security analysis of large scale power systems with a broker-based computational grid
Performing security analysis of large scale power systems wi...
收藏 引用
international conference on Information Technology: Coding and Computing (ITCC)
作者: M. Di Santo N. Ranaldo D. Villacci E. Zimeo Department of Engineering University of Sannio Benevento Italy
A solution to the online power system security analysis is presented. For complex networks this analysis requires large computational efforts whereas computation times should be less than few minutes for the informati... 详细信息
来源: 评论
A distributed approach for intrusion detection systems
A distributed approach for intrusion detection systems
收藏 引用
international conference on Information and Communication Technologies: From Theory to Applications, ICTTA
作者: A. Berqia G. Nacsimento University of Geneva CUI Geneve Switzerland Faculdade de Ciências e Tecnologia University of Algarve ADEEC Faro Portugal
This paper discuses a critical issue in computer security, intrusion detection. First we give an overview about the current stage of intrusion detection and existing intrusion detection system types. Then, we propose ... 详细信息
来源: 评论
Secure hosts auto-configuration in mobile ad hoc networks
Secure hosts auto-configuration in mobile ad hoc networks
收藏 引用
international conference on distributed Computing systems Workshop
作者: A. Cavalli J.-M. Orset Institut National de Télécommunications Evry France
All existing routing protocols of mobile ad hoc networks assume that IP addresses of hosts are already configured before they join the network. Some papers proposed solutions to allow an automatic configuration of nod... 详细信息
来源: 评论
Efficient hierarchic management for reconfiguration of networked information systems
Efficient hierarchic management for reconfiguration of netwo...
收藏 引用
international conference on Dependable systems and networks (DSN)
作者: J.C. Rowanhill P.E. Varner J.C. Knight Department of Computer Science University of Virginia Charlottesville VA USA
The management of modern distributed systems is complicated by scale and dynamics. Scalable, decoupled communication establishes flexible, loosely coupled component relationships, and these relationships help meet the... 详细信息
来源: 评论
On the security of polling protocols in peer-to-peer systems
On the security of polling protocols in peer-to-peer systems
收藏 引用
international conference on Peer-to-Peer Computing
作者: B. Sieka A.D. Kshemkalyani M. Singhal Computer Science Department University of Illinois Chicago Chicago IL USA Department of Computer Science University of Kentucky Lexington KY USA
The peer-to-peer (P2P) network model differs from the well established client-server model in that all members of the network are assigned an equal role. P2P networks are recently gaining increasing popularity. Provid... 详细信息
来源: 评论
security patterns: a method for constructing secure and efficient inter-company coordination systems
Security patterns: a method for constructing secure and effi...
收藏 引用
international conference on Enterprise distributed Object Computing (EDOC)
作者: N. Yoshioka S. Honiden A. Finkelstein National Institute of Information Japan National Institute of Informatics University of Tokyo Japan Department of Computer Science University College London UK
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. This is particularly the case for inter... 详细信息
来源: 评论
Intelligent multi-agent based back-propagation neural network forecasting model for statistical database anomaly prevention system
Intelligent multi-agent based back-propagation neural networ...
收藏 引用
international conference on Intelligent Sensing and Information Processing (ICISIP)
作者: P. Ramasubramanian A. Kannan Department of Computer Science and Engineering Anna University Chennai-25 TamilNadu India
This paper describes a framework for highly distributed real-time monitoring approach to database security using Intelligent multi-agents. The statistical anomaly prevention system employs back-propagation neural netw... 详细信息
来源: 评论