咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是4981-4990 订阅
排序:
A semantic framework for specifying and reasoning about composable distributed middleware services
收藏 引用
IFIP Advances in Information and Communication Technology 2002年 81卷 25-26页
作者: Talcott, Carolyn SRI International 333 Ravenswood Avenue Menlo Park CA 94025SRI United States
Middleware such as Corba ORBs, DCOM, or Java Beans provide programming abstractions for interoperation of diverse components in an open distributed setting. More recent middleware initiatives focus on resource managem... 详细信息
来源: 评论
Scalable data fusion using Astrolabe
Scalable data fusion using Astrolabe
收藏 引用
international conference on Information Fusion
作者: K.P. Birman R. van Renesse W. Vogels Reliable Network Solutions Inc. Cornell University USA
The dramatic growth of computer networks creates both an opportunity and a daunting distributed computing problem for users seeking to perform data fusion and data mining. The problem is that data often resides on lar... 详细信息
来源: 评论
The fuzzy artificial immune system: motivations, basic concepts, and application to clustering and Web profiling
The fuzzy artificial immune system: motivations, basic conce...
收藏 引用
IEEE international conference on Fuzzy systems (FUZZ-IEEE)
作者: O. Nasaroui F. Gonzalez D. Dasgupta Department of Electrical and Computer Engineering University of Memphis USA Intelligent Security Systems Research Laboratory University of Memphis USA Division of Computer Science University of Memphis USA
The human immune system can be seen as a complex network structure that is able to respond to an almost unlimited multitude of foreign invaders such as viruses and bacteria. Hence, this parallel and distributed adapti... 详细信息
来源: 评论
Differentially secure multicasting and its implementation methods  10
Differentially secure multicasting and its implementation me...
收藏 引用
10th international conference on computer Communications and networks
作者: Holeman, S Manimaran, G Davis, J Iowa State Univ Dependable Comp & Networking Lab Dept Elect & Comp Engn Ames IA 50011 USA
Though the areas of secure multicast group architecture, key distribution, and sender authentication are under scrutiny, one topic that has not been explored is how to integrate these with multilevel security. Multile... 详细信息
来源: 评论
A smart card based solution to minimize inter-receiver delay jitter  10
A smart card based solution to minimize inter-receiver delay...
收藏 引用
10th international conference on computer Communications and networks
作者: Klöcking, JU Maihöfer, C Rothermel, K Univ Stuttgart Inst Parallel & Distributed High Performance Syst IPVR D-70565 Stuttgart Germany
We consider the problem of how to achieve a simultaneous arrival of information at a multitude of recipients for applications where the receivers are noncooperative. For that reason, we aim at designing an inter-recei... 详细信息
来源: 评论
Multi-agent based intrusion detection architecture
Multi-agent based intrusion detection architecture
收藏 引用
1st international conference on computer networks and Mobile Computing
作者: Zhang, R Qian, DP Bao, CM Wu, WG Guo, XB Xian Jiaotong Univ Dept Comp Sci & Technol Xian 710049 Peoples R China
Intrusion detection research has been conducted for nearly 20 years but still remains in its infancy. The existing intrusion detection system architectures have a number of problems that limit their configurability, s... 详细信息
来源: 评论
A network state based intrusion detection model
A network state based intrusion detection model
收藏 引用
1st international conference on computer networks and Mobile Computing
作者: Shan, Z Chen, P Xu, Y Xu, K Beijing Univ Aeronaut & Astronaut Natl Lab Software Dev Environm Beijing 100083 Peoples R China
This paper presents a new approach called network state based model to describe intrusions and attacks. In the model which uses FA theory and can detect unknown attacks, the attacks and intrusions are described by the... 详细信息
来源: 评论
Design and implementation of acceptance monitor for building scalable intrusion tolerant system  10
Design and implementation of acceptance monitor for building...
收藏 引用
10th international conference on computer Communications and networks
作者: Wang, R Wang, FY Byrd, GT MCNC Res Triangle Pk NC 27709 USA
Intrusion detection research has so far mostly concentrated on techniques that effectively identify the malicious behaviors. No assurance can be assumed once the system is compromised Intrusion tolerance, on the other... 详细信息
来源: 评论
Global computing systems  3rd
收藏 引用
3rd international conference on Large-Scale Scientific Computing (ICLSSC 2001)
作者: Germain, C Fedak, G Néri, V Cappello, F CNRS LRI F-75700 Paris France Univ Paris 11 Paris France
Global Computing harvest the idle time of Internet connected computers to run very large distributed applications. The unprecedented scale of the GCS paradigm requires to revisit the basic issues of distributed system... 详细信息
来源: 评论
Dynamic multi-signatures for secure autonomous agents  12
Dynamic multi-signatures for secure autonomous agents
收藏 引用
12th international conference on Database and Expert systems Applications (DEXA)
作者: Kotzanikolaou, P Burmester, M Chrissikopoulos, V Univ Piraeus Dept Informat Piraeus 18534 Greece
Mobile agents are an appealing technology for distributed applications in open networks. A major problem is the asymmetric relation of mobile agents and their execution environment in matters of security. The security... 详细信息
来源: 评论