咨询与建议

限定检索结果

文献类型

  • 4,982 篇 会议
  • 280 册 图书
  • 89 篇 期刊文献

馆藏范围

  • 5,351 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,876 篇 工学
    • 2,567 篇 计算机科学与技术...
    • 1,716 篇 软件工程
    • 978 篇 信息与通信工程
    • 373 篇 电气工程
    • 304 篇 控制科学与工程
    • 183 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 121 篇 电子科学与技术(可...
    • 121 篇 安全科学与工程
    • 112 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 44 篇 交通运输工程
  • 615 篇 理学
    • 368 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 101 篇 统计学(可授理学、...
    • 85 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 185 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 240 篇 法学
    • 165 篇 法学
    • 81 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 500 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,230 篇 英文
  • 90 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5351 条 记 录,以下是61-70 订阅
排序:
Comparative Analysis of an AI-enabled State-of-the-Art Models for the Detection of DDoS Attacks on IoT Devices
Comparative Analysis of an AI-enabled State-of-the-Art Model...
收藏 引用
Disruptive Technologies (ICDT), international conference on
作者: Rajneesh Kumar Gaurav Gulati Bhupesh Gupta Mohit Chhabra Department of Computer Science & Engineering Maharishi Markandeshwar Engineering College MMDU Mullana Haryana India Department of Computer Science& Engineering IMS Engineering College Ghaziabad UP India
With technological advancement, distributed Denial of Service (DDoS) attacks are gaining momentum in IoT networks. DDoS attacks are widely spreading on IoT devices since they have limited resources (memory) and no eff... 详细信息
来源: 评论
TruChain: A Blockchain-based Access Control to Improve the security of Smart Water Grid systems
TruChain: A Blockchain-based Access Control to Improve the S...
收藏 引用
international Communication systems and networks and Workshops, COMSNETS
作者: Susmita Mondal Suchetana Chakraborty Department of Computer Science and Engineering Indian Institute of Technology Jodhpur
Water is a significant resource in day-to-day life, and it usually requires technological association for comprehensive management. Smart Water Grids (SWG) typically use cyberphysical systems (CPS) to monitor several ... 详细信息
来源: 评论
On-Device AI security Solutions: A Study on Lightweight Ensemble Learning Technique
On-Device AI Security Solutions: A Study on Lightweight Ense...
收藏 引用
international Communication systems and networks and Workshops, COMSNETS
作者: Huiyao Dong Igor Kotenko Faculty of Information Technology and Security ITMO University Saint Petersburg Russia Laboratory of Computer Security Problems St. Petersburg Federal Research Center of the RAS Saint Petersburg Russia
IoT security poses a significant challenge due to the presence of extensive confidential data and vulnerable devices. Artificial intelligence (AI) is increasingly viewed as pivotal in cybersecurity, enhancing the effi... 详细信息
来源: 评论
Enhancing Peer-to-Peer Network security using 3D Convolutional Autoencoder based Anomaly Detection
Enhancing Peer-to-Peer Network Security using 3D Convolution...
收藏 引用
Intelligent systems and Computational networks (ICISCN), international conference on
作者: Rana Veer Samara Sihman Bharattej R Zaid Ajznblasm E. G. Satish Adlin Sylvia A M. Devi Department of Computer Science Saint Leo University FL USA Department of Computers Techniques Engineering College of Technical Engineering The Islamic University of Al Diwaniyah Al Diwaniyah Iraq Department of Computer Science and Engineering Nitte Meenakshi Institute of Technology Bengaluru India Department of Computer Science and Engineering Dhanalakshmi Srinivasan College of Engineering and Technology India Department of Electrical and Electronics Engineering New Prince Shri Bhavani College of Engineering and Technology Chennai India
In this era, Peer-to-Peer (P2P) networks have developed as a revolutionized network for data distribution and alternate to traditional client-server network. The features of P2P networks allow a distributed group of u... 详细信息
来源: 评论
DR3DH: A DoS resistant extended triple Diffie–Hellman for mobile edge networks
收藏 引用
computer networks 2025年 265卷
作者: Altaweel, Ala Bouridane, Ahmed Department of Computer Engineering College of Computing and Informatics University of Sharjah Sharjah United Arab Emirates
Mobile Edge networks (MENs) are wireless networks that establish "close-to-end-users-clouds" to provide storage, computation, and communication services. MENs employ the Extended Triple Diffie–Hellman (X3DH... 详细信息
来源: 评论
Anomaly Detection in Microservices Architecture Using Graph Neural networks
Anomaly Detection in Microservices Architecture Using Graph ...
收藏 引用
Euromicro conference on Parallel, distributed and Network-Based Processing
作者: Matthias Osswald Timothy Schönenberger Gokcan Cantali Wissem Soussi Gürkan Gür Zurich University of Applied Sciences (ZHAW) InIT Winterthur Switzerland Communication Systems Group CSG University of Zürich UZH Zürich Switzerland
The rise of cloud computing has transformed application development and deployment, with Kubernetes emerging as a key platform for managing containerized applications. This paper explores the use of Graph Neural Netwo... 详细信息
来源: 评论
Enhancing DDoS Attack Detection in SDN with a Stacked Model Framework Utilizing Deep Neural networks
Enhancing DDoS Attack Detection in SDN with a Stacked Model ...
收藏 引用
IEEE international conference on Consumer Electronics (ICCE)
作者: Aishita Sharma Sunil K. Singh Sudhakar Kumar Shin Hung Pan Brij B. Gupta Kwok Tai Chui Department of CSE Chandigarh College of Engineering and Technology Chandigarh India Department of Information Management Asia University Taiwan Department of Computer Science and Information Engineering Asia University Taiwan University of Economics and Human Sciences in Warsaw Poland Hong Kong Metropolitan University Hong Kong
Software Defined Networking enhances network management and security through centralized control, vital for the growth of consumer electronics. With the rise of smart devices and IoT systems, the demand for scalable n... 详细信息
来源: 评论
Machine Learning based Portable Executable Malware and DDoS Attacks Detection in IoT networks
Machine Learning based Portable Executable Malware and DDoS ...
收藏 引用
international conference on ent Computing and Control systems (ICICCS)
作者: S. Balakrishnan S. Leelavathy Sunil Kumar RM S. Simonthomas Department of Computer Science and Engineering Aarupadai Veedu Institute of Technology Vinayaka Mission’s Research Foundation(DU) Chennai Tamil Nadu India Department of AI&DS Panimalar Engineering College Chennai Department of CSE RL Jalappa Institute of Technology Bangalore Rural District Department of Computer Science and Engineering Aarupadai Veedu Institute of Technology VMRF-DU Chennai Tamil Nadu India
As the Internet of Things digital systems have been becoming increasingly complex, so are the cybersecurity issues, which, in turn, have been heightened by the malicious activities of Portable Executable (PE) malware ... 详细信息
来源: 评论
Data-as-a-Product to enable data-driven value networks in Industries 4.0 & 5.0: The Swiss Smart Factory experiment  16
Data-as-a-Product to enable data-driven value networks in In...
收藏 引用
16th international conference on Ambient systems, networks and Technologies networks, ANT 2025 / 8th international conference on Emerging Data and Industry 4.0, EDI40 2025
作者: Nizamis, Alexandros Julian, Matilde Valero, Clara I. Foti, Magda Drigkopoulou, Ioanna Esbrí, Miguel Ángel Costa, Ruben Yortholt, Alexandre Ioannidis, Dimosthenis Gkonis, Panagiotis Trakadas, Panagiotis Tzovaras, Dimitrios Palau, Carlos E. Department of Digital Industry Technologies National and Kapodistrian University of Athens NKUA Euboea Dirfes Messapies 34400 Greece Information Technologies Institute Center for Research and Technology Hellas 6th km Charilaou-Thermi Thessaloniki 57001 Greece Communications Department Universitat Politècnica de València Valencia 46022 Spain Netcompany-Intrasoft S.A 2b rue Nicolas Bové Luxembourg 1253 Luxembourg Eviden Albarracín 25 Madrid 28037 Spain CTS-UNINOVA School of Science and Technology NOVA University of Lisbon Caparica 2829-516 Portugal Department of Port Management and Shipping National and Kapodistrian University of Athens NKUA Euboea Dirfies Messapies 34400 Greece Switzerland Innovation Park Biel/Bienne Ltd Aarbergstrasse 46 Biel/Bienne 2503 Switzerland
Over the years, the economic and strategic potential of data has been identified by companies, and nowadays, data has emerged as a valuable digital asset for them. Data can be offered as a product by combining it with... 详细信息
来源: 评论
Exploring blockchain solutions: Integrating cryptocurrency with IoT for enhanced security
Exploring blockchain solutions: Integrating cryptocurrency w...
收藏 引用
Pervasive Computational Technologies (ICPCT), international conference on
作者: M Shravan Shital Kakad Umar M Mulani Geeti Sharma Mohit Tiwari Mary Shiba C School of Business SR University Warangal Telangana India Artificial Intelligence and Data Science Vishwakarma Institute of Technology Pune Maharashtra KJ College of Engineering and Management Research Pune Faculty of Management Studies (CMS Business School) Jain Deemed to be University Department of Computer Science and Engineering Bharati Vidyapeeth’s College of Engineering Delhi Delhi Department of Computer Science and Business Systems R.M.K Engineering College Thiruvallur
Blockchain, initially developed as the underlying technology for Bitcoin, has garnered significant attention for its applications beyond cryptocurrency, particularly in complex non-monetary domains. Utilizing cryptogr... 详细信息
来源: 评论