咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 87 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 5,104 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 496 篇 security
  • 355 篇 wireless sensor ...
  • 312 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 202 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 149 篇 cryptography
  • 147 篇 computer science
  • 142 篇 computational mo...
  • 142 篇 internet
  • 140 篇 data security

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...
  • 6 篇 the islamic univ...
  • 6 篇 graphic era deem...

作者

  • 9 篇 hammoudeh mohamm...
  • 9 篇 obaidat mohammad...
  • 8 篇 igor kotenko
  • 8 篇 eyas el-qawasmeh
  • 7 篇 yanmin zhu
  • 7 篇 barolli leonard
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 mohammad s. obai...
  • 6 篇 shahid raza
  • 6 篇 thiemo voigt
  • 6 篇 natrayan l
  • 6 篇 das sajal k.
  • 6 篇 mohammad hammoud...
  • 6 篇 keromytis angelo...
  • 5 篇 isaac woungang
  • 5 篇 ma jianfeng
  • 5 篇 lionel m. ni
  • 5 篇 wehrle klaus

语言

  • 4,987 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5104 条 记 录,以下是4991-5000 订阅
排序:
Jini technology in e-commerce  3
Jini technology in e-commerce
收藏 引用
3rd international conference on Enterprise Information systems, ICEIS 2001
作者: Vasiu, Luminita Middlesex University School of Computing Science United Kingdom
Jini technology represents a significant step in the evolution of distributed computing, as a simple yet remarkably reliable and flexible infrastructure that enable all types of devices to simply connect into imprompt... 详细信息
来源: 评论
international Workshop on Mathematical Methods, Models and Architectures for Network security systems, MMM-ACNS 2001
收藏 引用
international Workshop on Mathematical Methods, Models and Architectures for Network security systems, MMM-ACNS 2001
The proceedings contain 29 papers. The special focus in this conference is on Network security systems and Intrusion Detection. The topics include: An intelligent decision support system for intrusion detection and re...
来源: 评论
international Workshop on Innovative Internet Computing systems, IICS 2001
收藏 引用
international Workshop on Innovative Internet Computing systems, IICS 2001
The proceedings contain 16 papers. The special focus in this conference is on Innovative Internet Computing systems. The topics include: Multicast protocols for jinni agents;modern software engineering methods for IP-...
来源: 评论
5th international Workshop on Self-Stabilizing systems, WSS 2001
收藏 引用
5th international Workshop on Self-Stabilizing systems, WSS 2001
The proceedings contain 15 papers. The special focus in this conference is on Self-Stabilizing systems. The topics include: Cooperating mobile agents and stabilization;enforcement of fairness under unfair adversary;ea...
来源: 评论
2nd international Workshop on Electronic Commerce, WELCOM 2001
收藏 引用
2nd international Workshop on Electronic Commerce, WELCOM 2001 in conjunction with the 18th IEEE Symposium on Reliable and distributed systems, SRDS 2001
The proceedings contain 20 papers. The special focus in this conference is on Markets, security, Profiling and Business Interaction. The topics include: The next wave of internet-based applications;building comparison...
来源: 评论
Mobile agent-based security model for distributed system
Mobile agent-based security model for distributed system
收藏 引用
IEEE international conference on systems, Man and Cybernetics
作者: Lin Qi Lu Yu Institute of Command and Technology of Equipment Beijing China
Mobile computers and devices may operate in a variety of environments with different security schemes. In this paper, we present a mobile agent based security model. The model supports the flexible and extensible appl... 详细信息
来源: 评论
Exploring robustness in group key agreement
Exploring robustness in group key agreement
收藏 引用
international conference on distributed Computing systems
作者: Y. Amir Yongda Kim C. Nita-Rotaru J. Schultz J. Stanton G. Tsudik Department of Computer Science Johns Hopkins University Baltimore MD USA Computer Networks Division USC Information Sciences Institute Marina del Rey CA USA Information and Computer Science Department University of California Irvine CA USA
Secure group communication is crucial for building distributed applications that work in dynamic environments and communicate over unsecured networks (e.g. the Internet). Key agreement is a critical part of providing ... 详细信息
来源: 评论
Enhancing survivability of security services using redundancy
Enhancing survivability of security services using redundanc...
收藏 引用
international conference on Dependable systems and networks (DSN)
作者: M.A. Hiltunen R.D. Schlichting C.A. Ugarte AT and T Shannon Laboratories Florham Park NJ USA Department of Computer Science University of Arizona Tucson Tucson AZ USA
Traditional distributed system services that provide guarantees related to confidentiality, integrity, and authenticity enhance security, but are not survivable since each attribute is implemented by a single method. ... 详细信息
来源: 评论
Multi-agent based intrusion detection architecture
Multi-agent based intrusion detection architecture
收藏 引用
international conference on computer networks and Mobile Computing (ICCNMC)
作者: Ran Zhang Depei Qian Chongming Ba Weiguo Wu Xiaobing Guo Department of Computer Science and Technology Xi''an Jiaotong University Xi'an China
Intrusion detection research has been conducted for nearly 20 years but still remains in its infancy. The existing intrusion detection system architectures have a number of problems that limit their configurability, s... 详细信息
来源: 评论
distributed security management using LDAP directories
Distributed security management using LDAP directories
收藏 引用
computer Science Society (SCCC) international conference Chilean FLAGGED
作者: E. Jamhour PPGIA PUCPR-Pontifícia Universidade Católica do Paraná Brazil
Presently, many companies share business information by interconnecting their networks through the Internet. However, this advanced degree of connectivity also increases the network security management complexity. Mos... 详细信息
来源: 评论