咨询与建议

限定检索结果

文献类型

  • 4,983 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,233 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是501-510 订阅
排序:
Re-Encryption Model for Multi-Block Data Updates in Network security  1
Re-Encryption Model for Multi-Block Data Updates in Network ...
收藏 引用
1st international conference on Applied Artificial Intelligence and Computing, ICAAIC 2022
作者: Devaki, K. Leena Jenifer, L. Rajalakshmi Engineering College Dept. of Computer Science and Engineering Chennai India
Nowadays, online cloud storage networks can be accessed by third parties. Businesses that host large data centers buy or rent storage space from individuals who need to store their data. According to customer needs, d... 详细信息
来源: 评论
6G-SECUREIDS: Blockchain-Enhanced Secure Knowledge Transfer for distributed Intrusion Detection systems in Advanced networks
6G-SECUREIDS: Blockchain-Enhanced Secure Knowledge Transfer ...
收藏 引用
international conference on Networking and Advanced systems (ICNAS)
作者: Sabrina Sakraoui Makhlouf Derdour Ahmed Ahmim Department of Computer Science Networks and Systems Laboratory Badji Mokhtar Annaba University Annaba Algeria Department of Computer Science Networks and Systems Laboratory Oum El Bouaghi University Oum El Bouaghi Algeria Dpt. of Mathematics and Computer Science Networks and Systems Laboratory Mohamed-Cherif Messaadia University Souk Ahras Algeria
As the development of wireless networks advances towards the deployment of 6G technology, ensuring robust security measures becomes crucial. In this paper, we propose 6G-SECUREIDS, a novel intrusion detection system d...
来源: 评论
Performance Analysis of DDoS Mitigation in Heterogeneous Environments  2
Performance Analysis of DDoS Mitigation in Heterogeneous Env...
收藏 引用
2nd international conference on Interdisciplinary Cyber Physical systems, ICPS 2022
作者: Verma, Amandeep Saha, Rahul Lovely Professional University School of Computer Science and Engineering India
computer and Vehicular networks, both are prone to multiple information security breaches because of many reasons like lack of standard protocols for secure communication and authentication. distributed Denial of Serv... 详细信息
来源: 评论
Opcode based malware detection using Stacked Recurrent Neural networks and Convolutional Neural networks
Opcode based malware detection using Stacked Recurrent Neura...
收藏 引用
Blockchain and distributed systems security (ICBDS), IEEE international conference on
作者: Arya Gokhale Yash Lad Akshit Mahaur Rashmi Rane School of Computer Engineering and Technology MIT World Peace University Pune India
Malwares is designed to infiltrate devices and in most cases the underlying operating system and are packaged in multiple file formats. Considering that Windows operating system is one of the most opted operating syst... 详细信息
来源: 评论
Enhanced Hybrid Deep Learning Model for distributed Denial of Service Attack Detection in IoT Environments
Enhanced Hybrid Deep Learning Model for Distributed Denial o...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Sharmila Kumari N H S Vimala Pruthvi C N Shreyas J Dept. of CSE UVCE Bengaluru India Dept. of CSE Dayananda Sagar College of Engineering Bengaluru India Dept. of Information Technology Manipal Academy of Higher Education Manipal Bengaluru India
security concerns have grown significantly with the proliferation of Internet of Things (IoT) devices, particularly in light of distributed Denial of Service (DDoS) attacks. Network resources may be overloaded by thes... 详细信息
来源: 评论
Function Scheduling with Data security in Serverless Computing systems
Function Scheduling with Data Security in Serverless Computi...
收藏 引用
international Communication systems and networks and Workshops, COMSNETS
作者: Srestha Saha Arvind Pandey Sourav Kanti Addya Shubha Brata Nath Department of Computer Science and Engineering Indian Institute of Information Technology Guwahati India Department of Computer Science and Engineering SRM Institute of Science and Technology Tamil Nadu India Department of Computer Science and Engineering National Institute of Technology Karnataka Surathkal India
In serverless computing, the service provider takes full responsibility for function management. However, serverless computing has many challenges regarding data security and function scheduling. To address these chal... 详细信息
来源: 评论
Integration of Heterogeneous IDS with SIEM for DDoS Attack Detection in computer Networked Multi-Organizational Environments
Integration of Heterogeneous IDS with SIEM for DDoS Attack D...
收藏 引用
Communications, Information, Electronic and Energy systems (CIEES), international conference on
作者: M. Akmal Maliki Parman Sukarno Aulia Arif Wardana School of Computing Telkom University Bandung Indonesia Faculty of ICT Wrocław University of Science and Technology Wrocław Poland
The increasing reliance on computer networks for business operations has led to a rise in distributed Denial of Service (DDoS) attacks. These attacks pose significant threats to network security, economic stability, a... 详细信息
来源: 评论
23rd international conference on Embedded computer systems: Architectures, Modeling, and Simulation, SAMOS 2023
23rd International Conference on Embedded Computer Systems: ...
收藏 引用
23rd international conference on Embedded computer systems: Architectures, Modeling, and Simulation, SAMOS 2023
The proceedings contain 36 papers. The special focus in this conference is on Embedded computer systems: Architectures, Modeling, and Simulation. The topics include: Micro-architecture and Control Electronics Simulati...
来源: 评论
Use of blockchain in health sensor networks to secure information integrity and accountability  13th
Use of blockchain in health sensor networks to secure inform...
收藏 引用
13th international conference on Emerging Ubiquitous systems and Pervasive networks, EUSPN / The 12th international conference on Current and Future Trends of Information and Communication Technologies in Healthcare, ICTH 2022 / Affiliated Workshops
作者: Godawatte, Kithmini Branch, Philip But, Jason Swinburne University of Technology John Street Hawthorn Australia
Accountability and integrity are likely to play a key role in emerging health sensor network environments. Since health sensor devices are low capability devices, they are particularly susceptible to modern cyber thre... 详细信息
来源: 评论
Detection of Anomalous Cryptocurrency Transactions Using Neural networks with Decision-making Explanation
Detection of Anomalous Cryptocurrency Transactions Using Neu...
收藏 引用
Euromicro conference on Parallel, distributed and Network-Based Processing
作者: Dmitry Levshun Ksenia Zhernova Andrey Chechulin St. Petersburg Federal Research Center of the Russian Academy of Sciences Saint Petersburg Russia
The objective of this paper is to explore an effective approach for detecting anomalies in cryptocurrency transactions using artificial intelligence techniques. The proposed method is compared with existing approaches... 详细信息
来源: 评论