咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 87 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 5,104 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 496 篇 security
  • 355 篇 wireless sensor ...
  • 312 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 202 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 149 篇 cryptography
  • 147 篇 computer science
  • 142 篇 computational mo...
  • 142 篇 internet
  • 140 篇 data security

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...
  • 6 篇 the islamic univ...
  • 6 篇 graphic era deem...

作者

  • 9 篇 hammoudeh mohamm...
  • 9 篇 obaidat mohammad...
  • 8 篇 igor kotenko
  • 8 篇 eyas el-qawasmeh
  • 7 篇 yanmin zhu
  • 7 篇 barolli leonard
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 mohammad s. obai...
  • 6 篇 shahid raza
  • 6 篇 thiemo voigt
  • 6 篇 natrayan l
  • 6 篇 das sajal k.
  • 6 篇 mohammad hammoud...
  • 6 篇 keromytis angelo...
  • 5 篇 isaac woungang
  • 5 篇 ma jianfeng
  • 5 篇 lionel m. ni
  • 5 篇 wehrle klaus

语言

  • 4,987 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5104 条 记 录,以下是4961-4970 订阅
排序:
Dependability and the grid issues and challenges
Dependability and the grid issues and challenges
收藏 引用
Proceedings of the 2002 international conference on Dependable systems and networks DNS 2002
作者: Schlichting, Richard D. AT and T Labs - Research Shannon Laboratory 180 Park Avenue Florham Park NJ 07932 United States
A particular challenge associated with Grid computing, that of ensuring dependable operation of Grid computing is discussed. The dependability discussed encompasses a broad collection of possible attributes, including... 详细信息
来源: 评论
Proceedings - international conference on distributed Computing systems
Proceedings - International Conference on Distributed Comput...
收藏 引用
22nd international conference on distributed Computing systems Workshops, ICDCSW 2002
The proceedings contain 130 papers. The topics discussed include: an adaptive maintenance of hierarchical structure in ad hoc networks and its evaluation;assuring message delivery in mobile ad hoc networks with packet...
来源: 评论
security policy deployment in IPsec  1
收藏 引用
international conference on Information Networking, ICOIN 2002
作者: Kim, Geon Woo Park, So Hee Nah, Jae Hoon Sohn, Sung Won Network Security Department Electronics and Telecommunications Research Institute 161 Kajong-Dong Yusung-Gu Taejon305-350 Korea Republic of
security policy system defines the basic rules and strategies for information security systems, e.g., IPsec, IKE, and Firewalls. But due to the heterogeneous network security systems and the corresponding applications... 详细信息
来源: 评论
international conference on Infrastructure security, InfraSec 2002
收藏 引用
international conference on Infrastructure security, InfraSec 2002
The proceedings contain 23 papers. The special focus in this conference is on Biometrics, Identification, Authentication, Analysis Process, Mobile networks and System Design. The topics include: Biometric authenticati...
来源: 评论
A distributed light-weight authentication model for Ad-hoc networks  4th
收藏 引用
4th international conference on Information security and Cryptology, ICISC 2001
作者: Weimerskirch, André Thonet, Gilles Accenture Technology Labs Sophia Antipolis France Communication Security Group Ruhr-Universität Bochum Germany
In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commercial transactions. After a brief introduction to ... 详细信息
来源: 评论
A Practical Knowledge Discovery Process for distributed Data Mining  11
A Practical Knowledge Discovery Process for Distributed Data...
收藏 引用
11th Golden West international conference on Intelligent systems, ICIS 2002
作者: Liu, Jiang B. Han, Jun Computer Science & Information Systems Department Bradley University PeoriaIL61625 United States
This research focuses on developing a practical distributed data mining process to extract the high-level information (knowledge) from low-level data that stored in massive databases or data warehouses over the networ... 详细信息
来源: 评论
5th IFIP/IEEE international conference on Management of Multimedia networks and Services, MMNS 2002
收藏 引用
5th IFIP/IEEE international conference on Management of Multimedia networks and Services, MMNS 2002
The proceedings contain 27 papers. The special focus in this conference is on Service Management, Management of Wireless Multimedia, Bandwidth Sharing Protocols and distributed Video Architectures. The topics include:...
来源: 评论
Analysis of distributed intrusion detection systems using Bayesian methods
Analysis of distributed intrusion detection systems using Ba...
收藏 引用
IEEE international conference on Performance, Computing and Communications (IPCCC)
作者: D.J. Burroughs L.F. Wilson G.V. Cybenko Thayer School of Engineering Dartmouth College Hanover NH USA
In computer and network security, standard approaches to intrusion detection and response attempt to detect and prevent individual attacks. However, it is not the attack but rather the attacker against which our netwo... 详细信息
来源: 评论
2nd international Workshop of Central and Eastern Europe on Multi-Agent systems, CEEMAS 2001
收藏 引用
2nd international Workshop of Central and Eastern Europe on Multi-Agent systems, CEEMAS 2001
The proceedings contain 35 papers. The special focus in this conference is on From Theory to Practice in Multi-Agent systems. The topics include: Network services in context of pervasive mobile internet;on ban logics ...
来源: 评论
Quantifying effect of network latency and clock drift on time-driven key sequencing
Quantifying effect of network latency and clock drift on tim...
收藏 引用
international conference on distributed Computing systems Workshop
作者: G.G. Xie C. Irvine T. Levin Department of Computer Science Naval Postgraduate School Monterrey CA USA Department of Computer Science Naval Postgraduate Schoo Montereyl CA
Time-driven key sequencing (TKS) is a key management technique that synchronizes the session key used by a set of communicating principals based on time of day. This relatively low cost method of session key synchroni... 详细信息
来源: 评论