咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,231 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5348 条 记 录,以下是4951-4960 订阅
排序:
Collusion-resilient fingerprinting using random prewarping
Collusion-resilient fingerprinting using random prewarping
收藏 引用
IEEE international conference on Image Processing
作者: M.U. Celik G. Sharma A.M. Tekalp Electrical and Computer Engineering Department University of Rochester Rochester NY USA College of Engineering Koc University Istanbul Turkey
Fingerprinting of audio-visual content using digital watermarks is an effective means of determining the originators of unauthorized copies and fighting piracy in digital distribution networks. In particular, watermar... 详细信息
来源: 评论
Implications of power-line communication on distributed data acquisition and control system
Implications of power-line communication on distributed data...
收藏 引用
international conference on Emerging Technologies and Factory Automation (ETFA)
作者: M. Lobashov G. Pratl T. Sauter Institute of Computer Technology University of Technology Vienna Vienna Austria
Automated meter reading, energy billing and energy management are applications that are based on and require remote access to control networks. Such applications are intrinsically linked to power-lines and as such sug... 详细信息
来源: 评论
Dynamic integration of distributed semantic services
Dynamic integration of distributed semantic services
收藏 引用
international conference on Integration of Knowledge Intensive Multi-Agent systems (KIMAS)
作者: G. Jiang W. Chung G. Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartmouth College Hanover NH USA
Global networking is changing the way that we think about and perform computation. Network-based computing may link tens or hundreds of distributed devices, sensors and computing resources to support an application. T... 详细信息
来源: 评论
Federated, secure trust networks for distributed healthcare IT services
Federated, secure trust networks for distributed healthcare ...
收藏 引用
IEEE international conference on Industrial Informatics (INDIN)
作者: A.C. Weaver S.J. Dwyer A.M. Snyder J. Van Dyke J. Hu X. Chen T. Mulholland A. Marshall Department of Computer Science University of Virginia USA Department of Radiology University of Virginia USA
Recent US regulations mandate the privacy and security of healthcare data at a level never previously contemplated. Our research group is developing a prototype healthcare IT system and medical data portal based upon ... 详细信息
来源: 评论
GriT: a CORBA-based grid middleware architecture
GriT: a CORBA-based grid middleware architecture
收藏 引用
Annual Hawaii international conference on System Sciences (HICSS)
作者: A.S. Gokhale B. Natarajan Institute for Software Integrated Systems Vanderbilt University Nashville TN USA
Rapid advances in networking, hardware, and middleware technologies are facilitating the development and deployment of grid applications, which are characterized, by their very high computing and resource requirements... 详细信息
来源: 评论
Analysis of distributed intrusion detection systems using Bayesian methods
Analysis of distributed intrusion detection systems using Ba...
收藏 引用
IEEE international Performance, Computing, and Communications conference
作者: Burroughs, DJ Wilson, LF Cybenko, GV Dartmouth Coll Thayer Sch Engn Hanover NH 03755 USA
In computer and network security, standard approaches to intrusion detection and response attempt to detect and prevent individual attacks. However, it is not the attack but rather the attacker against which our netwo... 详细信息
来源: 评论
Introduction to the IEEE Transactions on Mobile Computing
收藏 引用
IEEE Transactions on Mobile Computing 2002年 第1期1卷 2-3页
作者: La, Porta, Thomas F. IEEE
No abstract available
来源: 评论
Factoring mobile agents  9
Factoring mobile agents
收藏 引用
9th Annual IEEE international conference and Workshop on the Engineering of computer-Based systems (ECBS 2002)
作者: Lauvset, KJ Johansen, D Marzullo, K Univ Tromso Dept Comp Sci N-9037 Tromso Norway
In this paper we argue that the traditional model of a mobile agent provides a poor programming structure. We base our argument on our experience since 1993 in building distributed applications and mobile agent platfo... 详细信息
来源: 评论
Proceedings of the 2002 international conference on Dependable systems and networks
Proceedings of the 2002 International Conference on Dependab...
收藏 引用
Proceedings of the 2002 international conference on Dependable systems and networks DNS 2002
The proceedings contains 96 papers. Topics discussed include distributed systems, dependable networking, modeling and evaluation, software techniques, security and intrusion tolerance, software and system demonstratio... 详细信息
来源: 评论
Ruminations on domain-based reliable broadcast  1
收藏 引用
16th international conference on distributed Computing (DISC 2002)
作者: Frolund, S Pedone, F Hewlett Packard Labs Palo Alto CA 94304 USA Ecole Polytech Fed Lausanne CH-1015 Lausanne Switzerland
A distributed system is no longer confined to a single administrative domain. Peer-to-peer applications and business-to-business e-commerce systems, for example, typically span multiple local-area and wide-area networ... 详细信息
来源: 评论