咨询与建议

限定检索结果

文献类型

  • 4,982 篇 会议
  • 280 册 图书
  • 89 篇 期刊文献

馆藏范围

  • 5,351 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,876 篇 工学
    • 2,567 篇 计算机科学与技术...
    • 1,716 篇 软件工程
    • 978 篇 信息与通信工程
    • 373 篇 电气工程
    • 304 篇 控制科学与工程
    • 183 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 121 篇 电子科学与技术(可...
    • 121 篇 安全科学与工程
    • 112 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 44 篇 交通运输工程
  • 615 篇 理学
    • 368 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 101 篇 统计学(可授理学、...
    • 85 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 185 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 240 篇 法学
    • 165 篇 法学
    • 81 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 500 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,230 篇 英文
  • 90 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5351 条 记 录,以下是51-60 订阅
排序:
distributed BERT-based Detection systems for IoT networks Against Coordinated Bot Attacks
Distributed BERT-based Detection Systems for IoT Networks Ag...
收藏 引用
international conference on ent Computing and Control systems (ICICCS)
作者: Ayesha Siddhika A Balamurugan P Logeshwaran C K T Subalaxmi Computer Science and Engineering K.S. Rangasamy College of Technology India
The fast development of Web of Things (IoT) systems has made botnet attacks, such as dissent of benefit (DDoS), gadget verification, and information cancelation, a genuine security opportunity. These attacks misuse vu... 详细信息
来源: 评论
A Privacy-Preserving computer-Aided Diagnosis Framework for Medical Applications Using Federated Learning and Homomorphic Encryption  7th
A Privacy-Preserving Computer-Aided Diagnosis Framework for...
收藏 引用
7th international conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024
作者: Xiong, Jichao Chen, Jiageng Liu, Hui Zhou, Guangyou Cui, Jianqun Lin, Junyu Jiao, Dian School of Computer Science and Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Central China Normal University Wuhan430079 China School of Central China Normal University Wollongong Joint Institute Central China Normal University Wuhan430079 China
Skin cancer is one of the most common cancers worldwide, where early detection significantly reduces mortality rates. Integrating Internet of Things (IoT) technologies into healthcare enables continuous monitoring and... 详细信息
来源: 评论
Detection of Anomalous Cryptocurrency Transactions Using Neural networks with Decision-making Explanation
Detection of Anomalous Cryptocurrency Transactions Using Neu...
收藏 引用
Euromicro conference on Parallel, distributed and Network-Based Processing
作者: Dmitry Levshun Ksenia Zhernova Andrey Chechulin St. Petersburg Federal Research Center of the Russian Academy of Sciences Saint Petersburg Russia
The objective of this paper is to explore an effective approach for detecting anomalies in cryptocurrency transactions using artificial intelligence techniques. The proposed method is compared with existing approaches... 详细信息
来源: 评论
New Cloud Computing Authentication Based on Secure Hash Algorithm (SHA-3) and Lightweight Sosemanuk Algorithm  2nd
New Cloud Computing Authentication Based on Secure Hash Algo...
收藏 引用
2nd international conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Niaf, Jolan Rokan Kadhim, Aqeel Kamil Mohammed, Qutaiba Humadi Hoomod, Haider K. Salman, Muna Muhsen Iraqi Commission for Computers & Informatics Informatics Institute for Postgraduate Studies Baghdad Iraq Computer Techniques Engineering Department Imam Al-Kadhim College Baghdad Iraq College of Nursing University of Baghdad Baghdad Iraq College of Education Al-Mustansiriyah University Baghdad Iraq Ministry of Science and Technology Department of Information Technology Baghdad Iraq
The term "cloud computing" refers to a vast network of linked, virtually hosted, and easily updatable computer resources. That are capable of consisting of a number of different apps and offering a number of... 详细信息
来源: 评论
A Cutting-Edge Method on Big Data Analytics Recent Developments for Business Operations and security Management  6th
A Cutting-Edge Method on Big Data Analytics Recent Developme...
收藏 引用
6th international conference on Smart Computing and Informatics, SCI 2024
作者: Razzhivin, Oleg Anatolevich Ollanazarov, Bekmurod Davlatmuratovich Okagbue, Hilary Izuchukwu Andryushchenko, Iryna Evgenievna Department of Theory and Methods of Physical Culture and Life Safety of Elabuga Institute Kazan Federal University Kazan Russian Federation Department of Tourism Urgench State University Urgench Uzbekistan Sydani Institute for Research and Innovation Sydani Group Abuja Nigeria Department of Mathematics Covenant University Ota Nigeria Khorezm University of Economics Urgench Uzbekistan Mamun University Khiva Uzbekistan Department of Finance Banking and Insurance National University “Zaporizhzhia Polytechnic” Zaporizhzhia Ukraine
The management of a corporation could be significantly enhanced by the use of big data. There has not been enough statistical investigation to determine the importance of large data in the malignancy of the highly fun... 详细信息
来源: 评论
Proposing a novel approach based on GAN neural networks to address data poisoning attacks in federated learning  29
Proposing a novel approach based on GAN neural networks to a...
收藏 引用
29th international computer conference, computer Society of Iran, CSICC 2025
作者: Rahmat, Mohammad Ghabel Zarafshan, Faraneh Department of Computer Engineering Karaj Branch Islamic Azad University Karaj Iran
Data poisoning attacks are one of the serious threats in federated learning, which can disrupt the performance of the central model by injecting poisoned data into local nodes. These attacks are particularly significa... 详细信息
来源: 评论
Function Scheduling with Data security in Serverless Computing systems
Function Scheduling with Data Security in Serverless Computi...
收藏 引用
international Communication systems and networks and Workshops, COMSNETS
作者: Srestha Saha Arvind Pandey Sourav Kanti Addya Shubha Brata Nath Department of Computer Science and Engineering Indian Institute of Information Technology Guwahati India Department of Computer Science and Engineering SRM Institute of Science and Technology Tamil Nadu India Department of Computer Science and Engineering National Institute of Technology Karnataka Surathkal India
In serverless computing, the service provider takes full responsibility for function management. However, serverless computing has many challenges regarding data security and function scheduling. To address these chal... 详细信息
来源: 评论
A Survey on Intelligent Attack Mitigation and Latency Optimization in High-Speed Edge networks using Deep Learning and Bio-Inspired Algorithms
A Survey on Intelligent Attack Mitigation and Latency Optimi...
收藏 引用
Trends in Material Science and Inventive Materials (ICTMIM), international conference on
作者: Gandham Kiran Kumar M. Thirumaran Department of Computer Science and Engineering Puducherry Technological University Puducherry India
As the Internet connected devices and cyber– physical systems (CPS) are exponentially increasing, edge computing has become a crucial enabler to support real time processing in high-speed networks (HSNs). However, in... 详细信息
来源: 评论
distributed Primal-Dual Interior Point Framework for Analyzing Infeasible Combined Transmission and Distribution Grid networks  58
Distributed Primal-Dual Interior Point Framework for Analyzi...
收藏 引用
58th Hawaii international conference on System Sciences, HICSS 2025
作者: Ali, Muhammad Hamza Pandey, Amritanshu University of Vermont United States
The proliferation of distributed energy resources has heightened the interactions between transmission and distribution (T&D) systems, necessitating novel analyses for the reliable operation and planning of interc... 详细信息
来源: 评论
Advanced Machine Learning Approach for Cyber Attack Detection in Cloud Computing
Advanced Machine Learning Approach for Cyber Attack Detectio...
收藏 引用
2025 international conference on Intelligent Control, Computing and Communications, IC3 2025
作者: Yadav, Shashi Bhushan Singh Shelke, Nitin Arvind Singh, Jagendra Yasmeen Pandey, Deependra Himanshi Bbd Northern India Institute of Technology Department Computer Science & Engineering Lucknow India School of Computer Science Engineering & Technology Bennett University Greater Noida India Cvr College of Engineering Department of CSE-DS Hyderabad India Amity School of Engineering and Technology Amity University Department of Ece Lucknow India Raj Kumar Goel Institute of Technology Department of Information Technology Ghaziabad India
Cloud computing has become the most important part of modern IT infrastructure, which is scalable and flexible. However, with such wide-scale adoption, new vulnerabilities have been introduced into the system, making ... 详细信息
来源: 评论