咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是581-590 订阅
排序:
Adversarial Attacks and Defenses Using Machine Learning for Cybersecurity in Corporates
Adversarial Attacks and Defenses Using Machine Learning for ...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: R. Gopinath C. Sathiyamoorthy D. Sugumaran K.S. Giriprasath Neha Tripathi Mohammad Arif Department of Computer Science and Engineering K S.Rangasamy College of Technology Tamil Nadu India Department of Commerce Saveetha College of Liberal Arts and Sciences Chennai Tamil Nadu India Department of Information Technology Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Chennai Tamil Nadu India Department of Computer Science and Engineering PSG Institute of Technology and Applied Research Coimbatore Tamil Nadu India Graphic Era Deemed to be University Dehradun Uttarakhand India School of Computer Science & Engineering Vellore Institute of Technology Vellore Tamil Nadu India
This article suggests a novel method for protecting corporate cybersecurity systems from malevolent attacks, based on Capsule networks (CapsNets). The enhancement of hierarchical feature learning by Capital networks i... 详细信息
来源: 评论
Secure Resource Allocation Protocol (SecRAP) for Time-Sensitive Networking
Secure Resource Allocation Protocol (SecRAP) for Time-Sensit...
收藏 引用
international conference on Emerging Technologies and Factory Automation (ETFA)
作者: Lukas Osswald Steffen Lindner Lukas Bechtel Tobias Heer Michael Menth University of Tuebingen Chair of Communication Networks Tuebingen Germany Esslingen University Computer Science and Engineering Esslingen Germany
The convergence of operational technology (OT) and information technology (IT) networks through Time-Sensitive Networking (TSN) promises enhanced efficiency and new use cases in industrial settings. However, ensuring ... 详细信息
来源: 评论
5th international conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2023, held as part of the 25th international conference on Human-computer Interaction, HCII 2023
5th International Conference on HCI for Cybersecurity, Priva...
收藏 引用
5th international conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2023, held as part of the 25th international conference on Human-computer Interaction, HCII 2023
The proceedings contain 44 papers. The special focus in this conference is on HCI for Cybersecurity, Privacy and Trust. The topics include: Usable Implementation of Data Sovereignty in Digital Ecosystems;res...
来源: 评论
Performance Analysis of Linear Regression based Simple Reflex Artificial Intelligence Agent to Detect Malwares
Performance Analysis of Linear Regression based Simple Refle...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: P. Kalaivani C. Venkatesh Department of ECE Salem College of Engineering and Technology Salem Tamilnadu India Department of ECE KGISL Institute of Technology Coimbatore Tamilnadu India
The new pathogen detection method is developed using Linear Regression and Simple Reflex. This is accomplished using artificial intelligence. This straightforward yet efficient real-time detection method employs linea... 详细信息
来源: 评论
Progress in Artificial Intelligence Applications Based on the Combination of Self-Driven Sensors and Deep Learning  4
Progress in Artificial Intelligence Applications Based on th...
收藏 引用
4th international conference on Consumer Electronics and computer Engineering, ICCECE 2024
作者: Wan, Weixiang Sun, Wenjian Zeng, Qiang Pan, Linying Xu, Jingyu University of Electronic Science and Technology of China Electronics & Communication Engineering Chengdu China Yantai University Electronic and Information Engineering Shandong Yantai China Zhejiang University Computer Technology Zhejiang Hangzhou China Trine University Information Studies PhoenixAZ United States Northem Arizona University Computer Information Technology FlagstaffAZ United States
In the era of the Internet of Things, developing a smart sensor system with sustainable power supply, easy deployment, and flexible use has become a challenging problem. Traditional power supplies, prone to frequent r... 详细信息
来源: 评论
Federated Orchestration Framework for Integrated Core and Edge Network security: Combining P4-ShieldNet and SAFE-CAST
Federated Orchestration Framework for Integrated Core and Ed...
收藏 引用
IEEE international conference on Big Data
作者: Yusuf Kursat Tuncel Kasim Oztoprak Department of Computer Engineering Konya Food and Agriculture University Konya Turkiye
This paper introduces a Federated Orchestration Framework that integrates P4-ShieldNet for core network security with SAFE-CAST for edge security, addressing the complex challenges in modern telecommunication networks... 详细信息
来源: 评论
Comparative Analysis of an AI-enabled State-of-the-Art Models for the Detection of DDoS Attacks on IoT Devices  3
Comparative Analysis of an AI-enabled State-of-the-Art Model...
收藏 引用
3rd international conference on Disruptive Technologies, ICDT 2025
作者: Kumar, Rajneesh Gulati, Gaurav Gupta, Bhupesh Chhabra, Mohit Maharishi Markandeshwar Engineering College Mmdu Department of Computer Science & Engineering Haryana Mullana India Ims Engineering College Department of Computer Science& Engineering UP Ghaziabad India
With technological advancement, distributed Denial of Service (DDoS) attacks are gaining momentum in IoT networks. DDoS attacks are widely spreading on IoT devices since they have limited resources (memory) and no eff... 详细信息
来源: 评论
Intrusion Detection systems for Cyber Attacks Detection in Power Line Communications networks
Intrusion Detection Systems for Cyber Attacks Detection in P...
收藏 引用
Euromicro conference on Parallel, distributed and Network-Based Processing
作者: Kashif Naseer Qureshi Noman Arshad Thomas Newe Department of Electronic & Computer Engineering University of Limerick Limerick Ireland Department of Computer Science Bahria University Islamabad Pakistan
Power Line Communication (PLC) is categorized into wired and wireless technologies to distribute the power and transmit the data at different frequency ranges. System administration is one of the significant area in t...
来源: 评论
Key Observation to Prevent IP Spoofing in DDoS Attack on Cloud Environment  8th
Key Observation to Prevent IP Spoofing in DDoS Attack on Clo...
收藏 引用
8th international conference on Soft Computing: Theories and Applications, SoCTA 2023
作者: Sunitha, T. Vijayashanthi, V. Navaneethakrishan, M. Mohanaprakash, T.A. Ashwin, S. Harish, T.R. Stanes, Emmanuel A. Department of Computer Science and Engineering P. B. College of Engineering Chennai India Chennai India Department of Computer Science and Engineering St. Joseph College of Engineering Sriperumbudur Chennai India Department of Computer Science and Engineering Panimalar Engineeering College Varadharajapuram Poonamallee Chennai India Department of Computer Science and Engineering Panimalar Insitute of Technology Varadharajapuram Poonamallee Chennai India
The utilization of Cloud to put together and execute distributed Denial of Service (DDoS) assaults is well-known among programmers in the current scenario. In the existing framework, networks can use Border Gateway Pr... 详细信息
来源: 评论
Federated Intrusion Detection on Non-IID Data for IIoT networks Using Generative Adversarial networks and Reinforcement Learning  17th
Federated Intrusion Detection on Non-IID Data for IIoT Netwo...
收藏 引用
17th international conference on Information security Practice and Experience (ISPEC)
作者: Nguyen Huu Quyen Phan The Duy Nguyen Chi Vy Do Thi Thu Hien Van-Hau Pham Univ Informat Technol Informat Secur Lab Ho Chi Minh City Vietnam Vietnam Natl Univ Ho Chi Minh City Vietnam
Federated learning (FL) has become the promising approach for building collaborative intrusion detection systems (IDS) as providing privacy guaranteeing among data holders. Nevertheless, the non-independent and identi... 详细信息
来源: 评论