咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是661-670 订阅
排序:
Drowsy Driver Detection System using computer Vision and Transfer Learning for Preventing Road Accidents
Drowsy Driver Detection System using Computer Vision and Tra...
收藏 引用
Blockchain and distributed systems security (ICBDS), IEEE international conference on
作者: Naisargi Bagal Kashish Dingreja Atharva Atterkar Prasad Bachhav Nilesh P. Sable Anuradha Yenkikar Ritesh Alkunte Department of Computer Science and Engineering - Artificial Intelligence Vishwakarma Institute of Information Technology Pune India
Major traffic accidents are attributed to driver fatigue, according to study on the topic. Driver drowsiness is a state in which the driver of a car is on the verge of falling asleep or losing consciousness. It can be... 详细信息
来源: 评论
Detection and Mitigation of DDoS Attacks on IoT networks Using Machine Learnin
Detection and Mitigation of DDoS Attacks on IoT Networks Usi...
收藏 引用
IEEE international conference on Multi Topic
作者: Akram Rashid Syed Muhammad Khaliq-Ur-Rahman Raazi Shayhaq Ali Directorate of Informatin Technology Univeristy of Gwadar Gwadar Pakistan Department of Computer Science Mohammed Ali Jinnah University Karachi Pakistan Department of Computer Science Univeristy of Gwadar Gwadar Pakistan
Smart homes, cities, and healthcare are just a few examples of how the Internet of Things (IoT) simplifies daily life. With the rise of 5G, the number of connected IoT devices is rapidly increasing, expected to surpas... 详细信息
来源: 评论
A Zero Trust Single Sign-On Framework with Attribute-Based Access Control
A Zero Trust Single Sign-On Framework with Attribute-Based A...
收藏 引用
IEEE conference on Commerce and Enterprise Computing, CEC
作者: Daniel Kaltenböck Ilir Murturi Schahram Dustdar Distributed Systems Group TU Wien Vienna Austria
Authentication, authorization, and access control are fundamental functionalities that are crucial for network infrastructures and software applications. These functionalities work together to create a fundamental sec... 详细信息
来源: 评论
Machine Learning based Portable Executable Malware and DDoS Attacks Detection in IoT networks
Machine Learning based Portable Executable Malware and DDoS ...
收藏 引用
international conference on ent Computing and Control systems (ICICCS)
作者: S. Balakrishnan S. Leelavathy Sunil Kumar RM S. Simonthomas Department of Computer Science and Engineering Aarupadai Veedu Institute of Technology Vinayaka Mission’s Research Foundation(DU) Chennai Tamil Nadu India Department of AI&DS Panimalar Engineering College Chennai Department of CSE RL Jalappa Institute of Technology Bangalore Rural District Department of Computer Science and Engineering Aarupadai Veedu Institute of Technology VMRF-DU Chennai Tamil Nadu India
As the Internet of Things digital systems have been becoming increasingly complex, so are the cybersecurity issues, which, in turn, have been heightened by the malicious activities of Portable Executable (PE) malware ... 详细信息
来源: 评论
Preserving Privacy using distributed Ledger Technology in Intelligent Transportation System  2022
Preserving Privacy using Distributed Ledger Technology in In...
收藏 引用
14th international conference on Contemporary Computing, IC3 2022
作者: Nair, Meghna Manoj Frederick, Terrance Fernandez Tyagi, Amit Kumar School of Computer Science Engineering Vellore Institute of Technology Tamilnadu Chennai India Institute of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamilnadu Chennai India Centre for Advanced Data Science Vellore Institute of Technology Tamilnadu Chennai600127 India
Intelligent Transportation System (ITS) is an enhanced application which mainly aims towards the curation of smart and interconnectivity services to ease the existing transportation systems. It is a field with a pleth... 详细信息
来源: 评论
Exploring the Potential of Sin-GAN for Image Generation and Manipulation
Exploring the Potential of Sin-GAN for Image Generation and ...
收藏 引用
Blockchain and distributed systems security (ICBDS), IEEE international conference on
作者: Madhav Sharma Hukum Chand Saini Pushpendra Kumar Sikarwal CSE(IoT) Poornima Institute of Engineering and Technology Jaipur India Engineering and Technology Jagannath University Jaipur India Computer Application JECRC University Jaipur India
SinGAN (Single Image Generative Adversarial networks) has emerged as a promising approach for image generation and manipulation tasks. This paper explores the potential of SinGAN in enhancing various Era and manipulat... 详细信息
来源: 评论
Implementation of QOS in SDN and distributed networks for mitigation of DDOS based attacks using Machine Learning
Implementation of QOS in SDN and Distributed Networks for mi...
收藏 引用
Blockchain and distributed systems security (ICBDS), IEEE international conference on
作者: Subhash Kumar Kishor Kolhe School of Computer Engineering and Technology MIT World Peace University Pune India
distributed Denial Service of Service (DDoS) is very sophisticated attack which brute-force packet jamming to a network to render it useless, if done with large number of nodes. It can be easily countered by a number ... 详细信息
来源: 评论
CoverS: Smart Contract-based Secure and Reliable Framework for V2V Communication
CoverS: Smart Contract-based Secure and Reliable Framework f...
收藏 引用
Blockchain and distributed systems security (ICBDS), IEEE international conference on
作者: Tirth Gohil Daksh Govani Janam Patel Rajesh Gupta Sudeep Tanwar Department of Computer Science and Engineering Institute of Technology Nirma University Gujarat India
Communication between vehicles, known as Vehicle-to-Vehicle (V2V) communication, plays a critical role in enhancing traffic management and road safety by facilitating the real-time exchange of vital information. While... 详细信息
来源: 评论
Raspberry Pi Powered Deep Learning-based Chest X-ray Analysis for Medical Diagnosis
Raspberry Pi Powered Deep Learning-based Chest X-ray Analysi...
收藏 引用
Blockchain and distributed systems security (ICBDS), IEEE international conference on
作者: Srinivas Talasila Vijaya Kumar Gurrala E Vijaya Babu Vangoju Ramyasri Tarun Basavaraju Srinija Pallerla Dept of ECE VNRVJIET Hyderabad India
Despite the impressive performance, traditional medical imaging analysis equipment is often costly and cumbersome, limiting accessibility, especially in remote or resource-constrained areas. This work proposes harness... 详细信息
来源: 评论
Optimising Silver-Enhanced BiFeO3 Nanoparticle Catalysts Using Random Forests and Genetic Algorithms
Optimising Silver-Enhanced BiFeO3 Nanoparticle Catalysts Usi...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Jaidev Kumar G Selvan R. Saranya Raj Kumar Gupta M Anusuya Gourav Kalra Department of Chemistry Hariom Saraswati P. G. College Haridwar India Department of Physics Thanthai Hans Roever College Perambalur India Department of Information Technology Nandha Engineering College Erode India Department of Physics Sardar Vallabhbhai Patel College Bhabua VKSU India Department of Physics Indra Ganesan College of Engineering Trichy India Department of Mechanical Engineering Maharishi Markandeshwar Engineering College Mullana Ambala India
This study addresses the task of optimizing Silver-Enhanced BiFeO₃ Nanoparticle Catalysts, which is essential for improving catalytic efficiency in industrial applications. The article presents a new approach that int... 详细信息
来源: 评论