咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是621-630 订阅
排序:
An Adaptive Image Watermarking based on Bellman-Ford Algorithm  7
An Adaptive Image Watermarking based on Bellman-Ford Algorit...
收藏 引用
7th international conference on Future networks and distributed systems, ICFNDS 2023
作者: Ferik, Brahim Laimeche, Lakhdar Meraoumia, Abdallah Laouid, Abdelkader Alshaikh, Muath Chait, Khaled University Of Larbi Tebessi Tebessa Algeria Liap Laboratory University Of El Oued El Oued Algeria Department Of Computer Science College Of Computing And Informatics Saudi Electronic University Riyadh Saudi Arabia
Ensuring the integrity and authenticity of images is a paramount task in the digital multimedia context. The emergence of digital technologies necessitates the development of robust techniques to safeguard medical ima... 详细信息
来源: 评论
Addressing Semantic Similarity Attacks in Online Social networks
Addressing Semantic Similarity Attacks in Online Social Netw...
收藏 引用
Blockchain and distributed systems security (ICBDS), IEEE international conference on
作者: Amardeep Singh Monika Singh Computer Science & Engg. Dept. SVIET Banur India Computer Science & Engg. Apex Institute of Technology Mohali India
An efficient technique for preserving user privacy of users while publishing data is anonymization. Banks, Social Network service providers and hospitals are examples of data owners/stakeholders who anonymize their cu...
来源: 评论
IoT Based Smart systems using Machine Learning (ML) and Artificial Intelligence (AI): Vulnerabilities and Intelligent Solutions  13
IoT Based Smart Systems using Machine Learning (ML) and Arti...
收藏 引用
13th international conference on Society and Information Technologies, ICSIT 2022
作者: Ahmed, Shaftab Ilyas, Mohammad Raja, M. Yasin Akhtar Software Engineering Department Bahria University Islamabad Pakistan College of Engineering and Computer Science Florida Atlantic University Boca RatonFL United States Center for Optoelectronics & Optical Communications University of North Carolina Charlotte NC United States
Internet of Things (IoT) has assumed great importance in technical and social domains due to desire of smart living and intelligent solutions for industrial operations, home automation and healthcare. The telecommunic... 详细信息
来源: 评论
Deepfake Video Detection using Neural networks  1
Deepfake Video Detection using Neural Networks
收藏 引用
1st IEEE international conference on Blockchain and distributed systems security, ICBDS 2022
作者: Jiwtode, Mayur Asati, Aman Kamble, Shailesh Damahe, Lalit Yeshwantrao Chavan College of Engineering Department of Computer Technology Nagpur India Indira Gandhi Delhi Technical University for Women Department of Artificial Intelligence and Data Science Delhi India Yeshwantrao Chavan College of Engineering Head of Department of Computer Technology Nagpur India
Over the past few years, free mobile application tools on Artificial Intelligence and deep learning have made it easy to create reliable face exchanges in a video called 'DeepFake' (DF) video that leaves a lit... 详细信息
来源: 评论
Network Intrusion Detection System Employing Big Data and Intelligent Learning Methods  4
Network Intrusion Detection System Employing Big Data and In...
收藏 引用
4th international conference on Artificial Intelligence and Speech Technology, AIST 2022
作者: Verma, Jyoti Bhandari, Abhinav Singh, Gurpreet Punjabi University Patiala Department of Computer Science and Engineering Punjab India Punjab Institute of Technology Department of Computer Science and Engineering Punjab India
With the steadily increasing use of computer networks and the exponential growth of data generated from multiple sources, several other practitioners of security management solutions have been faced with the principal... 详细信息
来源: 评论
Construction and Alignment Features of English Corpus based on Particle Swarm Optimization Algorithm
Construction and Alignment Features of English Corpus based ...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Wei Shang Xin Li School of Humanities Shan Dong Agriculture and Engineering University Jinan China
With the continuous advancement of natural language processing technology, building a high-quality corpus has become a hot topic in current research. However, the traditional corpus construction method requires a lot ... 详细信息
来源: 评论
The Probability of Timely Redundant Service in a Two-Level Cluster of a Flow of Requests that is Heterogeneous in Functionality and Allowable Delays  25th
The Probability of Timely Redundant Service in a Two-Leve...
收藏 引用
25th international conference on distributed computer and Communication networks, DCCN 2022
作者: Bogatyrev, V.A. Bogatyrev, S.V. Bogatyrev, A.V. Department Information Systems Security Saint-Petersburg State University of Aerospace Instrumentation Saint Petersburg Russia Yadro Cloud Storage Development Center Saint Petersburg Russia ITMO University Saint Petersburg Russia
Currently, the development of methods for the synthesis and analysis of fault-tolerant computer clusters designed to service a flow of requests that is heterogeneous in functionality and acceptable delays in queues is... 详细信息
来源: 评论
Student Behavior Detection on Campus using Ghost Crayfish Optimization Algorithm and Bi Directional Long Short-Term Memory
Student Behavior Detection on Campus using Ghost Crayfish Op...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Meng Jiang Xin Yang Peng Jiang Fengbo Ma Shaojun Zhou Beijing Institute of Technology Zhuhai China Zhuhai Sports School Zhuhai China
Student engagement is a supple and dynamic concept encompassing behavioural and cognitive involvement. To help instructors better understand how student engage with several classroom activities, it is crucial to predi... 详细信息
来源: 评论
Enhancing Peer-to-Peer Network security using 3D Convolutional Autoencoder based Anomaly Detection
Enhancing Peer-to-Peer Network Security using 3D Convolution...
收藏 引用
Intelligent systems and Computational networks (ICISCN), international conference on
作者: Rana Veer Samara Sihman Bharattej R Zaid Ajznblasm E. G. Satish Adlin Sylvia A M. Devi Department of Computer Science Saint Leo University FL USA Department of Computers Techniques Engineering College of Technical Engineering The Islamic University of Al Diwaniyah Al Diwaniyah Iraq Department of Computer Science and Engineering Nitte Meenakshi Institute of Technology Bengaluru India Department of Computer Science and Engineering Dhanalakshmi Srinivasan College of Engineering and Technology India Department of Electrical and Electronics Engineering New Prince Shri Bhavani College of Engineering and Technology Chennai India
In this era, Peer-to-Peer (P2P) networks have developed as a revolutionized network for data distribution and alternate to traditional client-server network. The features of P2P networks allow a distributed group of u... 详细信息
来源: 评论
A Secure and Authentication Scheme to Preserve the Privacy of Electronic Health Records in the Healthcare System
A Secure and Authentication Scheme to Preserve the Privacy o...
收藏 引用
2022 Iraqi international conference on Communication and Information Technologies, IICCIT 2022
作者: Hamed, Naba M. Yassin, Ali A. Computer Science and Information Technology Computer Information Systems Basrah Iraq College for Pure Sciences Department of Computer Science Basrah Iraq
Electronic Healthcare Records (EHRs), networks, and cloud computing have significantly revolutionized the traditional healthcare system. Secure remote user authentication is an important component of the healthcare sy... 详细信息
来源: 评论