咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,231 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5348 条 记 录,以下是4991-5000 订阅
排序:
An operating system for a Reconfigurable Active SSD processing node
An operating system for a Reconfigurable Active SSD processi...
收藏 引用
international conference on Telecommunications (ICT)
作者: Ali Ali Mohamad Jomaa Bashar Romanous Mageda Sharafeddine Mazen A. R. Saghir Haitham Akkary Hassan Artail Mariette Awad Hazem Hajj Department of Electrical and Computer Engineering American University of Beirut Beirut Lebanon Electrical and Computer Engineering Program Texas A and M University Qatar Doha Qatar
We have recently proposed a distributed Reconfigurable Active SSD computation platform (RASSD) for processing data-intensive applications at the storage node itself, without having to move data over slow networks. In ... 详细信息
来源: 评论
From Data Integrity to Global ModeI Integrity for Decentralized Federated Learning: A Blockchain-based Approach
From Data Integrity to Global ModeI Integrity for Decentrali...
收藏 引用
international Joint conference on Neural networks (IJCNN)
作者: Na Wang Yao Zhao Youyang Qu Lei Cui Bai Li Longxiang Gao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of IT Deakin University VIC Australia Zhejiang Tianheng Information Technology Company China
Decentralized Federated Learning (DFL) is extensively applied in various areas, e.g., healthcare, finance, and Internet of Things (loT), offering practical solutions for distributed intelligent applications and data c... 详细信息
来源: 评论
Cyclic redundancy code check algorithm based on small lookup table
Cyclic redundancy code check algorithm based on small lookup...
收藏 引用
IEEE international conference on Communications Technology and Applications, ICCTA
作者: Jianfen Peng Yajian Zhou Yixian Yang National Engineering Laboratory for Disaster Bacup and Recovery Information Security Group State Key Laboratory of Networking and Switiching Techonolgy Key Laboratory of Information Attack & defence Technology of MOE Beijing University of Posts and Telecommunications China
Real time and low occupation of memory must be satisfied in the error controlling of computer networks. Cyclic redundancy code generation algorithm based on small lookup table (CRCGA) is presented in this paper, which... 详细信息
来源: 评论
CNN-Based Detection of DDoS Attacks in Multi-Cloud Environments
CNN-Based Detection of DDoS Attacks in Multi-Cloud Environme...
收藏 引用
Communication, computer Sciences and Engineering (IC3SE), international conference on
作者: Rashmi Verma Manisha Jailia Munish Kumar Bhawna Kaliraman Department of Computer Science and Engineering Banasthali Vidyapith Tonk Rajasthan Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram India Department of Computer Science and Engineering DPG Institute of Technology and Management Gurugram India
With the increasing reliance on cloud computing services, ensuring the security of cloud-based infrastructures has become paramount. This paper proposes a novel approach utilizing Convolutional Neural networks (CNNs) ... 详细信息
来源: 评论
Design and implementation of action history view mechanisms for hypermedia systems
Design and implementation of action history view mechanisms ...
收藏 引用
IEEE Annual international computer Software and Applications conference (COMPSAC)
作者: H. Iwamoto C. Ito Y. Kambayashi Technical Research Center Kansai Electric Power Company Inc. Amagasaki Hyogo Japan C&C Network Systems Engineering Division NEC Corporation Limited Minato Tokyo Japan Department of Social Informatics Graduate School of Informatics Kyoto University Sakyo Kyoto Japan
For computer-supported cooperative work (CSCW), it is very important to understand the activities of users in a group. To support this understanding, we propose a mechanism called an "action history view" wh... 详细信息
来源: 评论
security enforcement using PKI in Semantic Web
Security enforcement using PKI in Semantic Web
收藏 引用
computer Information systems and Industrial Management Applications (CISIM)
作者: Suresh Kumar Rakesh Kr. Prajapati Manjeet Singh Asok De CSE A. I. T. G New Delhi India CSE/IT I. T. S. Engineering College Noida India CSE YMCA University of Sciences and Technology Faridabad India ECE A. I. T. G New Delhi India
The communication technology is developing in internet to use WWW through wired and wireless networks. The electronic authentication system based on PKI (public key infrastructure) was developed in order to guarantee ... 详细信息
来源: 评论
Beyond OFDM: Best-effort dynamic spectrum access using filterbank multicarrier
Beyond OFDM: Best-effort dynamic spectrum access using filte...
收藏 引用
international Communication systems and networks and Workshops, COMSNETS
作者: Sriram N. Premnath Daryl Wasden Sneha K. Kasera Behrouz Farhang-Boroujeny Neal Patwari School of Computing University of Utah USA Department of Electrical & Computer Engineering University of Utah USA
Orthogonal frequency division multiplexing (OFDM), widely recommended for sharing the spectrum among different nodes in a dynamic spectrum access network, imposes tight timing and frequency synchronization requirement... 详细信息
来源: 评论
A Comprehensive Survey on the Efficacy of Machine Learning Algorithms for Detecting DDoS Attacks
A Comprehensive Survey on the Efficacy of Machine Learning A...
收藏 引用
Data, Computation and Communication (ICDCC), international conference on
作者: Dutta Sai Eswari P. V. Lakshmi Department of Computer Science and Engineering GITAM University Visakhapatnam India
Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks are blatant attempts to prevent legitimate users from reaching a service or from using the service they already are using. DDoS attacks are poss... 详细信息
来源: 评论
IoV Cyber Defense: Advancing DDoS Attack Detection with Gini Index in Tree Models
IoV Cyber Defense: Advancing DDoS Attack Detection with Gini...
收藏 引用
international conference on Emerging Trends in networks and computer Communications (ETNCC)
作者: Muhammad Dilshad Bushra Almas Noshina Tariq Husin Bin Jazri Ghadah Naif Alwakid Jan Sher Khan Pranav Kumar Rahul Kumar Institute of Information Technology QuaidiAzam University Islamabad Pakistan Department of Avionic Engineering Air University Islamabad Pakistan School of Computer Science Taylor's University Subang Jaya Malaysia Department of Computer Sciences Jouf University Sakaka Saudi Arabia Division of Research and Development Lovely Professional University Phagwara India KKR and KSR institute of technology and sciences Guntur Andhra Pradesh India
In today's ever-changing world of cybersecurity, where smart devices and the Internet of Vehicles (IoV) are everywhere, it is crucial to have a strong defense against attacks. This paper introduces an intelligent ... 详细信息
来源: 评论
Self-Organizing Smart Grid Services
Self-Organizing Smart Grid Services
收藏 引用
international conference on Next Generation Mobile Applications, Services and Technologies (NGMAST)
作者: Abdalkarim Awad Reinhard German Computer Networks and Communication Systems University of Erlangen Germany
Decentralized and self-organizing mechanisms present promising approaches to deal with the massive amount of data generated by different components in the smart grid. In this work we present a self-organized approach ... 详细信息
来源: 评论