咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是611-620 订阅
排序:
Optimizing Job Search: A Multi-Model Approach with DRNN-BES, Collaborative Filtering, and LLM-NER Resume Analysis
Optimizing Job Search: A Multi-Model Approach with DRNN-BES,...
收藏 引用
Blockchain and distributed systems security (ICBDS), IEEE international conference on
作者: Naveenkumar Jayakumar Netra Patil Roshankumar S. Pokal Rudra Pratap Dev Sidharth Nair School of Computer Science and Engineering Vellore Institute of Technology Vellore Dept. of Computer Engineering College of Engineering Bharati Vidyapeeth (Deemed to be University) Pune
This research introduces an innovative job recommendation platform designed to optimize the job search process through advanced technology integration. The platform features a sophisticated Resume Analyzer leveraging ... 详细信息
来源: 评论
Evaluating the security and Privacy of Blockchain Integration in Domain Name systems
Evaluating the Security and Privacy of Blockchain Integratio...
收藏 引用
IEEE international conference on computer and Communication Engineering Technology (CCET)
作者: Mary Jane C. Samonte Raphael M. Abaleta Maverick D. Cayabyab Ladner Gilion D. Guerrero School of Information Technology Mapúa University Makati City Philippines
Domain Name systems (DNS) are crucial components of any modern network, as they allow users to type in a domain name as opposed to complete IP addresses to visit web pages on the internet. The DNS resolution process t... 详细信息
来源: 评论
Orphanage Channelization System Using Blockchain Technology
Orphanage Channelization System Using Blockchain Technology
收藏 引用
international conference on Recent Developments in Cyber security, ReDCySec 2023
作者: Choudhary, Tapasya Aggarwal, Vanshika Srivastava, Shivansh Trivedi, Shivani Department of Computer Science and Engineering ABESEC Ghaziabad India
Due to substance abuse or mental illness in the biological home, or the parent may simply be unwilling to care for the child. For such scenarios, various orphanages are running which is a shelter home or group home, b... 详细信息
来源: 评论
Comprehensive Study on Authentication Methods in Wireless networks  7th
Comprehensive Study on Authentication Methods in Wireless Ne...
收藏 引用
7th international conference on Soft Computing and Signal Processing, ICSCSP 2024
作者: Kumar, Gotte Ranjith Babu, K. Suresh Research Scholar Department of Computer Science and Engineering Jawaharlal Nehru Technological University Kukatpally Telangana Hyderabad500085 India Assistant Professor School of CS&AI SR University Telangana Warangal506371 India Professor Department of Computer Science and Engineering Jawaharlal Nehru Technological University Kukatpally Telangana Hyderabad500085 India
Mobile devices, empowered by advanced wireless networks, have revolutionized information sharing and productivity across industries. However, this ubiquitous connectivity exposes user privacy and security to risks. Th... 详细信息
来源: 评论
Face Mask Detection and Recognition System  1
Face Mask Detection and Recognition System
收藏 引用
1st IEEE international conference on Blockchain and distributed systems security, ICBDS 2022
作者: Gaiki, Sonali Deshmukh, Hrucha Gore, Sanjana Maddipati, Ramya Kamble, Shailesh Yeshwantrao Chavan College of Engineering Department of Computer Technology Nagpur India Indira Gandhi Delhi Technical University for Women Department of Artificial Intelligence and Data Science Delhi India
As today a disease called COVID-19 is causing health crisis and deaths, it became most essential to wear a mask for protecting ourselves from Corona virus. Even in public areas, where is more rush we should wear mask ... 详细信息
来源: 评论
Enhancing DDoS Attack Detection in SDN with a Stacked Model Framework Utilizing Deep Neural networks
Enhancing DDoS Attack Detection in SDN with a Stacked Model ...
收藏 引用
IEEE international conference on Consumer Electronics (ICCE)
作者: Aishita Sharma Sunil K. Singh Sudhakar Kumar Shin Hung Pan Brij B. Gupta Kwok Tai Chui Department of CSE Chandigarh College of Engineering and Technology Chandigarh India Department of Information Management Asia University Taiwan Department of Computer Science and Information Engineering Asia University Taiwan University of Economics and Human Sciences in Warsaw Poland Hong Kong Metropolitan University Hong Kong
Software Defined Networking enhances network management and security through centralized control, vital for the growth of consumer electronics. With the rise of smart devices and IoT systems, the demand for scalable n... 详细信息
来源: 评论
Real-Time Visualization and Detection of Malicious Network Flows in IoT Devices using a Scalable Stream Processing Pipeline
Real-Time Visualization and Detection of Malicious Network F...
收藏 引用
international conference on Parallel distributed and Grid Computing (PDGC)
作者: S. Saravanan B. Uma Maheswari Kanagasundaram K Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India Nokia Networks Bengaluru India
The continuous adoption of Internet of Things (IoT) devices has established notable security risks. In recent times, IoT devices are often targeted by malicious actors as IoT devices are limited with processing and me... 详细信息
来源: 评论
Ensuring security Continuum from Edge to Cloud : Adaptive security for IoT-based Critical Infrastructures using FL at the Edge
Ensuring Security Continuum from Edge to Cloud : Adaptive Se...
收藏 引用
IEEE international conference on Big Data
作者: Ismail Ari Kerem Balkan Sandeep Pirbhulal Habtamu Abie Computer Engineering Department Ozyegin University Istanbul Turkey Norwegian Computing Center Oslo Norway
Securing IoT-based Critical Infrastructures (CI) necessitates a cross-domain management of IT/OT systems encompassing hardware, software, data, and models along with their application scenarios. There is no feasible w... 详细信息
来源: 评论
On-Device AI security Solutions: A Study on Lightweight Ensemble Learning Technique
On-Device AI Security Solutions: A Study on Lightweight Ense...
收藏 引用
international Communication systems and networks and Workshops, COMSNETS
作者: Huiyao Dong Igor Kotenko Faculty of Information Technology and Security ITMO University Saint Petersburg Russia Laboratory of Computer Security Problems St. Petersburg Federal Research Center of the RAS Saint Petersburg Russia
IoT security poses a significant challenge due to the presence of extensive confidential data and vulnerable devices. Artificial intelligence (AI) is increasingly viewed as pivotal in cybersecurity, enhancing the effi... 详细信息
来源: 评论
Enhanced Facial Emotion Recognition using Deep Learning Techniques: A Comprehensive Analysis and Implementation
Enhanced Facial Emotion Recognition using Deep Learning Tech...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Sunil S Harakannanavar Somesh S G Sughosh V Sumeet P Department of Electronics and Communication Engineering Nitte Meenakshi Institute of Technology Bangalore India
In recent years, deep learning approaches for facial expression recognition have gained significant momentum across various domains, including healthcare, security, and entertainment. These methods demonstrate a high ... 详细信息
来源: 评论