咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是701-710 订阅
排序:
Securing networks: Leveraging Machine Learning for Enhanced DDoS Detection
Securing Networks: Leveraging Machine Learning for Enhanced ...
收藏 引用
Software, systems and Information Technology (SSITCON), international conference on
作者: Som Chauhan Prajval Byahatti Sunil Kumar Patel Department of Computer Science & Engineering Manipal University Jaipur Jaipur India
The growing complexity of distributed Denial of Service (DDoS) attacks poses a serious threat to network security, making the development of effective detection and mitigation techniques essential. This study tackles ... 详细信息
来源: 评论
An Investigative Evaluation of Open Source Intrusion Detection systems for Operational Technology networks Using MITRE ICS Attack Simulation on a Thermal Power Plant Test Bed
An Investigative Evaluation of Open Source Intrusion Detecti...
收藏 引用
IEEE India conference (INDICON)
作者: Anooja Joy Madhav Chandane Faruk Kazi Computer Engineering Dept. VJTI Mumbai India Department of Electrical Engineering VJTI Mumbai India
Intrusion Detection systems (IDS) play a critical role in identifying security breaches by monitoring network activities and protecting computer networks and systems. The significant increase in cyber attacks targetin... 详细信息
来源: 评论
AI-Enhanced security Architecture for 6G networks: A Federated Learning and Multi-Agent Approach
AI-Enhanced Security Architecture for 6G Networks: A Federat...
收藏 引用
Computing and Intelligent Reality Technologies (ICCIRT), international conference on
作者: V.V Teresa J. Dhanaseker S Arjun R Naveenraj A Antru Subil Pm Ahmed Najeeb Department of ECE Sri Eshwar College of Engineering Coimbatore
The coming 6G network is expected to provide better connectivity and network performance but will generate new security challenges. In this paper, we demonstrate a novel technological solution to address the security ... 详细信息
来源: 评论
IoT Based Smart systems using Artificial Intelligence and Machine Learning: Accessible and Intelligent Solutions
IoT Based Smart Systems using Artificial Intelligence and Ma...
收藏 引用
international conference on Information systems and computer networks (ISCON)
作者: Bilal Ahmed Mirza Shuja Hari Mohan Mishra Ahmed Qtaishat Mukesh Kumar School of Computer Application Lovely Professional University Phagwara Punjab Department of Information Technology Sohar University Sohar Sultanate of Oman
The Internet of Things (IoT) has grown in importance in both the technological and social spheres as consumers want smarter homes, more efficient businesses, and more efficient healthcare systems. The social setting i... 详细信息
来源: 评论
Detection and Evaluation of Cybersecurity Threats in MANET Based on AI
Detection and Evaluation of Cybersecurity Threats in MANET B...
收藏 引用
Ubiquitous Computing and Intelligent Information systems (ICUIS), international conference on
作者: R. Mohandas Karthik Kumar Vaigandla N. Sivapriya Kirubasankar K Department of Electronics & Communication Engineering Chennai Institute of Technology Chennai Tamil Nadu Department of Electronics & Communication Engineering Balaji Institute of Technology and Science Warangal Telangana Department of Computer Applications Cauvery College for Women Trichy Tamil Nadu
This research focuses on the use of AI to enhance the security of Mobile Ad-hoc networks (MANETs), which aredecentralized and mobile wireless networks characterized by their dynamic nature. The work aims to assess the... 详细信息
来源: 评论
Levy Flight Strategy with Chicken Swarm Optimization Algorithm for Real-Time Anomaly Detection in Cybersecurity
Levy Flight Strategy with Chicken Swarm Optimization Algorit...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Mallubhotla Syamala SaiSree Subramanya S G Sripelli Jagadish S. Sureshkumar Mohammed Al-Farouni Mallareddy Engineering College for Women (UGC-Autonoumous) Hyderabad India Department of CSE Nitte Meenakshi Institute of Technology Bengaluru India Department of Computer Science & Artificial Intelligence SR University Warangal India Department of CSE Kalasalingam Academy of Research and Education Krishnankoil India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq
The cybersecurity field has witnessed several Intrusion Detection System (IDS) and Anomaly Detection, which are essential for identifying malicious activities in network traffic. However, growing volume and diversity ... 详细信息
来源: 评论
Investigating a Comprehensive IoT security Solution Based on Blockchain  6th
Investigating a Comprehensive IoT Security Solution Based on...
收藏 引用
6th international conference on Advanced Informatics for Computing Research, ICAICR 2023
作者: Madhan, Ravinder Singh Singh, Randeep IEC University Himachal Pradesh Baddi174103 India
The term "Internet of Things" (IoT) refers to a network of interconnected objects capable of gathering data from their immediate surroundings and facilitating communication with one another over the Internet... 详细信息
来源: 评论
An Innovative Ensemble Approach to Detecting distributed Denial of Service Attacks Using Machine Learning
An Innovative Ensemble Approach to Detecting Distributed Den...
收藏 引用
Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA), international conference on
作者: Deepak Singh Rajput Arvind Kumar Upadhyay Dept. of Computer Science and Engineering Amity School of Engineering &Technology (ASET) Amity University Gwalior Madhya Pradesh
In the present era marked by rapid Internet development, there is a growing emphasis on information security. distributed Denial of Service (DDoS) attacks poses significant threats to servers globally. Various methods... 详细信息
来源: 评论
Research on blockchain architecture for terminal side business applications of distributed iot
Research on blockchain architecture for terminal side busine...
收藏 引用
Energy, Power and Grid (ICEPG), international conference on
作者: Xiukui Pan Ke Yang Na Li Shangzhuo Zheng Qinglei Guo State Grid Blockchain Technology (Beijing) Co. Ltd Beijing China State Grid Digital Technology Holdings Co. Ltd Beijing China Blockchain Application Technology Laboratory of State Grid Corporation of China Beijing China
As the most important energy exchange hub of the new power system, the distribution network is of great significance for supporting clean energy production and electricity substitution for energy consumption. The bloc... 详细信息
来源: 评论
Beyond Basic Trust: Envisioning the Future of NextGen Networked systems and Digital Signatures
Beyond Basic Trust: Envisioning the Future of NextGen Networ...
收藏 引用
IEEE international conference on Trust, Privacy and security in Intelligent systems and Applications (TPS-ISA)
作者: Attila A. Yavuz Kiarash Sedghighadikolaei Saleh Darzi Saif E. Nouma Computer Science & Engineering University of South Florida Tampa FL USA
Authentication and integrity are foundational security services for trustworthy systems and the prerequisite of privacy preservation. At the heart of these services lies digital signatures, widely deployed in real-lif...
来源: 评论