咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是571-580 订阅
排序:
Decentralized Implementations of SDN-controllers in SDN-FANETs: A Survey  4
Decentralized Implementations of SDN-controllers in SDN-FANE...
收藏 引用
4th international conference on distributed Sensing and Intelligent systems, ICDSIS 2023
作者: Eljack, Aseel Talib, Manar Abu Abbas, Sohail Nasir, Qassim Department of Computer Science University of Sharjah Sharjah United Arab Emirates
The implementation of Software-Defined Networking (SDN) in Flying Ad-hoc networks (FANETs), known as SDN-FANET, has gained significant traction in the past decade. This is particularly due to its eccentric capabilitie... 详细信息
来源: 评论
Deception Detection from Linguistic and Physiological Data Streams Using Bimodal Convolutional Neural networks
Deception Detection from Linguistic and Physiological Data S...
收藏 引用
Information Science, Parallel and distributed systems (ISPDS), international conference on
作者: Panfeng Li Mohamed Abouelenien Rada Mihalcea Zhicheng Ding Qikai Yang Yiming Zhou Department of Electrical and Computer Engineering University of Michigan Ann Arbor USA Department of Computer Science University of Michigan Ann Arbor USA Fu Foundation School of Engineering and Applied Science Columbia University New York USA Department of Computer Science University of Illinois Urbana-Champaign Urbana USA Department of Engineer Sciences Saarland University of Applied Science Saarland Germany
Deception detection is gaining increasing interest due to ethical and security concerns. This paper explores the application of convolutional neural networks for the purpose of multimodal deception detection. We use a... 详细信息
来源: 评论
A Multi-Path Orchestration Method for Cloud-Edge Data Transmission Based on DRL
A Multi-Path Orchestration Method for Cloud-Edge Data Transm...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Zhihui Wang Xubing Dou Shuyun Li Huan Ma Xinchang Zhang Maoli Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Normal University Jinan China QuFu normal university Jining China
In addressing the multi-path problem of cloud-edge data transmission, this paper introduces a multi-path orchestration method based on deep reinforcement learning (DRL) within the context of software-defined networks ... 详细信息
来源: 评论
Dynamic Adaptive Reinforcement Learning based Resource Allocation in Industrial Internet of Things
Dynamic Adaptive Reinforcement Learning based Resource Alloc...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Kai Zhang Jing Li Xiande Zhuo Xi Wang Weicen Lv Xiaojun Li Jin Huang School of Information Engineering Chengdu Industry & Trade College Chengdu China
The resource allocation in distributed environment issue in energy efficient information to ward in resource constraint Industrial Internet of Things (IIoT). Though, because of lacking the flexibility, classical duty ... 详细信息
来源: 评论
Trust-Chain-Based Certificate Revocation Control in Autonomous Vehicle networks  5
Trust-Chain-Based Certificate Revocation Control in Autonomo...
收藏 引用
5th international conference on Information and Communications Technology, ICOIACT 2022
作者: Erceylan, Gizem Akcayol, M. Ali Informatics Institute Gazi University Ankara Turkey Gazi University Department of Computer Engineering Ankara Turkey
One of the biggest problems in V2X communication is the inclusion of faulty or illegal nodes in the network. In V2X systems using PKI, the primary approach is to revoke the certificates of malicious and compromised ve... 详细信息
来源: 评论
Agricultural Intelligence: Federated Learning CNN's Models for Jute Leaf Disease Analysis  11
Agricultural Intelligence: Federated Learning CNN's Models f...
收藏 引用
11th international conference on Reliability, Infocom Technologies and Optimization, ICRITO 2024
作者: Rajput, Kapil Garg, Ashish Kukreja, Vinay Mehta, Shiva Graphic Era Hill University Computer Science and Engineering Uttarakhand Dehradun India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
The research study performs an experimental analysis of a federated learning system that uses convolutional neural networks (CNNs) to detect and classify jute leaf diseases from many distributed data sources. We focus... 详细信息
来源: 评论
Reproduction Mechanism with Squirrel Search Algorithm for Cloud Computing Resource Management
Reproduction Mechanism with Squirrel Search Algorithm for Cl...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Jinming Zhang Department of Information Technology Yantai Vocational College Yantai China
The cloud computing introduced to generate user requirements to access resource computing to users for purchasing cloud service as essential concept of on-demand resource sharing by highly internet-based applications.... 详细信息
来源: 评论
A Survey on Machine Learning Approaches for Intrusion Detection in Cloud Computing Environments for Improving Routing Payload security and Network Privacy
A Survey on Machine Learning Approaches for Intrusion Detect...
收藏 引用
2024 IEEE international conference on Industry 4.0, Artificial Intelligence, and Communications Technology, IAICT 2024
作者: Vivek, Vullikanti Veeravalli, Bharadwaj Department of Electrical and Computer Engineering National University of Singapore Singapore
distributed denial-of-service (DDoS) attacks can significantly impair the network’s availability, and recent statistics show that 30% of cyber-attacks are based on network intrusion, with 27% of incidents occurring i... 详细信息
来源: 评论
Maximize Leader Election Algorithm Performance in Bi-Directional Ring networks With Both Links Down Between Two Nodes  25
Maximize Leader Election Algorithm Performance in Bi-Directi...
收藏 引用
25th international Arab conference on Information Technology, ACIT 2024
作者: Al Refai, Mohammed N. Fawareh, Hamed Aljawawdeh, Hamzeh Alshraiedeh, Fuad Sameh Al-Quraan, Mohammad Al-Odat, Hisham Ali Otoom, Ahmed Jamhawi, Zeyad M. Kanan, Mohammad Zarqa University Software Engineering Dep. Zarqa Jordan Zarqa University Zarqa Jordan Applied Science Private University Department of Cyber Security Amman Jordan Applied Science Private University Department of Computer Science Amman Jordan University of Business and Technelogy Dep. of Industry Engineering Jeddah21432 Saudi Arabia
The process of selecting a leader to avoid instability in distributed system network after leader failure is called Leader Election Algorithm (LEA). This process becomes more complicated when it faces intermittent or ... 详细信息
来源: 评论
security Enhancement in Network Based Intrusion Detection Using Natural Language Processing with GAN concept and BEGAN Model
Security Enhancement in Network Based Intrusion Detection Us...
收藏 引用
Blockchain and distributed systems security (ICBDS), IEEE international conference on
作者: Anjali Sanjivanrao More Kaustubh Harishchandra Nimbalkar Nikhileshwar Vijayprakash Jatale Aniket Hanumant Kale Hrishikesh Ashokkumar Nagargoje Department of Computer Engineering Suman Ramesh Tulsiani Technical Campus FoE MH India
Cyber-attacks, particularly in recent times represent a major problem demanding novel measures consistent with modern digital structures. Some of the dangers that cybercrime entails encompass phishing, ransomware, DDo... 详细信息
来源: 评论