咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 87 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 5,104 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 496 篇 security
  • 355 篇 wireless sensor ...
  • 312 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 202 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 155 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 149 篇 cryptography
  • 147 篇 computer science
  • 142 篇 computational mo...
  • 142 篇 internet
  • 140 篇 data security

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...
  • 6 篇 the islamic univ...
  • 6 篇 graphic era deem...

作者

  • 9 篇 hammoudeh mohamm...
  • 9 篇 obaidat mohammad...
  • 8 篇 igor kotenko
  • 8 篇 eyas el-qawasmeh
  • 7 篇 yanmin zhu
  • 7 篇 barolli leonard
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 mohammad s. obai...
  • 6 篇 shahid raza
  • 6 篇 thiemo voigt
  • 6 篇 natrayan l
  • 6 篇 das sajal k.
  • 6 篇 mohammad hammoud...
  • 6 篇 keromytis angelo...
  • 5 篇 isaac woungang
  • 5 篇 ma jianfeng
  • 5 篇 lionel m. ni
  • 5 篇 wehrle klaus

语言

  • 4,987 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5104 条 记 录,以下是51-60 订阅
排序:
Research on Building a Standardized Library for Auditing Heterogeneous Information Models in distributed Data  7
Research on Building a Standardized Library for Auditing Het...
收藏 引用
7th IEEE international conference on Information systems and computer Aided Education, ICISCAE 2024
作者: Heping, Huang Zhonglu, Zou Zhicai, Huang Dongguan Power Supply Bureau Guangdong Power Grid Corporation Guangdong Dongguan523000 China
With the advancement of smart grid transformation, the configuration audit of distribution network communication networks faces challenges such as diversified network devices, numerous manufacturers, and multi-source ... 详细信息
来源: 评论
Deception Detection from Linguistic and Physiological Data Streams Using Bimodal Convolutional Neural networks  5
Deception Detection from Linguistic and Physiological Data S...
收藏 引用
5th international conference on Information Science, Parallel and distributed systems, ISPDS 2024
作者: Li, Panfeng Abouelenien, Mohamed Mihalcea, Rada Ding, Zhicheng Yang, Qikai Zhou, Yiming University of Michigan Department of Electrical and Computer Engineering Ann Arbor United States University of Michigan Department of Computer Science Ann Arbor United States Columbia University Fu Foundation School of Engineering and Applied Science New York United States University of Illinois Urbana-Champaign Department of Computer Science Urbana United States Saarland University of Applied Science Department of Engineer Sciences Saarland Germany
Deception detection is gaining increasing interest due to ethical and security concerns. This paper explores the application of convolutional neural networks for the purpose of multimodal deception detection. We use a... 详细信息
来源: 评论
Generating Explanations for Model Incorrect Decisions via Hierarchical Optimization of Conceptual Sensitivity
Generating Explanations for Model Incorrect Decisions via Hi...
收藏 引用
international Joint conference on Neural networks (IJCNN)
作者: Gao, Lijun Sun, Zeyang Yan, Jiaxin Wang, Suran Zhang, Youzhi Jin, Xiao Shenyang Aerosp Univ Sch Comp Sci Shenyang Liaoning Peoples R China
The capacity to analyze the causes of poor decisions made by visual recognition models is becoming increasingly crucial as the security requirements of various real-world systems continue to escalate. However, the com... 详细信息
来源: 评论
Securing the Digital Realm Data Engineering and Deep Learning in Cybersecurity Crime Prevention
Securing the Digital Realm Data Engineering and Deep Learnin...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Jeyaram, A. Muthukumaravel, A. Bharath Institute of Higher Education and Research Department of Computer Science Chennai India Bharath Institute of Higher Education and Research Department of Arts and Science Chennai India
The digital world of today is always evolving;hence strong cybersecurity measures are more crucial than before. Conventional cybersecurity defences frequently fall short in identifying and countering sophisticated cyb... 详细信息
来源: 评论
On-Device AI security Solutions: A Study on Lightweight Ensemble Learning Technique  17
On-Device AI Security Solutions: A Study on Lightweight Ense...
收藏 引用
17th international conference on COMmunication systems and networks, COMSNETS 2025
作者: Dong, Huiyao Kotenko, Igor ITMO University Faculty of Information Technology and Security Saint Petersburg Russia St. Petersburg Federal Research Center of the RAS Laboratory of Computer Security Problems Saint Petersburg Russia
IoT security poses a significant challenge due to the presence of extensive confidential data and vulnerable devices. Artificial intelligence (AI) is increasingly viewed as pivotal in cybersecurity, enhancing the effi... 详细信息
来源: 评论
Realtime Intrusion Detection in Unmanned Aerial Vehicles Using Active Learning and Generative Adversarial networks  29
Realtime Intrusion Detection in Unmanned Aerial Vehicles Usi...
收藏 引用
29th IEEE international conference on Parallel and distributed systems, ICPADS 2023
作者: Zeng, Qingli Barnt, Kailynn Ragan, Luke Nait-Abdesselam, Farid University of Missouri Kansas City United States
This paper introduces a novel real-time intrusion detection approach for UAV networks, addressing current security challenges. We leverage Generative Adversarial networks (GANs) to generate synthetic data and implemen... 详细信息
来源: 评论
Evaluating the security and Privacy of Blockchain Integration in Domain Name systems  7
Evaluating the Security and Privacy of Blockchain Integratio...
收藏 引用
7th IEEE international conference on computer and Communication Engineering Technology, CCET 2024
作者: Samonte, Mary Jane C. Abaleta, Raphael M. Cayabyab, Maverick D. Guerrero, Ladner Gilion D. School of Information Technology Mapúa University Makati City Philippines
Domain Name systems (DNS) are crucial components of any modern network, as they allow users to type in a domain name as opposed to complete IP addresses to visit web pages on the internet. The DNS resolution process t... 详细信息
来源: 评论
An Innovative Markovian Environment for Intrusion Detection in IoT networks
An Innovative Markovian Environment for Intrusion Detection ...
收藏 引用
2024 international conference on computer and Applications, ICCA 2024
作者: Hesham, Eslam Hamdy, Abeer Nagaty, Khaled The British University in Egypt Cairo Egypt The British University in Egypt Cairo Egypt The British University in Egypt Cairo Egypt
Recently, cyberattacks on IoT (Internet of Things) and IIoT (Industrial Internet of Things) networks have become increasingly complicated and more frequent. These attacks have posed considerable threats such as Distri... 详细信息
来源: 评论
Cloud distributed Optimal Control of ESS-PV Residential Inverters  3
Cloud Distributed Optimal Control of ESS-PV Residential Inve...
收藏 引用
3rd international conference on Power systems and Electrical Technology, PSET 2024
作者: Kim, Byungchul Abed, Eyad H. University of Maryland Department of Electrical and Computer Engineering College ParkMD United States
Perfect power flow methods can be employed to choose which inverters will supply and determine their optimal real and reactive power settings based on financial goals. Utilizing advanced semidefinite relaxation make p... 详细信息
来源: 评论
Finding of DDoS Attack in IoT-Based networks Using Ensemble Technique
Finding of DDoS Attack in IoT-Based Networks Using Ensemble ...
收藏 引用
2024 international conference on Intelligent systems for Cybersecurity, ISCS 2024
作者: Srivastava, Animesh Tiwari, Shweta Kumar, Deepak Garg, Navin Graphic Era Hill University Department of Computer Science and Engineering Dehradun India Chandigarh University Department of Computer Science and Engineering University Institute of Engineering Punjab Mohali India Sgt University Department of Computer Science and Engineering Gurugram India Uttarakhand Dehradun India
Ensemble techniques could find DDoS attacks more quickly in IoT. A more dependable and precise detection system can be achieved by integrating the most advantageous attributes of XGBoost and Random Forest. This ensure... 详细信息
来源: 评论