咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是4871-4880 订阅
排序:
Agent-based distributed intrusion source identification
Agent-based distributed intrusion source identification
收藏 引用
2nd international conference on computer networks and Mobile Computing
作者: Wang, HJ Wang, RJ Wang, CR Gao, Y Northeastern Univ Sch Informat Sci & Engn Shenyang 110004 Peoples R China
Network-based intrusion has become a serious threat to networked information systems. Yet, the current network security mechanisms are passive in response to network-based intrusions. In order to hide their origins, i... 详细信息
来源: 评论
A connector-aware middleware for distributed deployment and mobility  23
A connector-aware middleware for distributed deployment and ...
收藏 引用
23rd international conference on distributed Computing systems Workshops
作者: Mikic-Rakic, M Medvidovic, N Univ So Calif Dept Comp Sci Los Angeles CA 90089 USA
To address the need for highly configurable and customizable distributed systems, researchers and practitioners are investigating various innovative approaches. One of the promising techniques emerging from this area ... 详细信息
来源: 评论
LIM: A layered interconnection model for improving component reuse
LIM: A layered interconnection model for improving component...
收藏 引用
System security and Assurance
作者: Chiang, Chia-Chu Department of Computer Science Univ. of Arkansas at Little Rock 2801 S. University Ave. Little Rock AR 72204-1099 United States
As information technologies evolve, computing environments become more distributed, cooperated, and heterogeneous. More and more software applications written in different programming languages running on different pl... 详细信息
来源: 评论
On rekey policies for secure group applications  12
On rekey policies for secure group applications
收藏 引用
12th international conference on computer Communications and networks (ICCCN 2003)
作者: Zhang, QY Calvert, KL Univ Kentucky Lab Adv Networking Lexington KY 40506 USA
Secure distribution of information to authorized recipients is an important prerequisite for group applications with commercial potential. Typically in such applications data traffic is encrypted using a single key;th... 详细信息
来源: 评论
Probabilistic validation of an intrusion-tolerant replication system
Probabilistic validation of an intrusion-tolerant replicatio...
收藏 引用
international conference on Dependable systems and networks
作者: Singh, S Cukier, M Sanders, WH Univ Illinois Urbana IL 61801 USA
As computer systems become more complex and more widely distributed, it is becoming increasingly difficult to remove all vulnerabilities that can potentially be exploited by intruders. Intrusion tolerance is an emergi... 详细信息
来源: 评论
Proceedings: The 23rd IEEE international conference on distributed Computing systems
Proceedings: The 23rd IEEE International Conference on Distr...
收藏 引用
23th IEEE international conference on distributed Computing systems
The proceedings contains 75 papers. Topics discussed include self-stabilizing systems, sensor networks and energy management, peer to peer services, distributed algorithms, multimedia streaming, secure data sharing, q... 详细信息
来源: 评论
Formal analysis of some timed security properties in wireless protocols
收藏 引用
6th international conference on Formal Methods for Open Object-Based distributed systems
作者: Gorrieri, R Martinelli, F Petrocchi, M Vaccarelli, A Univ Bologna Dipartimento Sci Informaz I-40126 Bologna Italy CNR Ist Informat & Telemat I-00185 Rome Italy
We show how a recent language for the description of cryptographic protocols in a real time setting may be suitable to formally verify security aspects of wireless protocols. We define also a compositional proof rule ... 详细信息
来源: 评论
Poster abstract: LEAP - Efficient security mechanisms for large-scale distributed sensor networks
Poster abstract: LEAP - Efficient security mechanisms for la...
收藏 引用
SenSys'03: Proceedings of the First international conference on Embedded Networked Sensor systems
作者: Zhu, Sencun Setia, Sanjeev Jajodia, Sushil Center for Secure Information Systems George Mason University Fairfax VA 22030 Department of Computer Science George Mason University Fairfax VA 22030
In this paper, we describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing techniques such as passive participat... 详细信息
来源: 评论
Survivable multi-level ad-hoc group operations  23
Survivable multi-level ad-hoc group operations
收藏 引用
23rd international conference on distributed Computing systems Workshops
作者: Zhou, D Wu, J Florida Atlantic Univ Dept Comp Sci & Engn Boca Raton FL 33431 USA
In this paper we investigate the survivability of multi-level ad-hoc groups for critical operations through a case study. We aim to provide a formal trust framework for establishing security policies. We identify vari... 详细信息
来源: 评论
Pulse: A class of super-worms against network infrastructure  23
Pulse: A class of super-worms against network infrastructure
收藏 引用
23rd international conference on distributed Computing systems Workshops
作者: Voyiatzis, AG Serpanos, DN Univ Patras Dept Elect & Comp Engn GR-26500 Patras Greece
Super-worms constitute the most advanced and dangerous threat for networks and the whole Internet. Their goal is to infect the significant majority of Internet hosts in the minimum possible time, by using advanced tec... 详细信息
来源: 评论