咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是741-750 订阅
排序:
Integration of Blockchain in computer Networking: Overview, Applications, and Future Perspectives for Software-defined Networking (SDN), Network security, and Protocols
Integration of Blockchain in Computer Networking: Overview, ...
收藏 引用
international conference on Software Defined systems (SDS)
作者: Md Jobair Hossain Faruk Jerry Q. Cheng Department of Computer Science New York Institute of Technology USA
The rapid advancement and increasing complexity of computer networks have created a need for robust, secure, and scalable solutions in order to manage and protect network resources. Blockchain, an emerging distributed...
来源: 评论
Investigation of Different Techniques on Digital Actual Frameworks Toward distributed Denial of Services Attack
Investigation of Different Techniques on Digital Actual Fram...
收藏 引用
international conference on Computing and Networking Technology (ICCNT)
作者: Prashant Mandale Shabina Modi Makarand Mohan Jadhav Swati Shailesh Khawate Vishal Kisan Borate Yogesh Kisan Mali Department of Information Technology International Institute of Information Technology (I2IT) Pune India Karmaveer Bhaurao Patil College of Engineering Satara India Dept of Electronics & Telecommunication Engg NBN SinhgadTechnical Institutes Campus Pune India Dept Electronics and telecommunication Ajeenkya D Y patil School of Engineering Pune India Department of Computer Engineering Dr D Y Patil College of Engineering & Innovation Talegaon Pune India Department of Artificial Intelligence G.H Raisoni College of Engineering and Management Wagholi Pune India
The arising development of the Web of Things (IoT) offers different adaptability in information move processes, specialized strategies, and capacity. distributed storage is used by limit of the populace to use their i... 详细信息
来源: 评论
Probing with a Generic MAC Address: An Alternative to MAC Address Randomisation
Probing with a Generic MAC Address: An Alternative to MAC Ad...
收藏 引用
international conference on Software, Telecommunications and computer networks (SoftCOM)
作者: Johanna Ansohn McDougall Alessandro Brighente Anne Kunstmann Niklas Zapatka Hanna Schambach Hannes Federrath Security in Distributed Systems University of Hamburg Hamburg Germany Department of Mathematics University of Padova Padua Italy
Active scanning via probe requests is a means for mobile devices to detect known networks. To protect the device from being tracked via an unchanging identifier contained in the probe request, MAC address randomisatio... 详细信息
来源: 评论
Enhancing security in Automobile Edge Computing through Federated Learning and Blockchain
Enhancing Security in Automobile Edge Computing through Fede...
收藏 引用
Quantum Technologies, Communications, Computing, Hardware and Embedded systems security (iQ-CCHESS), international conference on
作者: Sandosh S Sujay Doshi Atharva Joshi Faculty for Computer Science with specialization in Artificial Intelligence and Machine Learning Vellore Institute of Technology Chennai India Computer Science with specialization in Artificial Intelligence and Machine Learning Vellore Institute of Technology Chennai India
Vehicular networks that consist of interlinked automobiles and transportation network are prone to cyberattacks due to the increased use of software and the presence of wireless interfaces. To counter these threats, i...
来源: 评论
An Efficient Approach for Merging Multidimensional Blockchains in Mobile IoT
An Efficient Approach for Merging Multidimensional Blockchai...
收藏 引用
international conference on distributed Computing in Sensor systems (DCOSS)
作者: Hussein Zangoti Niki Pissinou Charles A Kamhoua School of Computing and Information Sciences Florida International University Miami FL USA Faculty of Computer Science & Information Technology Jazan University Jazan Saudi Arabia US Army Research Laboratory Network Security Branch Adelphi MD USA
Graph-based or multidimensional blockchains have been proposed to improve the scalability and efficiency of existing blockchain applications. However, when implemented in mobile Internet of Things (mIoT) networks, the...
来源: 评论
An Energy Efficient Clustering for Underwater Acoustic Sensor networks using 6G Technology
An Energy Efficient Clustering for Underwater Acoustic Senso...
收藏 引用
Recent Trends in computer Science and Technology (ICRTCST), international conference on
作者: Shams Tabrez Siddiqui Syed Ghyasuddin Hashmi Mohammed Maqsood Ali Ziauddin Syed Khalid Ali Qidwai Abu Salim Department of Computer Science College of Engineering and Computer Science Jazan University Jazan Saudi Arabia Department of Business Administration Applied College Jazan University Jazan Saudi Arabia
These underwater Acoustic Sensor networks (UWSNs) present unique challenges due to the harsh and dynamic underwater environment, making efficient communication protocols essential for their operation. This paper intro... 详细信息
来源: 评论
Intelligent Service Oriented Architecture (SOA) for State-of-the-Art IoT-DDoS Defense and Research Challenges
Intelligent Service Oriented Architecture (SOA) for State-of...
收藏 引用
IoT, Communication and Automation Technology (ICICAT), international conference on
作者: Manish Snehi Jyoti Verma Isha Kansal Renu Popli Rajeev Kumar Gurpreet Singh Saini Department of Computer Science and Engineering Punjabi University Patiala Punjab India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India School of Electronics and Electrical Engineering Lovely Professional University Punjab India
The Internet of Things (IoT) is rapidly surfacing that spans all spheres of life. However, IoT devices are less secure due to limited computational capabilities, making them easy for malware for various attacks. Distr...
来源: 评论
Modelling Organizational Recovery  13th
Modelling Organizational Recovery
收藏 引用
13th European-Alliance-for-Innovation (EAI) international conference on Simulation Tools and Techniques (EAI SIMUtools)
作者: Baldwin, Adrian Caulfield, Tristan Ilau, Marius-Constantin Pym, David HP Labs Bristol Avon England UCL London England Univ London Inst Philosophy London England
Organizations today face a significant set of sophisticated information security threats, including rapidly spreading malware that can affect many devices across the organization. The impacts of such attacks are ampli... 详细信息
来源: 评论
Industrial Network Protocol security Enhancement Using Programmable Switches
Industrial Network Protocol Security Enhancement Using Progr...
收藏 引用
IEEE international conference on Smart Grid Communications (SmartGridComm)
作者: Zheng Hu Hui Lin Luke Waind Yanfeng Qu Gong Chen Dong Jin Computer Science and Computer Engineering University of Arkansas Fayetteville AR USA Electrical Computer and Biomedical Engineering The University of Rhode Island Kingston RI USA Computer Science Illinois Institute of Technology Chicago IL USA
There has been a growing concern regarding the security of industrial network protocols in Supervisory Control and Data Acquisition (SCADA) systems. These protocols are vulnerable to a plethora of security threats, in...
来源: 评论
Optimal Trained Deep Maxout Model for Intrusion Detection in Cloud  1
Optimal Trained Deep Maxout Model for Intrusion Detection in...
收藏 引用
1st IEEE international conference on Automation, Computing and Renewable systems, ICACRS 2022
作者: Varghese, Meble Victor Jose, M. Computer Science & Engineering Noorul Islam Centre for Higher Education Kumaracoil Tamil Nadu Thuckalay629180 India Vel Tech Multi Tech Dr.Rangarajan Dr. Sakunthala Engineering College Avadi Tamilnadu Chennai600062 India
The decentralized and distributed nature of cloud computing makes it easier for diverse society sectors, including environment, business, and government, to accept and use it. As it permeates every element of society,... 详细信息
来源: 评论