咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是711-720 订阅
排序:
Comments on "Two Authentication and Key Agreement Protocols in WSN Environments"  5th
Comments on "Two Authentication and Key Agreement Protocol...
收藏 引用
5th international conference on Smart Vehicular Technology, Transportation, Communication and Applications, VTCA 2022
作者: Kong, Fangfang Kumari, Saru Wu, Tsu-Yang College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China Department of Mathematics Chaudhary Charan Singh University Uttar Pradesh Meerut250004 India
Wireless sensor network (WSN) is a self-organizing network composed of distributed sensor nodes. Its appearance has dramatically changed people’s lives and is now widely used in various fields. Due to the openness of... 详细信息
来源: 评论
Federated Ensemble for Lung Pneumonia Detection
Federated Ensemble for Lung Pneumonia Detection
收藏 引用
international conference on Computing and Networking Technology (ICCNT)
作者: Vishwash Sharma VenkataHemant Kumar Reddy Challa Pasupuleti Pranavi Tripty Singh Rekha R Nair Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India Department of Computer Science and Enginnering Alliance School of Advanced Computing Alliance University Bengaluru India
In the realm of medical imaging, the detection of lung pneumonia through automated methods has garnered significant attention due to its potential to augment diagnostic processes. This study proposes a novel approach,... 详细信息
来源: 评论
Decentralized Metaverse: Towards a Secure, Autonomous, and Inclusive Virtual World
Decentralized Metaverse: Towards a Secure, Autonomous, and I...
收藏 引用
Electrical, computer and Energy Technologies (ICECET), international conference on
作者: Saeed Hamood Alsamhi Ammar Hawbani Santosh Kumar Lukasz Porwol Edward Curry Insight Centre for Data Analytics University of Galway Galway Ireland School of Computer Science Shenyang Aerospace University Shenyang China Computer Science and Engineering IIIT Naya Raipur Chhattisgarh India
The metaverse is a universal and immersive virtual world, which are components of cyber-physical-social systems (CPSS). The traditional centralized approach to building a metaverse poses risks to user privacy, securit...
来源: 评论
Enhancing Building Management systems with distributed Intelligence
Enhancing Building Management Systems with Distributed Intel...
收藏 引用
international conference on Communication systems and Network Technologies (CSNT)
作者: B Rajalakshmi V Venkat Reddy Bhupendra Malviya H Pal Thethi Praveen Myasar Mundher Adnan Department of Computer Science New Horizon College of Engineering Bangalore India Institute of Aeronautical Engineering Hyderabad Department of Computer Science & Engineering IES College of Technology Bhopal M. P. India Lovely Professional University Phagwara India Lloyd Institute of Engineering & Technology Greater Noida Uttar Pradesh The Islamic university Najaf Iraq
There has been a significant change in the management and operation of buildings as a result of the incorporation of distributed Intelligence into Building Management systems. This paper analyzes the revolutionary pot... 详细信息
来源: 评论
Blockchain - Enhanced Secure and Efficient IPFS - based EHR Management: A Decentralized Approach
Blockchain - Enhanced Secure and Efficient IPFS - based EHR ...
收藏 引用
international conference on Emerging Trends in networks and computer Communications (ETNCC)
作者: Santhi V Diyaa Santhosh Samyuktha N Sachitha C Department of Computer Science and Engineering PSG College of Technology Coimbatore
This paper introduces a novel healthcare system based on blockchain and IPFS technologies, designed to securely store and facilitate the sharing of patient health records. The system is structured into three layers: b... 详细信息
来源: 评论
Prediction of Human Age and Gender Using Deep Learning For Smart security systems
Prediction of Human Age and Gender Using Deep Learning For S...
收藏 引用
distributed Computing and Electrical Circuits and Electronics (ICDCECE), IEEE international conference on
作者: Durga Bhavani Kinthadi Abhishekar Burugu Anish Rumandla Sujana S Dept. of ECE Vardhaman College of Engineering Hyderabad Telangana Dept. of ECE Vardhaman College of Engineering Hyderbad Telangana
The demand for accurate identification and verification of a person has increased as the number of smart security systems has grown. In recent years, data from a human face has been used in numerous real-world applica...
来源: 评论
Optimized Local Secret Sharing Techniques for distributed Blockchain networks
Optimized Local Secret Sharing Techniques for Distributed Bl...
收藏 引用
international conference on Science Technology Engineering and Management (ICONSTEM)
作者: M.S. Roobini Chappidi Sindhuja Chanda Shravan Manju C Nair M. Gowri Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India
In blockchain systems, transaction details are stored across a distributed ledger, and each peer bears the responsibility of upkeeping an identical replica of this ledger. This project explains the challenges faced by... 详细信息
来源: 评论
Modified LSTM Based Intrusion Detection System for networks
Modified LSTM Based Intrusion Detection System for Networks
收藏 引用
international conference on Parallel distributed and Grid Computing (PDGC)
作者: R Allen Joseph Abhishek K Anna Sanjay Kumar T Department of Information Technology Velammal College of Engineering and Technology Madurai India
The proliferation of wireless networks in the past decade is seriously coupled with security threats and intrusion incidents, raising greater demands for robust and efficient intrusion detection systems. A new approac... 详细信息
来源: 评论
The Application of Deep Learning Techniques in computer security for Big Data Anomaly Detection
The Application of Deep Learning Techniques in Computer Secu...
收藏 引用
Integrated Intelligence and Communication systems (ICIICS), international conference on
作者: Zhijuan Duan Wuhan University of Engineering Science Wuhan Hubei China
Today, with the rapid development of the Internet, the requirements for network security are increasing day by day. This article explores the application of deep learning technology, especially convolutional neural ne... 详细信息
来源: 评论
Comparing the Supersonic Cloud Computing Model to Enhance the Networking and security in Traditional Data Centers
Comparing the Supersonic Cloud Computing Model to Enhance th...
收藏 引用
Disruptive Technologies (ICDT), international conference on
作者: Ranadeep Reddy Palle Vinay Mallikarjunaradhya Haritha Yennapusa K. Suganyadevi Nidhi Gupta Department of Computer Science University of Houston Austin Texas USA Legal Tech Platform Thomson Reuters Toronto Canada Department of Computer Science University of central Missouri Austin Texas USA Department of ECE Sri Eshwar College of Engineering Coimbatore Tamil Nadu India Department of Computer Science and Engineering G.L. Bajaj Institute of Technology and Management Greater Noida India
The Comparing the supersonic cloud computing model to enhance the networking and security in Traditional Data Centers study aimed to analyse the differences between traditional data centers and cloud computing models....
来源: 评论