咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是751-760 订阅
排序:
Synergistic Solution: IDS and Scheduler Harmony for Secure 5G Radio Resources
Synergistic Solution: IDS and Scheduler Harmony for Secure 5...
收藏 引用
international Wireless Communications and Mobile Computing conference, IWCMC
作者: Saloua Hendaoui Fatma Hendaoui Department of Computer Science College of Computer and Information Sciences Jouf University Sakaka KSA Department of Computer Science Applied College University of Ha’il HA’il KSA
The diverse range of applications in 5G networks introduces novel security challenges, particularly due to the high volume of transmitted packets. The proliferation of devices also increases their vulnerability to var... 详细信息
来源: 评论
DDoS Attacks Detection in IoT networks using Naive Bayes and Random Forest
DDoS Attacks Detection in IoT Networks using Naive Bayes and...
收藏 引用
Applied Artificial Intelligence and Computing (ICAAIC), international conference on
作者: Animesh Srivastava Shweta Tiwari Bhupender Singh Rawat Shiv Ashish Dhondiyal Department of Computer Science & Engineering Graphic Era Hill University Dehradun Department of Computer Science & Engineering Department / University Institute of Engineering Chandigarh University Gharuan Mohali Punjab College of Smart Computing COER University Roorkee Department of Computer Science & Engineering Graphic Era (Deemed to be University) Dehradun
The proliferation of Internet of Things (IoT) devices has resulted in numerous benefits, including streamlined tasks and improved connectivity but has also raised concerns regarding security vulnerabilities. Distribut... 详细信息
来源: 评论
Multifactor Authentication Using Blockchain in 6G
Multifactor Authentication Using Blockchain in 6G
收藏 引用
international conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)
作者: Aishwarya R Anusha Khot Sumana Sreenivas Nagamani K Electronics and Telecommunication Engineering R V College of Engineering Bangalore Karnataka
With the rise of 6G technology, cyberattacks have become a significant concern, necessitating robust data security measures. Multi-factor authentication (MFA) systems, integrating advanced biometric methods, offer a p... 详细信息
来源: 评论
Federated Patient Similarity Network for Data-Driven Diagnosis of COVID-19 Patients  18
Federated Patient Similarity Network for Data-Driven Diagnos...
收藏 引用
18th ACS/IEEE international conference on computer systems and Applications (AICCSA)
作者: El Kassabi, Hadeel T. Serhani, Mohamed Adel Navaz, Alramzana Nujum Ouhbi, Sofia UAEU Dept Comp Sci & Software Engn Coll Informat Technol Al Ain U Arab Emirates UAEU Dept Informat Syst & Secur Coll Informat Technol Al Ain U Arab Emirates
Sensitive patient data is generated from a variety of sources and then transferred to a cloud for processing. Therefore, it is exposed to security and privacy and may lead to an increase in communication costs. Edge c... 详细信息
来源: 评论
Investigation on the Integrated Cloud and BlockChain (ICBC)Technologies to Secure Healthcare Data Management systems
Investigation on the Integrated Cloud and BlockChain (ICBC)T...
收藏 引用
international conference on Developments in esystems Engineering (DESE)
作者: Aymen Mudheher Badr Lamia Chaari Fourati Samiha Ayed Digital Research Center of Sfax (CRNS) Laboratory of Signals Systems Artificial Intelligence and Networks (SM@RTS) Sfax University IRAQ Digital Research Center of Sfax (CRNS) Laboratory of Signals Systems Artificial Intelligence and Networks (SM@RTS) Sfax University TUNISIA Institute Charles Delaunay-ERA University of Technology of Troyes France
Blockchain is emerging as one of the most promising and resourceful security technologies for cloud infrastructures. In a distributed database system, blockchain is used to store, read, and validate transactions. It c... 详细信息
来源: 评论
Traffic Pattern Sharing for Federated Traffic Flow Prediction with Personalization  24
Traffic Pattern Sharing for Federated Traffic Flow Predictio...
收藏 引用
24th IEEE international conference on Data Mining, ICDM 2024
作者: Zhou, Hang Yu, Wentao Wan, Sheng Tong, Yongxin Gu, Tianlong Gong, Chen School of Computer Science and Engineering Nanjing University of Science and Technology China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information Ministry of Education China Jiangsu Key Laboratory of Image and Video Understanding for Social Security China SKLSDE Beihang University China Jinan University Engineering Research Center of Trustworthy AI Ministry of Education China
Accurate Traffic Flow Prediction (TFP) is crucial for enhancing the efficiency and safety of transportation systems, so it has attracted intensive researches by exploiting spatial-temporal dependencies within road net... 详细信息
来源: 评论
Integrated PON-VLC System for IoT Applications
Integrated PON-VLC System for IoT Applications
收藏 引用
distributed Computing and Electrical Circuits and Electronics (ICDCECE), IEEE international conference on
作者: Meet Kumari Neha Sharma Rahul Chauhan Kireet Joshi Amit Kumar Dept. of ECE UIE Chandigarh University Gharuan Mohali India Chitkara University Institute of Engineering and Technology Chitkara University Rajpura Punjab India Computer Science & Engineering Graphic Era Hill University Dehradun Uttarakhand India Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India
Healthcare is one of the vital and well-known application fields of internet of things (IoT) technology, which is being extensively accepted worldwide. In modern healthcare systems, the IoT -eHealth is playing a promi... 详细信息
来源: 评论
Affinity and Class Probability based Fuzzy Support Vector Machine for Path Loss Prediction in 5G Communication System
Affinity and Class Probability based Fuzzy Support Vector Ma...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: Zhiru Cong Shuqing Wang Department of Electronics and Automation Inner Mongolia Electronic Information Vocational and Technical College Hohhot China Department of Office/Security Supervision China United Network Communications Co. Ltd Hohhot China
Wireless propagation channel is a primary factor for optimizing and planning 5G communication system. Predicting path loss in 5G plays a vital role in optimizing performance of network and ensure appropriate communica... 详细信息
来源: 评论
Securing Smart Homes with Blockchain-Enabled systems
Securing Smart Homes with Blockchain-Enabled Systems
收藏 引用
international conference on ICT in Business Industry & Government (ICTBIG)
作者: Aravendra Kumar Sharma Ratnesh Kumar Dubey Pragya Goswami Rakesh Prasad Sarang CSA Department ITM University Gwalior
Growing Internet Of Things (IoT) boosts rapid development Of smart home technologies.. Yet it brings new security challenges.. Centralized architectures frequently used in smart home networks are particularly at risk ... 详细信息
来源: 评论
Developing a Face Recognition System Using Vision Transformer and Federated Learning
Developing a Face Recognition System Using Vision Transforme...
收藏 引用
international conference on Advanced Technologies for Communications, ATC
作者: Kiet Truong-Tuan Luan Van-Thien Thuat Nguyen-Khanh Dung Tran-Thi Quan Le-Trung Faculty of Computer Networks and Communications University of Information Technology Ho Chi Minh City Viet Nam Vietnam National University Ho Chi Minh City Vietnam
Traditional centralized approaches to training AI systems for face recognition raise significant privacy concerns by consolidating massive datasets in a single location. This method exposes personal data to potential ... 详细信息
来源: 评论