咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是4861-4870 订阅
排序:
Random asynchronous wakeup protocol for sensor networks
Random asynchronous wakeup protocol for sensor networks
收藏 引用
international conference on Broadband networks (BroadNets)
作者: V. Paruchuri S. Basavaraju A. Durresi R. Kannan S.S. Iyengar Department of Computer Science Louisiana State University Baton Rouge LA USA
This paper presents a random asynchronous wakeup (RAW), a power saving technique for sensor networks that reduces energy consumption without significantly affecting the latency or connectivity of the network. RAW buil... 详细信息
来源: 评论
A secured microcellular network supported by system-VLSI
A secured microcellular network supported by system-VLSI
收藏 引用
IEEE Region 10 international conference TENCON
作者: T. Yamada Gong Xin T.H. Hung P.T. Hoa A. Toyoda Department of Computer Science Ritsumeikan University Kusatsu Japan
This paper proposes a public microcellular network allowing extension of LAN to the mobile network, which is named mobile multimedia metropolitan area network (MM-MAN). Users driving at highspeed can enjoy the same IT... 详细信息
来源: 评论
Providing secrecy in key management protocols for large wireless sensors networks
收藏 引用
Ad Hoc networks 2003年 第4期1卷 455-468页
作者: Pietro, Roberto Di Mancini, Luigi V. Jajodia, Sushil Dipartimento di Informatica Univ. di Roma La Sapienza Via Salaria 113 00198 Roma Italy Ctr. for Secure Information Systems George Mason University University Drive VA 22030 United States
This paper defines a new protocol KeEs for the key establishment that meets the security requirements of the threat model proposed. The KeEs protocol assures forward and backward secrecy of the session key, so that if... 详细信息
来源: 评论
Toward a security architecture for smart messages: Challenges, solutions, and open issues  23
Toward a security architecture for smart messages: Challenge...
收藏 引用
23rd international conference on distributed Computing systems Workshops
作者: Xu, G Borcea, C Iftode, L Rutgers State Univ Dept Comp Sci Piscataway NJ 08854 USA
Smart Messages (SMs) are migratory execution units used to describe distributed computations over mobile ad hoc networks of embedded systems. The main benefits provided by SMs are flexibility, scalability, and the abi... 详细信息
来源: 评论
Addressing security issues in geographically distributed systems  4
Addressing security issues in geographically distributed sys...
收藏 引用
4th Mexican international conference on computer Science (ENC 2003)
作者: Hannon, C Rinewalt, JR Texas Christian Univ Dept Comp Sci Ft Worth TX 76129 USA
Using our Alchemy research system as an exemplar system, we discuss different approaches to overcoming port-controlled security boundary limitations to geographically distributed computing environments while maintaini... 详细信息
来源: 评论
Active vulnerability assessment of computer networks by simulation of complex remote attacks
Active vulnerability assessment of computer networks by simu...
收藏 引用
2nd international conference on computer networks and Mobile Computing
作者: Kotenko, I St Petersburg Inst Informat & Automat St Petersburg Russia
The paper describes the formal approach and software toot "Attack Simulator" intended for active vulnerability assessment of computer network security policy at the stages of design and deployment of network... 详细信息
来源: 评论
Access-controlled resource discovery for pervasive networks  23
Access-controlled resource discovery for pervasive networks
收藏 引用
23rd international conference on distributed Computing systems Workshops
作者: Sarath, BRS Govindaraj, P
This paper describes the design and implementation of an architecture for access-controlled resource discovery. This system achieves this goal by integrating access control with the Intentional Naming System (INS), a ... 详细信息
来源: 评论
Scalable PKI model based on location information
Scalable PKI model based on location information
收藏 引用
2nd international conference on computer networks and Mobile Computing
作者: Wang, Y Gu, DW Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200030 Peoples R China
When introducing public key infrastructure (PKI) in mobile telecommunication systems, one of the challenges is to span different PKI domains to establish certificate chain efficiently, and still keep the autonomy in l... 详细信息
来源: 评论
LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks  23
LHAP: A lightweight hop-by-hop authentication protocol for a...
收藏 引用
23rd international conference on distributed Computing systems Workshops
作者: Zhu, SC Xu, SH Setia, S Jajodia, S George Mason Univ Ctr Secure Informat Syst Fairfax VA 22030 USA
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the network with the goal of depleting th... 详细信息
来源: 评论
A distributed multi-agent architecture for computer security situational awareness
A distributed multi-agent architecture for computer security...
收藏 引用
6th international conference on Information Fusion
作者: Engelhardt, D Anderson, M Information Networks Division Defence Science and Technology Organisation Australia
distributed systems for computer security analysis must perform information fusion in order to construct a cyberspace situational awareness picture. To date such fusion has been conducted in the context of a single ab... 详细信息
来源: 评论