咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是721-730 订阅
排序:
Fortifying IoT networks: A Blockchain-Based Communication security Paradigm
Fortifying IoT Networks: A Blockchain-Based Communication Se...
收藏 引用
international conference on Computational Intelligence and Communication networks (CICN)
作者: Kiran B V Samay Deepak Shetty Vinith Vijay Shetty Prakhyat Prakash Shetty ShivaKumar V Computer Science and Engineering Alvas Institute of Engineering and Technology Mangalore India
Blockchain technology has taken a long way since its introduction together with Bitcoin in 2008. Today, this technology is being applied beyond just cryptocurrencies into, among others, the Internet of Things (IoT) an... 详细信息
来源: 评论
Optimized Bidirectional Long Short-Term Memory Model for distributed Denial of Service Attack Detection in Wireless Sensor networks
Optimized Bidirectional Long Short-Term Memory Model for Dis...
收藏 引用
Smart Technologies and systems for Next Generation Computing (ICSTSN), international conference on
作者: K Poongodi S Mithuna S Rajkumar Computer Science and Engineering K. S. Rangasamy College of Technology India
The rapid expansion of Wireless Sensor networks (WSNs) has made them a critical component in various applications, from environmental monitoring to military surveillance. However, their inherent vulnerabilities make t... 详细信息
来源: 评论
Research on Non-IID Cervical Cell Image Classification Algorithm Based on Federated Learning  10
Research on Non-IID Cervical Cell Image Classification Algor...
收藏 引用
10th international conference on Information systems and Computing Technology, ISCTech 2022
作者: He, Huizhen Feng, Kaiping School of Computer Science Guangdong University of Technology Guangzhou China School of Art and Design Guangdong University of Technology Guangzhou China
Aiming at the performance degradation of existing federated learning algorithms in non-IID image classification tasks, a method of improving SRGAN and dynamically balancing the distribution of client data sets is prop... 详细信息
来源: 评论
Unifying RNN and KNN for Enhancing Mirai Attack Detection in IoT networks
Unifying RNN and KNN for Enhancing Mirai Attack Detection in...
收藏 引用
Information Technology, Electronics and Intelligent Communication systems (ICITEICS), IEEE international conference on
作者: Ankita Kumari Deepali Gupta Mudita Uppal Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
Malicious software gets into Internet of Things (IoT) devices by using exploits and default passwords, which leads to Mirai attacks on IoT networks. These viruses can turn devices into botnets, which raises the risk o... 详细信息
来源: 评论
Entropy-Based Attack Detection and Filtering for Enhanced Message Reception in CAN networks
Entropy-Based Attack Detection and Filtering for Enhanced Me...
收藏 引用
Electrical, computer and Energy Technologies (ICECET), international conference on
作者: Harish Madimangalam Ramesh Anup Kumar Yi Huang Md Tanzil Hoque Chowdhury Jayanta K. Debnath Bin Xie Department of CSE University of Louisville Louisville Kentucky USA Infobeyond Technology LLC Louisville Kentucky USA
Advancements in automotive technology have been prominent in enabling communication with both internal and external networks (cellular, Bluetooth, satellite navigation, etc.) in vehicles, making it easier and more rel... 详细信息
来源: 评论
distributed Blockchain-SDN Models for Robust Data security in Cloud-Integrated IoT networks
Distributed Blockchain-SDN Models for Robust Data Security i...
收藏 引用
Automation, Computing and Renewable systems (ICACRS), international conference on
作者: Koya Haritha Sai Srinivas Vellela Roja D Lakshma Reddy Vuyyuru Nallapu Malathi Lavanya Dalavai Dept. of CSE-Data Science Chalapathi Institute of Technology Guntur AP India Dept. of CSE KoneruLakshmaiah Education Foundation Vaddeswaram AP India Dept. of CSE-DS KKR & KSR Institute of Technology and Sciences Guntur AP India
Blockchain and SDN are combined in the "DistB-SD Cloud" architecture to secure and execute cloud-integrated IoT data. Cloud Computing Management and Services, distributed Secure Blockchain Methodology, SDN E... 详细信息
来源: 评论
An Application for Privacy-Preserving Contact Tracing and Public Risk Assessment Using Blockchain for Covid-19 Pandemic  7th
An Application for Privacy-Preserving Contact Tracing and Pu...
收藏 引用
7th international conference on Information and Communication Technology for Competitive Strategies, ICTCS 2022
作者: Shreya, K.R. Nagamani, D.R. Department of Computer Science and Engineering Bangalore Institute of Technology Karnataka Bangalore India
Many nations are debating on the ways to revert to the new regular state of living as the count of reported infections and victims of the novel COVID-19 outbreak drops with each day gradually. One option examined is t... 详细信息
来源: 评论
Research on computer Network Big Data security Defense System Based on Support Vector Machine and Deep Learning
Research on Computer Network Big Data Security Defense Syste...
收藏 引用
Electronics, Energy systems and Power Engineering (EESPE), IEEE international conference on
作者: Yi Wang Jikui Wang Gansu Province Natural Resources Information Center Lanzhou Gansu China Lanzhou University of Finance and Economics Lanzhou Gansu China
Due to the swift progress of big data technology, traditional network security systems that are in use can hardly deal with complex and diverse network attacks. In the current paper, a network security system that is ... 详细信息
来源: 评论
The Internet of Trust: Securing and Transparent Supply Chains with Blockchain and IoT
The Internet of Trust: Securing and Transparent Supply Chain...
收藏 引用
international Symposium on Advanced networks and Telecommunication systems (ANTS)
作者: Gaurav Singal Riti Kushwaha Ashish Sharma Tulika Tewari SMIEEE Computer Science and Engineering Netaji Subhash University of Technology Delhi India School of Computer Science and Technology Bennett University Greater Noida India Computer Science and Engineering Manipal University Jaipur India Computer Science and Engineering Netaji Subhash University of Technology Delhi India
In an era where digital commerce continues to burgeon, the conventional supply chain confronts challenges of inefficiency, fraud, and a dearth of transparency. Blockchain, renowned for its decentralized and immutable ... 详细信息
来源: 评论
Cryptographic Ledger for Cyber security in Smart Grid
Cryptographic Ledger for Cyber Security in Smart Grid
收藏 引用
international conference on Edge Computing and Applications (ICECAA)
作者: Elanchezhiyan E K. Kalaiselvi D. Banumathy Department of Networking and Communications Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamilnadu Department of Computer Science and Engineering Paavai Engineering College Namakkal Tamilnadu
In addition to the physical security of energy networks, cyber security is essential to protecting these systems as well. Cyber threats can stem from malicious hackers who have infiltrated the networks to gain unautho...
来源: 评论