咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,231 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5348 条 记 录,以下是4941-4950 订阅
排序:
A new ecological network-based grid middleware and its simulation platform
A new ecological network-based grid middleware and its simul...
收藏 引用
IEEE international conference on systems, Man and Cybernetics
作者: Lei Gao Lihong Ren Yongsheng Ding College of Information Sciences and Technology Donghua Uinversity Shanghai China
Next generation grid systems where the emphasis shifts to distributed global collaboration, a service-oriented approach and information layer issues exhibit a strong sense of automation. Requirements for these systems... 详细信息
来源: 评论
Real-time path planning in dynamic environments: a comparison of three neural network models
Real-time path planning in dynamic environments: a compariso...
收藏 引用
IEEE international conference on systems, Man and Cybernetics
作者: D.V. Lebedev J.J. Steil H. Ritter AG Neuroinformatik Faculty of Technology University of Bielefeld Bielefeld Germany
This paper presents two contributions: (i) a new type of neural network the dynamic wave expansion neural network, for path generation in a dynamic environment for both mobile robots and robotic manipulators, and (ii)... 详细信息
来源: 评论
Agent-based control systems for operation and management of intelligent network-enabled devices
Agent-based control systems for operation and management of ...
收藏 引用
IEEE international conference on systems, Man and Cybernetics
作者: Fei-Yue Wang Cheng-Hong Wang Department of Control and Information Systems Faculty of Electrical Engineering ž½ilina Slovakia
This paper outlines an agent-based control approach for operation and management of network-enabled devices that exhibit intelligent behaviors cost effectively. The basic idea is to transform control algorithms into c... 详细信息
来源: 评论
On rekey policies for secure group applications
On rekey policies for secure group applications
收藏 引用
international conference on computer Communications and networks (ICCCN)
作者: Q. Zhang K.L. Calvert Laboratory for Advanced Networking University of Kentucky Lexington KY USA
Secure distribution of information to authorized recipients is an important prerequisite for group applications with commercial potential. Typically in such applications data traffic is encrypted using a single key; t... 详细信息
来源: 评论
Formalizing active networks security with seal-calculus  03
Formalizing active networks security with seal-calculus
收藏 引用
Proceedings of the 2003 international conference on Parallel and distributed processing and applications
作者: Xiaojuan Zheng Tao Xu Ying Jin College of Computer Science and Technology JILIN University P. R. China College of Mechanism JILIN University P. R. China
Active networks (ANs) aims at incorporating programmability into the network to achieve flexibility. However, increasing flexibility results in new security risks, which cannot be handled by existing ANs systems. In t... 详细信息
来源: 评论
Performance optimizations for group key management schemes
Performance optimizations for group key management schemes
收藏 引用
international conference on distributed Computing systems
作者: Sencun Zhu S. Setia S. Jajodia Center for Secure Information Systems George Mason University Fairfax VA USA MITRE Corporation Mclean VA USA
Recently, many group key management approaches based on the use of logical key trees have been proposed to address the issue of scalable group rekeying that is needed to support secure communications for large and dyn... 详细信息
来源: 评论
Potential issues in novel computational research: artificial immune systems
Potential issues in novel computational research: artificial...
收藏 引用
IEEE international conference on Multi Topic
作者: N. Iqbal M.A. Maarof Group on Artificial Immune Networks and Security (GAINS) Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia Skudai Johor Malaysia
Recent trends in computational research show the significance of computation-based biological research, for example, bioinformatics and system biology, and biologically inspired computational research, which includes ... 详细信息
来源: 评论
Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach
Establishing pairwise keys for secure communication in ad ho...
收藏 引用
international conference on Network Protocols
作者: Sencun Zhu Shouhuai Xu Sanjeev Setia Sushil Jajodia Center for Secure Information Systems George Mason University Fairfax VA USA Department of Computer Science University of Texas San Antonio San Antonio TX USA University of California Irvine USA
A prerequisite for a secure communication between two nodes in an ad hoc network is that the nodes share a key to bootstrap their trust relationship. In this paper, we present a scalable and distributed protocol that ... 详细信息
来源: 评论
Collaborative intrusion detection system
Collaborative intrusion detection system
收藏 引用
conference of the North American Fuzzy Information Processing Society - NAFIPS
作者: P. Miller A. Inoue Department of Computer Science Eastern Washington University WA USA
This paper presents an intrusion detection system consisting of multiple intelligent agents. Each agent uses a self-organizing map (SOM) in order to detect intrusive activities on a computer network. A blackboard mech... 详细信息
来源: 评论
Chaotic Secure Communications Based on Discrete-Time Chaos Noise Generator
Chaotic Secure Communications Based on Discrete-Time Chaos N...
收藏 引用
The Fourth international conference on Parallel and distributed Computing, Applications and Technologies
作者: Wenfang Zhang Dake He School of Computer and Communications Engineering Southwest Jiaotong University Research center for secure application in networks and communications Southwest Jiaotong University
In view of chaos synchronization systems sensitivity to parameter mismatches,a new class of chaotic secure communication schemes based on the discrete time chaos noise generator is *** this scheme it is easy to adjust... 详细信息
来源: 评论