咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 87 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 5,104 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 496 篇 security
  • 355 篇 wireless sensor ...
  • 312 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 202 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 149 篇 cryptography
  • 147 篇 computer science
  • 142 篇 computational mo...
  • 142 篇 internet
  • 140 篇 data security

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...
  • 6 篇 the islamic univ...
  • 6 篇 graphic era deem...

作者

  • 9 篇 hammoudeh mohamm...
  • 9 篇 obaidat mohammad...
  • 8 篇 igor kotenko
  • 8 篇 eyas el-qawasmeh
  • 7 篇 yanmin zhu
  • 7 篇 barolli leonard
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 mohammad s. obai...
  • 6 篇 shahid raza
  • 6 篇 thiemo voigt
  • 6 篇 natrayan l
  • 6 篇 das sajal k.
  • 6 篇 mohammad hammoud...
  • 6 篇 keromytis angelo...
  • 5 篇 isaac woungang
  • 5 篇 ma jianfeng
  • 5 篇 lionel m. ni
  • 5 篇 wehrle klaus

语言

  • 4,987 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5104 条 记 录,以下是4921-4930 订阅
排序:
Non-stop Internet model based on Circle Quorum System
Non-stop Internet model based on Circle Quorum System
收藏 引用
IEEE international conference on systems, Man and Cybernetics
作者: Ping Song Jian-Ling Sun Zhi-Jun He Computer Science Department Zhejiang University of Technology Hangzhou China
Rapid developments in computer technology have resulted in greater reliance on distributed computing, typified by "client/server" or "subscriber/push" architectures. These servers provide central r... 详细信息
来源: 评论
Chaotic secure communication based on discrete-time chaos noise generator
Chaotic secure communication based on discrete-time chaos no...
收藏 引用
IEEE international conference on Parallel and distributed Computing, Applications and Technologies (PDCAT)
作者: Wenfang Zhang Dake He School of Computer and Communications Engineering Southwest Jiaotong University Chengdu China Research center for secure application in networks and communications Southwest Jiaotong University Chengdu China
In view of chaos synchronization systems sensitivity to parameter mismatches, a new class of chaotic secure communication schemes based on the discrete time chaos noise generator is proposed. In this scheme it is easy... 详细信息
来源: 评论
A novel approach to role-based access control
A novel approach to role-based access control
收藏 引用
international conference on Computational Science, ICCS 2003
作者: Chae, Song-Hwa Kim, Wonil Kim, Dong-Kyoo The Graduate School of Information and Communication Ajou University Suwon442-749 Korea Republic of College of Information and Computer Engineering Ajou University Suwon442-749 Korea Republic of
With the rapid growth of distributed and network systems, sharing resources among many users become more common. As a result of that, we encounter with new problems concerning security and privacy on the shared resour... 详细信息
来源: 评论
The precaution of the network virus and the quantitative analysis of the epidemic situation
The precaution of the network virus and the quantitative ana...
收藏 引用
international conference on Machine Learning and Cybernetics (ICMLC)
作者: Bai-Ling Wang Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin Heilongjiang China National Computer Network and Information System Security Administration Center Beijing China
Comparing with the traditional host virus, the network virus has more attack ability and is more infectious in open network environment. So it is necessary to set a national virus precaution system to detect and contr... 详细信息
来源: 评论
1st NSF/NIJ Symposium on Intelligence and security Informatics, ISI 2003
1st NSF/NIJ Symposium on Intelligence and Security Informati...
收藏 引用
1st NSF/NIJ Symposium on Intelligence and security Informatics, ISI 2003
The proceedings contain 40 papers. The special focus in this conference is on Data Management, Mining, Deception Detection, Analytical Techniques and Visualization. The topics include: Using support vector machines fo...
来源: 评论
Cybersecurity
Cybersecurity
收藏 引用
international conference on Software Engineering (ICSE)
作者: R.A. Kemmerer Department of Computer Science University of California Santa Barbara USA
As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more a... 详细信息
来源: 评论
Formal framework for modeling and simulation of DDoS attacks based on teamwork of hackers-agents
Formal framework for modeling and simulation of DDoS attacks...
收藏 引用
IEEE/WIC/ACM international conference on Intelligent Agent Technology (IAT)
作者: I. Kotenko A. Alexeev E. Man'kov St. Petersburg Institute for Informatics and Automation Russia
The modern Internet is at rather dangerous stage of its life cycle. Taking into account a today's level of computer network security, the Internet can simply cease to work, if the current tendency of growth of num... 详细信息
来源: 评论
6th international conference on Fundamental Approaches to Software Engineering, FASE 2003 Held as Part of the Joint European conferences on Theory and Practice of Software, ETAPS 2003
收藏 引用
6th international conference on Fundamental Approaches to Software Engineering, FASE 2003 Held as Part of the Joint European conferences on Theory and Practice of Software, ETAPS 2003
The proceedings contain 27 papers. The special focus in this conference is on Software components, Mobile computing, Aspect and object-oriented programming, distributed and web applications, Software measurements, For...
来源: 评论
A database record encryption scheme using the RSA public key cryptosystem and its master keys
A database record encryption scheme using the RSA public key...
收藏 引用
international conference on computer networks and Mobile Computing (ICCNMC)
作者: Chin-Chen Chang Chao-Wen Chan Department of Computer Science and Information Engineering Chung Cheng University Chiayi Taiwan
Two new database encryption systems are presented. Both systems are based on the concept of the RSA (Rivest, Shamir, Adleman) master key. The first proposed system is a field-oriented encryption system with user maste... 详细信息
来源: 评论
Efficient data communication techniques for controller area network (CAN) protocol
Efficient data communication techniques for controller area ...
收藏 引用
ACS/IEEE international conference on computer systems and Applications
作者: S. Misbahuddin N. Al-Holou Dept. of Comput. Sci. & Software Eng. King Fahd Univ. of Pet. & Miner. Dhahran Saudi Arabia
Summary form only given. Single bus based distributed embedded systems are used in several real time control applications such as automobiles, aircraft, industrial automation, off-road vehicles etc. The single bus bas... 详细信息
来源: 评论