咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是4881-4890 订阅
排序:
22nd international conference on computer Safety, Reliability and security, SAFECOMP 2003
22nd International Conference on Computer Safety, Reliabilit...
收藏 引用
22nd international conference on computer Safety, Reliability and security, SAFECOMP 2003
The proceedings contain 32 papers. The special focus in this conference is on Formal Methods, Design for Dependability, security and Dependability of Medical systems. The topics include: Elicitation and validation of ...
来源: 评论
distributed system for lawful interception in VoIP networks  2
Distributed system for lawful interception in VoIP networks
收藏 引用
international conference on computer as a Tool
作者: Milanovic, A Srbljic, S Raznjevic, I Sladden, D Skrobo, D Matosevic, I Univ Zagreb Sch Elect Engn & Comp Zagreb 41000 Croatia
Voice over IP is one of the most propulsive technologies today. Significant advantages of VoIP over conventional telephone system provide a major incentive for enterprises and service providers to use the new technolo... 详细信息
来源: 评论
Design and implementation of autonomous distributed secret sharing storage system  9
Design and implementation of autonomous distributed secret s...
收藏 引用
9th Asia-Pacific conference on Communications held in conjunction with the 6th Malaysia international conference on Communications (MICC 2003)
作者: Hayashi, D Miyamoto, T Doi, S Kumagai, S Osaka Univ Dept Elect Engn Suita Osaka 565 Japan
For mission-critical, and safe-critical operations of medical information, financial, or administrative systems, a reliable and robust storage system is indispensable. The main purpose of our research is to develop a ... 详细信息
来源: 评论
A token-based secure routing protocol in Ad-Hoc networks
A token-based secure routing protocol in Ad-Hoc networks
收藏 引用
Proceedings of the Fifteenth IASTED international conference on Parallel and distributed Computing and systems
作者: Park, Bok-Nyong Kim, Jae-Won Lee, SangKeun Dept. of Comp. Sci. and Engineering Coll. of Info. and Communications Korea University Seoul Korea Republic of
Ad-Hoc networks unlike conventional networks consist of only mobile nodes and have no support infrastructure such as base stations as mobile switching. There exist serious security problems in these Ad-Hoc networks du... 详细信息
来源: 评论
A protection of mobile system in network systems
A protection of mobile system in network systems
收藏 引用
Proceedings of the international conference on security and Management, SAM 2003
作者: Kim, Jong Tak Koh, Chan Choi, Jin Tak Dept. of Computer Science Univ. of Incheon Incheon Korea Republic of Dept. of Computer Science and Eng. Seoul National Univ. of Technology Seoul Korea Republic of
In the resent years, the term mobile agent is probably one of the most overused words in many applicable areas of distributed open systems as electronic commerce and electronic data interchange, and it has very differ... 详细信息
来源: 评论
Comparison of centralized and decentralized service discovery in a grid environment
Comparison of centralized and decentralized service discover...
收藏 引用
Proceedings of the Fifteenth IASTED international conference on Parallel and distributed Computing and systems
作者: Ludwig, Simone A. Brunel University Uxbridge Middlesex UB8 3PH United Kingdom
In this paper three different Service Discovery approaches based on centralized and distributed registries within so called Virtual Organizations are assessed. The first approach is a centralized model, the second a c... 详细信息
来源: 评论
Dependable communication synthesis for distributed embedded systems
Dependable communication synthesis for distributed embedded ...
收藏 引用
22nd international conference on computer Safety, Reliability and security
作者: Kandasamy, N Hayes, JP Murray, BT Vanderbilt Univ Inst Software Integrated Syst Nashville TN 37240 USA Univ Michigan Adv Comp Architecture Lab Ann Arbor MI USA Delphi Corp Brighton MA USA
Embedded control applications such as drive-by-wire in cars require dependable interaction between various sensors, processors, and actuators. This paper addresses the design of low-cost communication networks guarant... 详细信息
来源: 评论
An integrated network-wide defense framework (INwDF) for large networks
An integrated network-wide defense framework (INwDF) for lar...
收藏 引用
Proceedings of the international conference on security and Management, SAM 2003
作者: Kim, Jinoh Kim, Ikkyun Kim, Kiyoung Jang, Jongsoo Sohn, Sungwon Kang, Koohong Network Security Department Electronics and Telecom. Res. Inst. Daejon Korea Republic of Dept. of Info. and Communication Eng Seowon Univ. Seowon Korea Republic of
With the advent and explosive growth of the global Internet, attacks including distributed denial of service (DDoS) attacks are becoming more popular and sophisticated. Most security works, however, have just focused ... 详细信息
来源: 评论
A multi-threaded simulator for a distributed control system
A multi-threaded simulator for a distributed control system
收藏 引用
System security and Assurance
作者: Jones Jr., Irvin R. Tracy, Donald P. University of Denver Department of Engineering Denver CO United States
The goal of our research is to develop a methodology for distributed control where the control activity is governed by a concurrent program that has "artificially intelligent" features. The test bed for this... 详细信息
来源: 评论
On modeling computer networks for vulnerability analysis
On modeling computer networks for vulnerability analysis
收藏 引用
16th Annual conference on Data and Applications security
作者: Campbell, C Dawkins, J Pollet, B Fitch, K Hale, J Papa, M Univ Tulsa Tulsa OK 74104 USA
Enterprise security must take into account a holistic view of the network. Capturing security and vulnerability attributes of network services and systems is a critical aspect of effective vulnerability analysis and r... 详细信息
来源: 评论