咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是641-650 订阅
排序:
Classification of DDoS in Software-Defined IoT networks using Hybrid Feature Selection Technique with DL  3
Classification of DDoS in Software-Defined IoT Networks usin...
收藏 引用
3rd international conference on Smart Technologies in Computing, Electrical and Electronics, ICSTCEE 2022
作者: Muthulakshmi, K. Kalaivani, K. Uma, J. Primya, T. Sivakumaran, A.R. Selvapandian, D. ECE Sri Krishna College of Technology Coimbatore India SNS College of Engineering Department of Computer Science and Design Coimbatore India Amrita School of Engineering Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Coimbatore India KPR Institute of Engineering and Technology Department of Computer Science and Engineering Coimbatore India Malla Reddy Engineering College for Women Department of Information Technology Secunderabad India Karpagam Academy of Higher Education Department of Computer Science and Engineering Coimbatore India
A new network technology called Software Defined Networking (SDN) enables centralised network management. The SDN's potential features improve network security and make it easier to create threat detection systems... 详细信息
来源: 评论
Integrating Blockchain and VANET for Privacy-Preserving and Authentication
Integrating Blockchain and VANET for Privacy-Preserving and ...
收藏 引用
international conference on ent Computing and Control systems (ICICCS)
作者: Sivagami A Sachin A Mohammad Arshath A Kiruthika N Department of Computer Science and Engineering Karpagam Academy of Higher Education Coimbatore India
Apart from safeguarding the cars' identity privacy within Vehicular Ad-hoc networks (VANETs), privacy-preserving authentication is considered the primary protection against potential attacks. Unfortunately, the cu... 详细信息
来源: 评论
Mobile Edge Computing Offload Strategy Based on Energy Aware
Mobile Edge Computing Offload Strategy Based on Energy Aware
收藏 引用
2021 international conference on Network Communication and Information security, ICNCIS 2021
作者: Liao, Kangkang Yang, Jun Miao, Li School of Information Engineering Ningxia University Yingchuan Ningxia750021 China
Mobile edge computing (MEC) is an emerging paradigm to meet the growing computing needs from mobile applications. By offloading computing intensive mobile application tasks to MEC server, users can experience low late... 详细信息
来源: 评论
Cognitive Twins for Predictive Maintenance and security in IoT Software systems
Cognitive Twins for Predictive Maintenance and Security in I...
收藏 引用
Mobile networks and Wireless Communications (ICMNWC), IEEE international conference on
作者: B. Venkata Swamy Pareshwar Prasad Barmola Senthil Thangavel S. Kaliappan Hardik Patel Girish Abhyankar Department of Chemistry B V Raju Institute of Technology Medak India Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun India Distributed Systems Cloud Solutions & Machine Learning Expert Paypal Inc California USA Division of Research and Development Lovely Professional University Phagwara India Department of Electronics & Communication Engineering Faculty of Engineering and Technology Parul institute of Engineering and Technology Parul University Post Limda India Faculty of Law Symbiosis Law School Symbiosis International (Deemed University) Pune India
The increasing complexity and interconnectedness of Internet of Things (IoT) software systems necessitate the development of intelligent solutions for predictive maintenance and security. Conventional techniques often... 详细信息
来源: 评论
A Proposed distributed Off-Chain Medical Health Record Management Using Blockchain Technology and IPFS for HEIs
A Proposed Distributed Off-Chain Medical Health Record Manag...
收藏 引用
Intelligent Communication Technologies and Virtual Mobile networks (ICICV), international conference on
作者: Michael Marvin P. Cruz Ken M. Balogo Chester L. Cofino Dexter G. Dandan College of Computer Studies Central Philippines State University San Carlos Campus San Carlos City Negros Occidental Philippines College of Computer Studies Central Philippines State University Kabankalan City Negros Occidental Philippines
The management and security of medical health records are of utmost importance in a higher education institution. Traditional centralized methods of managing and preserving medical records are prone to single points o...
来源: 评论
Adaptive Dynamic Adversarial Training with Real-Time Feedback in 6G
Adaptive Dynamic Adversarial Training with Real-Time Feedbac...
收藏 引用
international conference on distributed Computing in Sensor systems (DCOSS)
作者: Ahmed Hakami Niki Pissinou Mohammed Rajhi School of Computing and Information Sciences Florida International University Miami FL USA Faculty of Computer Science & Information Technology Jazan University Jazan Saudi Arabia
The emergence of 6G communications brings forth both unprecedented opportunities and security challenges. This work introduces a novel method, dynamic adversarial training incorporating real-time feedback (DAT-RTF), t... 详细信息
来源: 评论
Recognition of Attacks on IoT Devices and Their Prevention Using Deep Learning Methods
Recognition of Attacks on IoT Devices and Their Prevention U...
收藏 引用
Blockchain and distributed systems security (ICBDS), IEEE international conference on
作者: Bhupender Singh Rawat Animesh Srivastava Gulbir Singh Vivek Bhatnagar Shiv Ashish Dhondiyal College of Smart Computing COER University Roorkee Department of Computer Science & Engineering Graphic Era Hill University Dehradun MMICT&BM M.M. (Deemed to be University) Ambala Haryana India MMICT&BM(MCA) M.M. (Deemed to be University) Ambala Haryana Department of Computer Science & Engineering Graphic Era (Deemed to be University) Dehradun
The Internet of Things (IoT) has caused a revolution in many different industries by making it possible for connected smart devices to communicate with one another effortlessly. However, due to the growing number of p...
来源: 评论
Enhancing Intrusion Detection systems with Digital Twin Technology for Cyber-Physical security
Enhancing Intrusion Detection Systems with Digital Twin Tech...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: S. P. Santhoshkumar P. Sakthivel A. Seetha Manikandan R Mukesh Soni Department of Computer Science and Engineering School of Computing Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India Department of Information Technology Sona College of Technology Salem India Department of Information Technology S.A. Engineering College Chennai India Department of CSE Nandha Engineering College (Autonomous) Erode India Dr. D. Y. Patil Vidyapeeth Pune Dr. D. Y. Patil School of Science & Technology Tathawade Pune India
The need for strong security measures to ward off complex cyber-attacks has grown in tandem with the exponential growth of cyber-physical systems (CPS) and Internet of Things (IoT) devices. This paper lays forth a tho... 详细信息
来源: 评论
A Way to Deduct the Attacks which is Anomaly in Nature in 5G networks with the Use of Machine Learning
A Way to Deduct the Attacks which is Anomaly in Nature in 5G...
收藏 引用
Innovative Sustainable Technologies for Energy, Mechatronics, and Smart systems (ISTEMS), international conference on
作者: Apoorva Joshi Kiran Lokesh Maney Shweta Loonkar Master of Computer Applications Noida Institute of Engineering & Technology Greater Noida Uttar Pradesh India Department of Management School of Mangement - UG JAIN (Deemed to be University) Karnataka India Department of ISME ATLAS SkillTech University Mumbai Maharashtra India
A formidable task arises in addressing the constantly evolving challenges brought about by the growing threats to cybersecurity, the expanded attack surfaces brought about by the Internet of Things (IoT), increased ne... 详细信息
来源: 评论
6MID:Mircochain based Intrusion Detection for 6LoWPAN based IoT networks
6MID:Mircochain based Intrusion Detection for 6LoWPAN based ...
收藏 引用
12th international conference on Ambient systems, networks and Technologies (ANT) / 4th international conference on Emerging Data and Industry 4.0 (EDI40)
作者: Patel, Himanshu B. Jinwala, Devesh C. SV Natl Inst Technol Surat Comp Engn Dept Gujrat 395007 India
A blockchain is a decentralized, distributed, and often public, digital ledger system consisting of records called blocks, used to record transactions across many computers so that any involved block cannot be altered... 详细信息
来源: 评论