咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是761-770 订阅
排序:
Next Generation Firewall and Self Authentication for Network security
Next Generation Firewall and Self Authentication for Network...
收藏 引用
international conference on Image Information Processing
作者: Bhagwant Singh Sikander Singh Cheema Department of Computer Science and Engineering Punjabi University Patiala Punjab India
In the era of the technologies, given the importance of the prevalence of the Internet, network safety is now essential to maintaining the accessibility and confidentiality of networks and data. Regular firewalls cann... 详细信息
来源: 评论
Assessment of Data Augmentation Paradigms in Pathology Identification
Assessment of Data Augmentation Paradigms in Pathology Ident...
收藏 引用
Information Technology (OCIT), OITS international conference on
作者: Sai Karthik Nallamothu Pradeep Sai Teja Sanka Srikar Vaka Raja Pavan Vignesh Kajjayam Yeswanthvenkatakumar Vidavaluru Tapas Kumar Mishra Department of Computer Science and Engineering SRM University-AP Andhra Pradesh India Department of Computer Science and Engineering SRM University Kattankulathur India
Data augmentation has an important role in improving the performance of models in medical realm. This research shows the impact of various data augmentation techniques by evaluating its performance using two medical d... 详细信息
来源: 评论
Intrusion Detection for Advanced Metering Infrastructure using Machine Learning
Intrusion Detection for Advanced Metering Infrastructure usi...
收藏 引用
international conference on Adaptive Science & Technology (ICAST)
作者: Kenneth Broni Godfrey Mills Department of Computer Engineering University of Ghana Accra Ghana
Advanced Metering Infrastructure (AMI) system, is made up of smart meters, data management software, and communication networks for energy usage analysis and data transmission. AMI technology has seen a surge in popul... 详细信息
来源: 评论
Octopus: Experiences with a Hybrid Event-Driven Architecture for distributed Scientific Computing
Octopus: Experiences with a Hybrid Event-Driven Architecture...
收藏 引用
High Performance Computing, Networking, Storage and Analysis, SC-W: Workshops of the international conference for
作者: Haochen Pan Ryan Chard Sicheng Zhou Alok Kamatar Rafael Vescovi Valérie Hayot-Sasson André Bauer Maxime Gonthier Kyle Chard Ian Foster Department of Computer Science University of Chicago Chicago IL USA Data Science and Learning Division Argonne National Laboratory Lemont IL USA Department of Computer Science Southern University of Science and Technology China Department of Computer Science Illinois Institute of Technology Chicago IL USA
Scientific research increasingly relies on distributed computational resources, storage systems, networks, and instruments, ranging from HPC and cloud systems to edge devices. Event-driven architecture (EDA) benefits ... 详细信息
来源: 评论
Trust-Based Assured Sensor Fusion in distributed Aerial Autonomy  25
Trust-Based Assured Sensor Fusion in Distributed Aerial Auto...
收藏 引用
Proceedings of the ACM/IEEE 16th international conference on Cyber-Physical systems (with CPS-IoT Week 2025)
作者: R. Spencer Hallyburton Miroslav Pajic Department of Electrical and Computer Engineering Duke University Durham NC USA
Multi-agent collaboration enhances situational awareness in intelligence, surveillance, and reconnaissance (ISR) missions. Ad hoc networks of unmanned aerial vehicles (UAVs) allow for real-time data sharing, but they ... 详细信息
来源: 评论
Sentiment Analysis in Social Media using Bidirectional Long Short Term Memory with Focus Loss function
Sentiment Analysis in Social Media using Bidirectional Long ...
收藏 引用
distributed systems, computer networks and Cybersecurity (ICDSCNC), international conference on
作者: A R. Sivakumaran Ammar H. Shnain Jayapal Lande Anupama Sindgi Patlolla Sruthi Department of Information Technology Malla Reddy Engineering College for Women (UGC-Autonomous) Hyderabad India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of Computer Science & Artificial Intelligence SR University Warangal India Department of ECE Nitte Meenakshi Institute of Technology Bengaluru India Department of AI&ML Gokaraju Rangaraju Institute of Engineering and Technology Hyderabad India
Sentiment Analysis (SA), is often known as "Opinion Mining" which seeks to analyze sentiment polarities in opinion-based texts. Several Deep Learning (DL) approaches are developed to effectively solves the c... 详细信息
来源: 评论
A Review of DDoS Attacks and its Countermeasures in Cloud Computing  5
A Review of DDoS Attacks and its Countermeasures in Cloud Co...
收藏 引用
5th international conference on Information systems and computer networks, ISCON 2021
作者: Varma, S.Asha Reddy, Karri.Ganesh VIT-AP University School of Computer Science and Engineering Amaravathi India
In the present scenario, cloud computing has become a marketable technology that allows consumers to easily access resources through the internet, based on pay per use model. These resources are provided as services t... 详细信息
来源: 评论
Decentralized File Storage System
Decentralized File Storage System
收藏 引用
international conference on Computing and Networking Technology (ICCNT)
作者: Kshitij Tiwari Namrata Dhanda Rajat Verma Computer Science & Engineering Department Amity University Lucknow Uttar Pradesh India Computer Science & Engineering Department Pranveer Singh Institute of Technology Kanpur Uttar Pradesh India
The need for safe, scalable, and effective cloud storage solutions has increased in a time when digital information is essential to society. Let us introduce you to Google Drive, a reliable cloud storage solution that... 详细信息
来源: 评论
Enhancing Cyber security Against DDoS Attacks: A Comprehensive Review and Future Directions
Enhancing Cyber Security Against DDoS Attacks: A Comprehensi...
收藏 引用
AIML-Applications for Engineering & Technology (ICAET), international conference on
作者: Smruti Jagtap Vikrant Kavitkar Mahek Jain Anup Ingle Jayashree P. Tamkhade Ketki Kshirsagar Vishwakarma Institute of Information Technology Pune India
distributed Denial of Service (DDoS) attacks pose significant threats to network infrastructures, particularly in critical sectors such as smart grid systems. This paper presents a comprehensive review of DDoS attack ... 详细信息
来源: 评论
An Intense Systematic Review of Mobile Agent Based Harmful Threats And Attack Detection systems in IOT networks
An Intense Systematic Review of Mobile Agent Based Harmful T...
收藏 引用
Advance Computing and Innovative Technologies in Engineering (ICACITE), international conference on
作者: M. Vigenesh G. Ravivarman Prabhdeep Singh Shaik Vaseem Akram Deepti Sharma Mohit Tiwari Department of CSE Karpagam Academy of Higher Education Coimbatore Department of EEE Karpagam Academy of Higher Education Coimbatore Tamil Nadu Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India Uttaranchal Institute of Technology Uttaranchal University Department of Management Uttaranchal University Dehradun Department of Computer Science and Engineering Bharati Vidyapeeth’s College of Engineering Delhi
A breach is detected by an intrusion detection system (IDS) by analysing events that are deemed risky from a security standpoint in systems and networks. Due to a surge in occurrences involving network security, organ...
来源: 评论