咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是4911-4920 订阅
排序:
Dependable communication synthesis for distributed embedded systems
Dependable communication synthesis for distributed embedded ...
收藏 引用
22nd international conference on computer Safety, Reliability and security, SAFECOMP 2003
作者: Kandasamy, Nagarajan Hayes, John P. Murray, Brian T. Institute for Software Integrated Systems Vanderbilt University NashvilleTN United States Advanced Computer Architecture Lab University of Michigan Ann ArborMI United States The Delphi Corporation BrightonMI United States
Embedded control applications such as drive-by-wire in cars require dependable interaction between various sensors, processors, and actuators. This paper addresses the design of low-cost communication networks guarant... 详细信息
来源: 评论
LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks
LHAP: a lightweight hop-by-hop authentication protocol for a...
收藏 引用
international conference on distributed Computing systems Workshop
作者: Sencun Zhu Shouhuai Xu S. Setia S. Jajodia Center for Secure Information Systems George Mason University Fairfax VA USA Department of Information and Computer Science University of California Irvine CA USA MITRE Corporation Mclean VA USA
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the network with the goal of depleting th... 详细信息
来源: 评论
Probabilistic validation of an intrusion-tolerant replication system
Probabilistic validation of an intrusion-tolerant replicatio...
收藏 引用
international conference on Dependable systems and networks (DSN)
作者: S. Singh M. Cukier W.H. Sanders University of Illinois Urbana-Champaign IL USA University of Maryland College Park MD USA
来源: 评论
1st international conference on Trust Management, iTrust 2003
收藏 引用
1st international conference on Trust Management, iTrust 2003
The proceedings contain 24 papers. The special focus in this conference is on Trust management. The topics include: Architecture and algorithms for a distributed reputation system;regularity-based trust in cyberspace;...
来源: 评论
Proceedings. ITRE 2003. international conference on Information Technology: Research and Education (IEEE Cat. No.03EX647)
Proceedings. ITRE 2003. International Conference on Informat...
收藏 引用
international conference on Information Technology: Research and Education (ITRE)
The following topics are dealt with: multimedia streaming; video coding; media processing; video transmission; multimedia database; ad-hoc networks; virtual reality; human-computer interfaces; curriculum development; ... 详细信息
来源: 评论
Transaction management for m-commerce at a mobile terminal  36
Transaction management for m-commerce at a mobile terminal
收藏 引用
36th Annual Hawaii international conference on System Sciences, HICSS 2003
作者: Veijalainen, J. Terziyan, V. Tirri, H. Department of Computer Science and Inf. Systems Univ. of Jyvaskyla Finland Department of Mathematical Information Technology Univ. of Jyvaskyla Finland Helsinki Institute for Information Technology Department of Computer Science University of Helsinki Finland
Although there has been a lot of discussion of "transactions" in mobile e-commerce (m-commerce), very little attention has been paid for distributed transactional properties of the computations facilitating ... 详细信息
来源: 评论
Access-controlled resource discovery for pervasive networks
Access-controlled resource discovery for pervasive networks
收藏 引用
international conference on distributed Computing systems Workshop
作者: B.R.S. Sarath P. Govindaraj
This paper describes the design and implementation of an architecture for access controlled resource discovery. This system achieves this goal by integrating access control with the Intentional Naming System (INS), a ... 详细信息
来源: 评论
Foundations of security for hash chains in ad hoc networks
Foundations of security for hash chains in ad hoc networks
收藏 引用
international conference on distributed Computing systems Workshop
作者: P.G. Bradford O.V. Gavrylyako Department of Computer Science University of Alabama Tuscaloosa AL USA
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have very limited memory. In ad hoc networks... 详细信息
来源: 评论
Proceedings of the Fourth international conference on Parallel and distributed Computing, Applications and Technologies (IEEE Cat. No.03EX684)
Proceedings of the Fourth International Conference on Parall...
收藏 引用
IEEE international conference on Parallel and distributed Computing, Applications and Technologies (PDCAT)
The following topics are dealt with: IP networks; QoS; routing protocols; interconnection networks; Internet; packet switching; network routing; queuing theory; open systems; fault tolerant computing; network manageme... 详细信息
来源: 评论
A connector-aware middleware for distributed deployment and mobility
A connector-aware middleware for distributed deployment and ...
收藏 引用
international conference on distributed Computing systems Workshop
作者: M. Mikic-Rakic N. Medvidovic Computer Science Department University of Southern California Los Angeles CA USA
To address the need for highly configurable and customizable distributed systems, researchers and practitioners are investigating various innovative approaches. One of the promising techniques emerging from this area ... 详细信息
来源: 评论