咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是541-550 订阅
排序:
A Multilayer Approach to the security of Blockchain networks of the Future  22nd
A Multilayer Approach to the Security of Blockchain Networks...
收藏 引用
22nd international conference on Computational Science and its Applications (ICCSA)
作者: Bogdanov, Alexander Degtyarev, Alexander Shchegoleva, Nadezhda Korkhov, Vladimir Khvatov, Valery Zaynalov, Nodir Kiyamov, Jasur Dik, Aleksandr St Petersburg State Univ St Petersburg Russia St Petersburg State Marine Tech Univ St Petersburg Russia DGT Technol AG Toronto ON Canada Tashkent Univ Informat Technol Samarkand Branch Samarkand Uzbekistan
Decentralized computing and blockchain technology play a significant role in the implementation of modern digital economy business models. The most noticeable trends in this economy are the diversification and converg... 详细信息
来源: 评论
A Combined Weld Net-UNet Segmentation Model for Welded Seam Detection
A Combined Weld Net-UNet Segmentation Model for Welded Seam ...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Fenxia Liu Junwang Hu Yinjing Yao Guangxi Science & Technology Normal University Laibin China
Nowadays, Weld Seam (WS) detection is important in the field of intelligent manufacturing of welding as well as in the automated detection of defects. However, for the WS detection, point clouds are used as a major as... 详细信息
来源: 评论
Improving Accuracy in Network Intrusion Detection via Machine Learning Algorithms: An In-Depth Examination
Improving Accuracy in Network Intrusion Detection via Machin...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Suriya Prakash J Trishlaa S Soniya R V Lakshmanan Kiran S Department of CSE JAIN (Deemed-to-be-University) Ramnagara India Department of Artificial Intelligence and Machine Learning Rajarajeshwari College of Engineering Bengaluru India Department of Computer Science and Engineering Sri Eshwar College of Engineering Coimbatore India Department of Mathematics Nitte Meenakshi Institute of Technology Bengaluru India
Intrusion detection is essential for securing computer networks by monitoring and analyzing activity to detect and respond to unauthorized access and malicious behavior. By examining network traffic and system logs, i... 详细信息
来源: 评论
vHTTP: Enhancing security for HTTP Requests through Client-Side Mitigation
vHTTP: Enhancing Security for HTTP Requests through Client-S...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Ritesh Mukherjee Roorkee Institute of Technology
The Hypertext Transfer Protocol (HTTP) is a fundamental protocol for web communication but is often exploited due to its inherent vulnerabilities. Attackers can intercept and manipulate HTTP requests, posing significa... 详细信息
来源: 评论
Design of an Iterative Model Incorporating mBERT, CSLM, and ADAN for Multilingual and Code-Switched Sentiment Analysis
Design of an Iterative Model Incorporating mBERT, CSLM, and ...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Kalyani P. Sable S. L. Satarkar CSE Shri Sant Gajanan Maharaj College of Engineering Shegaon India CSE College of Engineering and Technology Akola India
The global spread of code-switched and multilingual content on Twitter highlights the importance of effective sentiment analysis. However, existing algorithms often overlook regional and multilingual tweets, resulting... 详细信息
来源: 评论
Reference Structure of Pluggable Service -based New Retail E-Commerce Platform using Web Application
Reference Structure of Pluggable Service -based New Retail E...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Xin Jiang Department of Business Dalian University of Finance and Economics Dalian China
The huge growth of internet technologies and major spread of recent and advanced system causes maximum diversity and size in new retail e-commerce device development. The usage of Information and Communications Techno... 详细信息
来源: 评论
Intrusion Detection in OT/SCADA Cyber security and Tabular Generative Adversarial networks
Intrusion Detection in OT/SCADA Cyber Security and Tabular G...
收藏 引用
international conference on Developments in esystems Engineering (DESE)
作者: Hillol Biswas Muthyala Manoj Kumar Pawan Kumar Power Division WAPCOS LIMITED Gurgaon India
The modern Smart Grid is characterised by the simultaneous flow of power and information in both directions. It is considered a critical infrastructure within the realm of cyber security frameworks. Traditionally, the... 详细信息
来源: 评论
Enhancing Cybersecurity Through Combined Convolutional Neural Network-Gated Recurrent Unit Approach for distributed Denial of Service Attack Detection
Enhancing Cybersecurity Through Combined Convolutional Neura...
收藏 引用
Innovative Engineering Sciences and Technological Research (ICIESTR), international conference on
作者: Shilpa Choudhary Chris Harry Kandikattu Sandeep Kumar MVV Prasad Kantipudi Munish Kumar Department of Computer Science and Engineering(AI & ML) Neil Gogte Institute of Technology Hyderabad India Department of Computer Science and Engineering Koneru Lakshmaiah Educational Foundations Vijayawada India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram India Symbiosis Institute of Technology Symbiosis International (Deemed University) Pune
In cyber-security, integrating GRU with CNN has proven to be a solid and effective method for detecting distributed Denial of Service (DDoS) attacks. This work presents a robust approach that combines the temporal seq... 详细信息
来源: 评论
Construction of a computer Data security Detection Model based on Artificial Intelligence
Construction of a Computer Data Security Detection Model bas...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Ruzhen Ma School of Modern Information Industry Guangzhou College of Commerce Guangzhou China
In the information society, the network has penetrated into all aspects of people's life, work and study, providing great convenience for people. Hackers attack through key devices in the Internet in a very comple... 详细信息
来源: 评论
Cloud distributed Optimal Control of ESS-PV Residential Inverters
Cloud Distributed Optimal Control of ESS-PV Residential Inve...
收藏 引用
Power systems and Electrical Technology (PSET), IEEE international conference on
作者: Byungchul Kim Eyad H. Abed Department of Electrical and Computer Engineering University of Maryland College Park USA
Perfect power flow methods can be employed to choose which inverters will supply and determine their optimal real and reactive power settings based on financial goals. Utilizing advanced semidefinite relaxation make p... 详细信息
来源: 评论