咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是631-640 订阅
排序:
ASBlock:An Agricultural based Supply Chain Management using Blockchain Technology  2
ASBlock:An Agricultural based Supply Chain Management using ...
收藏 引用
2nd international conference on Machine Learning and Data Engineering, ICMLDE 2023
作者: Panigrahi, Amrutanshu Pati, Abhilash Dash, Bibhu Sahoo, Ghanashyam Singh, Debabrata Dash, Manoranjan University Odisha India School of Computer and Information Science University of the Cumberlands Williamsburg United States Department of CSE GITA Autonomous College Odisha India University Odisha India University Odisha India
Blockchain is a distributed digital ledger technology that allows for the immutable and auditable logging of transactions without needing a central authority or centralized database. First introduced in 2008 as the te... 详细信息
来源: 评论
Finding of DDoS Attack in IoT-Based networks Using Ensemble Technique
Finding of DDoS Attack in IoT-Based Networks Using Ensemble ...
收藏 引用
Intelligent systems for Cybersecurity (ISCS), international conference on
作者: Animesh Srivastava Shweta Tiwari Deepak Kumar Navin Garg Department of Computer Science & Engineering Graphic Era Hill University Dehradun Department of Computer Science & Engineering / University Institute of Engineering Chandigarh University Mohali Punjab Department of Computer Science and Engineering SGT University Gurugram Computer Science & Engineering Graphic Era (Deemed to be University) Dehradun Uttarakhand
Ensemble techniques could find DDoS attacks more quickly in IoT. A more dependable and precise detection system can be achieved by integrating the most advantageous attributes of XGBoost and Random Forest. This ensure... 详细信息
来源: 评论
Quantum Communication-AI Interface for Real-Time Translation and Secure Transmission in Multilingual IoT networks
Quantum Communication-AI Interface for Real-Time Translation...
收藏 引用
Future Machine Learning and Data Science (FMLDS), IEEE international conference on
作者: Raj Kashikar Department of Computer Science Virginia Polytechnic Institute and State University Blacksburg VA USA
As the Internet of Things (IoT) continues to scale globally, secure and seamless communication across diverse languages and technical standards has become a significant challenge. To address this, this paper presents ... 详细信息
来源: 评论
Exploring blockchain solutions: Integrating cryptocurrency with IoT for enhanced security
Exploring blockchain solutions: Integrating cryptocurrency w...
收藏 引用
Pervasive Computational Technologies (ICPCT), international conference on
作者: M Shravan Shital Kakad Umar M Mulani Geeti Sharma Mohit Tiwari Mary Shiba C School of Business SR University Warangal Telangana India Artificial Intelligence and Data Science Vishwakarma Institute of Technology Pune Maharashtra KJ College of Engineering and Management Research Pune Faculty of Management Studies (CMS Business School) Jain Deemed to be University Department of Computer Science and Engineering Bharati Vidyapeeth’s College of Engineering Delhi Delhi Department of Computer Science and Business Systems R.M.K Engineering College Thiruvallur
Blockchain, initially developed as the underlying technology for Bitcoin, has garnered significant attention for its applications beyond cryptocurrency, particularly in complex non-monetary domains. Utilizing cryptogr... 详细信息
来源: 评论
Advanced ARP Attack Protection in SDNs Using Deep Learning Approach
Advanced ARP Attack Protection in SDNs Using Deep Learning A...
收藏 引用
Blockchain and distributed systems security (ICBDS), IEEE international conference on
作者: M. Anand Kumar Kamelsh Chandra Purohit Jaishankar Bhatt Girija Shankar Semuwal School of Information Science Presidency University Bengaluru India Department of Computer Science Graphic Era Deemed to be University Dehradun India Department of Media and Mass Communication Graphic Era Hill University Dehradun India
Software Defined networks have developed as a transformative standard in network architecture, providing centralized control, and dynamic supervision of network resources. In recent past several advancements have been... 详细信息
来源: 评论
Advancements in Suspicious and Violent Activity Recognition for Intelligent Video Surveillance
Advancements in Suspicious and Violent Activity Recognition ...
收藏 引用
Disruptive Technologies (ICDT), international conference on
作者: Niyati Rana Deepak Parashar Nilesh Bahadure Hetal Jethani Sudipta Banerjee Kanhaiya Sharma Department of Computer Scinece & Engineering GSFC University Vadodara Gujarat Gujarat India Dept. of CSE Symbiosis Institute of Technology Pune Symbiosis International Univesity Pune Maharashtra India
Recognition of suspicious or violent activity in video surveillance has become increasingly important in terms of public safety and security. This synthesis examined state-of-the-art methodologies for detecting anomal... 详细信息
来源: 评论
CyberShield: Advanced Encryption and Decryption Techniques for Video Protection
CyberShield: Advanced Encryption and Decryption Techniques f...
收藏 引用
Blockchain and distributed systems security (ICBDS), IEEE international conference on
作者: Riddhi Mirajkar Nilesh Sable Dipak Palve Sayali Sontakke Department of Information Technology Vishwakarma Institute of Information Technology Pune India Department of Computer Science & Engineering (Artificial Intelligence) Vishwakarma Institute of Information Technology Pune India
With the increased usage of video communication technologies, the requirement for secure video data transfer has grown more critical than ever. Video encryption methods are critical in preventing unauthorized access t...
来源: 评论
A Beetle Antennae Search-Based Sparrow Search Algorithm for Network Intrusion Detection
A Beetle Antennae Search-Based Sparrow Search Algorithm for ...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Ayub Baig R. Archana Reddy Muntather Muhsin Hassan Subramanya S G Hajari Manu Department of Infornation Technology Malla Reddy Engineering College for Women(UGC-Autonomous) Hyderabad India Department of Computer Science and Engineering SR University Warangal India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of CSE Nitte Meenakshi Institute of Technology Bengaluru India Department of AI&ML Gokaraju Rangaraju Institute of Engineering and Technology Hyderabad India
Nowadays, the network Intrusion Detection System (IDS) is a crucial cybersecurity technique that predicts unauthorized access, and exploits malfunction of computer networks. Traditional IDS struggle with classifying m... 详细信息
来源: 评论
The Internet of Energy systems: Blockchain and Smart Contracts meet Federated Learning
The Internet of Energy Systems: Blockchain and Smart Contrac...
收藏 引用
IEEE international conference on Blockchain and Cryptocurrency (ICBC)
作者: Abdulrezzak Zekiye Öznur Özkasap Department of Computer Engineering Koç University Istanbul Türkiye
The Internet of Energy (IoE) is a distributed paradigm that integrates smart networks and Internet technology. In contrast to traditional centralized energy systems, distributed Energy Internet systems with multiple c...
来源: 评论
A Blockchain-enabled Intelligent Electronic Healthcare Platform
A Blockchain-enabled Intelligent Electronic Healthcare Platf...
收藏 引用
Blockchain Computing and Applications (BCCA), international conference on
作者: Ismaeel Al Ridhawi Ali Abbas Akshay Agrawal Muder Almiani School of Electrical Engineering and Computer Science University of Ottawa Canada Gulf University for Science and Technology Kuwait Kuwait College of Science and Technology Kuwait
Healthcare frameworks have evolved over the decades with the advancements in technology. Patient disease prevention, diagnosis, treatment, and well-being in general have progressed tremendously with the support of Art... 详细信息
来源: 评论