咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是481-490 订阅
排序:
Story Telling with Basic and Advanced Data Visualizations of Blockchain Technologies  2
Story Telling with Basic and Advanced Data Visualizations of...
收藏 引用
2nd international conference on Augmented Intelligence and Sustainable systems, ICAISS 2023
作者: Kurada, Ramachandra Rao Pavan Kanadam, Karteeka Ramu, Y. Silpa, N. Rao, V.V.R. Maheswara Pattem, Sunil Shri Vishnu Engineering College for Women Department of Cse Bhimavaram India Chandramoulipuram Chowdavaram Department of Computer Applications R.V.R. & J.C.College of Engineering Guntur India
The reinforced significance of blockchain technology is due to its foul-proof security of decentralized self-triggering applications. The major concern is towards maintaining transaction record keeping as unhampered i... 详细信息
来源: 评论
Evaluation of Human Immune-Based IDPS Under DoS/DDoS Attacks  1st
Evaluation of Human Immune-Based IDPS Under DoS/DDoS Attack...
收藏 引用
1st international conference on Advances in Computing Research, ACR’23
作者: Aliyu, Farouq Sheltami, Tarek Abu-Amara, Marwan Deriche, Mohamed Mahmoud, Ashraf King Fahd University of Petroleum and Minerals Dhahran31261 Saudi Arabia Interdisciplinary Research Center of Smart Mobility and Logistics King Fahd University of Petroleum and Minerals Dhahran31261 Saudi Arabia Ajman University Ajman United Arab Emirates
Typical intrusion detection and prevention systems (IDPS) require a lot of computing resources such as;CPU time, memory, and energy. However, some resources are not in abundance in fog computing (FC). FC is a computer... 详细信息
来源: 评论
Implementation of Deep Learning Techniques for Secure IoT networks  1
Implementation of Deep Learning Techniques for Secure IoT Ne...
收藏 引用
1st international conference on Futuristic Technologies, INCOFT 2022
作者: Mahajan, Rohini Singh, Dushyant Chandigarh Engineering College Department of Computer Science & Engineering Jhanjeri India Vivekananda Global University Department of Computer Science Engineering Jaipur India
The medical industry, the military, and the power grid are just a few examples of businesses that may benefit greatly from using IoT solutions. The safety of an Internet of Things network is less important than the sa... 详细信息
来源: 评论
Effective security Mechanisms against distributed Denial of Services
Effective Security Mechanisms against Distributed Denial of ...
收藏 引用
international conference on Information systems and computer networks (ISCON)
作者: Kashish Gaur Kaamya Gaur Tanya Sachdeva Manoj Diwakar Prabhishek Singh Neeraj Kumar Pandey Graphic Era Deemed to be University Dehradun India School of Computer Science Engineering and Technology Bennett University Greater Noida India School of Computing DIT University Dehradun
In general, the popularity of DDoS attacks being used as a weapon to harm the opposite party, is on the rise. Hence, is the need for the security from such disruptive attacks. There have been several attempts at detec... 详细信息
来源: 评论
Blockchain-Enhanced Access Control for IoT systems in Smart Cities
Blockchain-Enhanced Access Control for IoT Systems in Smart ...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Santhosh Kumar Kuchoor Sanjeev Kukreti R.S.S. Raju Battula Suruchi Singh Ashutosh Panchbhai Natrayan L Palo Alto Networks San Francisco Bay Area California USA Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun India Department of Computer Applications Aditya University Surampalem India Department of Computer Science and Engineering Chhatrapati Shahu Ji Maharaj University Kanpur India Department of Law Symbiosis Law School Symbiosis International (Deemed University) Pune India Department of Mechanical Engineering Saveetha School of Engineering SIMATS Kuthambakkam India
With the exponential growth of smart gadgets and the technologies that connect them, the Internet of Things (IoT) has emerged as the most promising new technology of the last decade. This is true from both a business ... 详细信息
来源: 评论
Energy Efficient and Secure Scheme Based Compressive Sensing Method for Internet of Vehicles  22nd
Energy Efficient and Secure Scheme Based Compressive Sensin...
收藏 引用
22nd international conference on Next Generation Teletraffic and Wired/Wireless Advanced networks and systems, NEW2AN 2022
作者: Aziz, Ahmed Ibrahim, Maha Tashkent State University of Economics Tashkent Uzbekistan Computer Science Department Faculty of Computers and Artificial Intelligence Benha University Benha Egypt
The Compressive Sensing (CS) technique based solutions are increasingly finding application in the field of IoV and WSNs motivated by the benefits of concurrent implementation of lightweight encryption and compression... 详细信息
来源: 评论
Comparative Analysis of 5G security Mechanisms
Comparative Analysis of 5G Security Mechanisms
收藏 引用
international conference on Information systems and computer networks (ISCON)
作者: Tanya Sachdeva Siddhant Kumar Manoj Diwakar Prabhishek Singh Neeraj Kumar Pandey Savita Choudhary Graphic Era Deemed to be University Dehradun India School of Computer Science Engineering and Technology Bennett University Greater Noida India School of Computing DIT University Dehradun Sir M. Visvesvaraya Institute of Technology Bengaluru
As networks continue to expand, they become increasingly heterogeneous, accommodating a diverse range of devices, from sensors and IoT to clients and servers. This ecosystem is highly distributed, with network facilit... 详细信息
来源: 评论
Unveiling the Landscape of Network Architectures: A Deep Dive and Multi-Criteria Analysis of SDN and Traditional networks
Unveiling the Landscape of Network Architectures: A Deep Div...
收藏 引用
Circuit, systems and Communication (ICCSC), international conference on
作者: Ahmed Belkhadim Abderrahim Maizate Abdelaziz Ettaoufik Zouhair Ibn Batouta RITM – ESTC/CED ENSEM Hassan II University Casablanca Morocco LTIM FS Ben M’SIK Hassan II University Casablanca Morocco LTI FS Ben M’SIK Hassan II University Casablanca Morocco
The advancement of computer networks has resulted in the emergence of various networking architectures, including Software-Defined Networking (SDN) and traditional networks. While traditional networks use a distribute... 详细信息
来源: 评论
Comparison Of Emotion Through Text Analysis Using Various Deep Learning Models
Comparison Of Emotion Through Text Analysis Using Various De...
收藏 引用
Blockchain and distributed systems security (ICBDS), IEEE international conference on
作者: Harshita Sanjay Trimukhe Rutuja Anil Pagare Shreya Sandeep Salunke Afeefa Rafeeque Rasheed Noor Salman Baig Computer Engineering Department MMANTC Malegaon Malegaon India
In this study, we investigate the efficacy of Convolutional Neural networks (CNN), Recurrent Neural networks (RNN), Long Short-Term Memory networks (LSTM), and Bidirectional LSTMs (BiLSTM) for emotion classification t... 详细信息
来源: 评论
Maize Crop Yield Prediction Using Machine Learning Regression Approach  5th
Maize Crop Yield Prediction Using Machine Learning Regressio...
收藏 引用
5th international conference on Advances in distributed Computing and Machine Learning, ICADCML 2024
作者: Bedane, Tarikwa Tesfa Kebede, Kidistie Bizuneh Mohapatra, Sudhir Kumar Das, Tapan Kumar Tripathy, Asis Kumar Department of Software Engineering Addis Ababa Science and Technology University Addis Ababa Ethiopia Agricultural Transformation Institute Addis Ababa Ethiopia Faculty of Emerging Technologies Sri Sri University Cuttack India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Given maize’s significant role as a staple crop, it becomes imperative to carry out precise crop yield prediction to ensure food security. This research employs machine learning algorithms to analyze historical data ... 详细信息
来源: 评论