咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是671-680 订阅
排序:
Employing Deep Neural networks for Real-Time Anomaly Detection and Mitigation in IoT-Based Smart Grid Cybersecurity systems
Employing Deep Neural Networks for Real-Time Anomaly Detecti...
收藏 引用
distributed Computing and Electrical Circuits and Electronics (ICDCECE), IEEE international conference on
作者: Aadam Quraishi Maher Ali Rusho Anurag Prasad Ismail Keshta Richard Rivera Mohammed Wasim Bhatt M.D. Research Intervention Treatment Institute Houston Texas US Department of Lockheed Martin Engineering Management University of Colorado Boulder Boulder Colorado IIT Kharagpur (Rajiv Gandhi School Of Intellectual Property Law) Gurugram India Computer Science and Information Systems Department College of Applied Sciences AlMaarefa University Riyadh Saudi Arabia Department of Informatics and Computer Science Escuela Politécnica Nacional Quito Ecuador Model Institute of Engineering and Technology Jammu J&K India
This research introduces a novel anomaly detection framework for IoT -based Smart Grid Cybersecurity systems. Leveraging autoencoders, LSTM networks, GANs, SOMs, and transfer learning, our approach achieves superior p... 详细信息
来源: 评论
Real-Time IoT Cybersecurity using Machine Learning-based AI Threat Detection System to Train Generative Robots
Real-Time IoT Cybersecurity using Machine Learning-based AI ...
收藏 引用
Trends in Material Science and Inventive Materials (ICTMIM), international conference on
作者: P Srilakshmi Koushik Reddy Chaganti Talachendri Suryam Sweety Julia I D. Chaithanya Jami Kavitha Department of CSE G Pulla Reddy Engineering College Dept. of Computer and Information Systems University of the Cumberlands Department of CSE (DATA SCIENCE) Vignan Institute of Technology and Science Department of AI&ML Malla Reddy University Department of CSE CVR College of Engineering Department of CSE Sanketika Vidya Parishad Engineering College
Existing security protocols encounter major cybersecurity difficulties because the online devices' growing popularity continues to spread across networks. These security protocols are ineffective because they do n... 详细信息
来源: 评论
Two-Stage Optimal Operation of SOPs in Active Three-Phase Distribution systems  3
Two-Stage Optimal Operation of SOPs in Active Three-Phase Di...
收藏 引用
3rd IEEE international conference on Smart Technologies for Power, Energy and Control, STPEC 2023
作者: Sharma, Abhimanyu Paul, Subho Padhy, Narayana Prasad Indian Institute of Technology Roorkee Department of Electrical Engineering Roorkee247667 India Washington State University School of Electrical Engineering and Computer Science PullmanWA99163 United States Indian Institute of Technology Roorkee Mnit Jaipur Department of Electrical Engineering Roorkee247667 India
The asymmetric integration of distributed energy resources exacerbates the unbalanced conditions in three-phase distribution networks. The increased unbalanced conditions pose severe threats to the system security, ca... 详细信息
来源: 评论
Neural Network-based Cyber Threats Detection and Mitigation Framework in Aerial Communication systems Underlying 6G
Neural Network-based Cyber Threats Detection and Mitigation ...
收藏 引用
international conference on Parallel distributed and Grid Computing (PDGC)
作者: Harsh Parekh Aparna Kumari Dilip Yadav Sudeep Tanwar Prasun Kumar Computer Science and Engineering Institute of Technology Nirma University Ahmedabad India Computer Science and Engineering SCSET Bennett University Greater Noida India Department of Biotechnology SSET Sharda University Greater Noida India
This study aims to enhance the security of communication between aeroplanes and ground control from potential risks. We introduce a novel framework, i.e., NeuroSkyWatch to protect aeroplanes from interference attacks ... 详细信息
来源: 评论
Autonomous Cyber Defense using Graph Attention Network Enhanced Reinforcement Learning
Autonomous Cyber Defense using Graph Attention Network Enhan...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Yihang Shi Huajun Zhang Lin Shi Shoukun Xu School of Computer Science and Artificial Intelligence Changzhou University Changzhou China
Ubiquitous networked hosts and Internet of Things (IoT) devices have enabled critical network applications in both enterprise and industrial environments. However, network threats have proliferated, constantly challen... 详细信息
来源: 评论
distributed Attacks Classification Based on Radical Basis Function and Particle Swarm Optimization In Hypervisor Layer
Distributed Attacks Classification Based on Radical Basis Fu...
收藏 引用
international conference on Information systems and computer networks (ISCON)
作者: Aditya Kumar Shukla Ashish Sharma Department of Computer Engineering & Applications GLA University Mathura (UP) India
The term ‘cloud computing’ refers to a concept for on-demand provisioning of computer resources (including hardware and software) through the Internet. Cloud computing’s primary benefits lie in the time and money s... 详细信息
来源: 评论
A Cross Data Center Access Control Model by Constructing GAS on Blockchain
A Cross Data Center Access Control Model by Constructing GAS...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Shujiang Xu Chaoyang Zhang Lianhai Wang Shuhui Zhang Wei Shao Shandong Provincial Key Laboratory of Computer Networks Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China
With the rapid development of cloud computing, big data, and mobile Internet technology, data sharing across different data centers is increasingly urgent. Meanwhile, data security risks such as unauthorized access an... 详细信息
来源: 评论
Machine Learning Techniques to Detect a DDoS Attack in Flying AD-HOC Network
Machine Learning Techniques to Detect a DDoS Attack in Flyin...
收藏 引用
Device Intelligence, Computing and Communication Technologies, (DICCT), international conference on
作者: Khushbu Jaiswal Sudesh Kumar Neeraj Kumar Rathore Department of Computer Science Indira Gandhi National Tribal University Amarkantak Madhya Pradesh India
Flying Ad-hoc Network (FANET) consists of aerial devices, such as Unmanned Aerial Vehicles (UAVs), which work together to perform specific tasks. The system stands out because of its unique coverage, speed, and mobili... 详细信息
来源: 评论
Quantum Long Sort-Term Memory-based Identification of distributed Denial of Service Attacks
Quantum Long Sort-Term Memory-based Identification of Distri...
收藏 引用
AI in Cybersecurity (ICAIC), international conference on
作者: Sarvapriya Tripathi Himanshu Upadhyay Jayesh Soni Electrical and Computer Engineering Florida International University Miami USA
distributed Denial of Service (DDoS) is defined as an attack targeting a server, where the server is overwhelmed by an overflow of traffic, leading to a computer system being compromised. To prevent these attacks from... 详细信息
来源: 评论
Training of cyber defense agents in tactical inter-organizational networks by using federated learning  22
Training of cyber defense agents in tactical inter-organizat...
收藏 引用
22nd international conference on Military Communication and Information systems, ICMCIS 2022
作者: Aurisch, Thorsten Fraunhofer Institute for Communication Information Processing and Ergonomics FKIE Bonn Germany
Malware used in advanced persistent threats often establish a covert channel. By means of such a channel, the malware can communicate with external Command & Control servers or send classified data to a server con... 详细信息
来源: 评论