咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 371 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 617 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 39 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是771-780 订阅
排序:
Deep Learning-Based DDoS Attack Detection Using Adversarial Optimization
Deep Learning-Based DDoS Attack Detection Using Adversarial ...
收藏 引用
IEEE international conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Dahai Yu Jianming Cui Yungang Jia Peiguo Fu Ming Liu School of Information Engineering Chang’an University Xi’an China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
In the field of cybersecurity, increasingly emerging network threats seriously affect the security of network and users. Notably, DDoS attacks represent a critical concern due to their capacity to inundate and debilit... 详细信息
来源: 评论
DNN Partitioning and Assignment for distributed Inference in SGX Empowered Edge Cloud
DNN Partitioning and Assignment for Distributed Inference in...
收藏 引用
international conference on distributed Computing systems
作者: Yuepeng Li Deze Zeng Lin Gut Song Guo Albert Y. Zomaya School of Computer Science China University of Geosciences Wuhan China Engineering Research Center of Natural Resource Information Management and Digital Twin Engineering Software Ministry of Education Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing The Hong Kong Polytechnic University Hong Kong School of Computer Science The University of Sydney Australia
distributed Deep Neural Network (DNN) inference is a promising technology to explore the distributed resources in edge cloud to realize edge intelligence. Meanwhile the inherent resource sharing nature of edge cloud i... 详细信息
来源: 评论
CT-PBFT: A Comprehensive Trust-Based Practical Byzantine Consensus Algorithm
CT-PBFT: A Comprehensive Trust-Based Practical Byzantine Con...
收藏 引用
international conference on computer and Communications (ICCC)
作者: Yufei He Siyuan Du Shuaifan Xia Yingkang Zhong Qingwen Liu Chunqi Tian Wen Fang Mingliang Xiong College of Computer Science and Technology Tongji University Shanghai China Shanghai Research Institute for Intelligent Autonomous Systems Tongji University Shanghai China College of Electronic and Information Engineering Tongji University Shanghai China
Blockchain technology has become a foundational component for constructing decentralized, secure, and immutable distributed systems. The consensus mechanism ensures that all nodes in a blockchain network reach agreeme... 详细信息
来源: 评论
SPM-GCN: An adaptive reordering algorithm for sparse LU factorization via GCN
SPM-GCN: An adaptive reordering algorithm for sparse LU fact...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Min Tian Huazeng Liu Junjie Wang Qi Liu Wei Du Zanjun Zhang Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan Key Laboratory of High Performance Computing Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Shaanxi Key Laboratory of Large Scale Electromagnetic Computing Xidian University Xi’an China
Sparse LU factorization is a critical kernel in scientific computing and engineering applications. A better nonzero pattern of sparse matrixes can accelerate LU factorization by reordering. Traditionally it’s difficu...
来源: 评论
LDVNet: Lightweight and Detail-Aware Vision Network for Image Recognition Tasks in Resource-Constrained Environments
LDVNet: Lightweight and Detail-Aware Vision Network for Imag...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Yuchen Liu Hu Liang Ran Qiu Shengrong Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In many underwater application scenarios, recognition tasks need to be executed promptly on computationally limited platforms. However, models designed for this field often exhibit spatial locality, and existing works...
来源: 评论
Blockchain-Enhanced AI Diagnostics in Healthcare
Blockchain-Enhanced AI Diagnostics in Healthcare
收藏 引用
Emerging Technologies and Innovation for Sustainability (EmergIN), international conference on
作者: Sachin Pal Tanushka Kanishka Jha Deepika Sharma Department of Computer Science and Engineering Chandigarh University Mohali India Department of Computer Science and Engineering Banasthali Vidhyapith Tonk Rajasthan India Department of Computer Science and Engineering Chandigarh University Mohali Punjab India
The integration of advanced diagnostic systems and Blockchain technology offers a transformative opportunity to revolutionize healthcare by improving accuracy, enhancing data security, and enabling efficient, patient-... 详细信息
来源: 评论
Vulnerability Assessment of security Breach and Deadly Threat in Cloud Computing Environment
Vulnerability Assessment of Security Breach and Deadly Threa...
收藏 引用
international conference on Computational Intelligence and Communication networks (CICN)
作者: Ashish Gupta Shreya Sinha Harsh Kumar Singh Bharat Bhushan Computer Science and Engineering Sharda University Greater Noida India
Cloud computing allows us to access available systems and pay for what we require whenever needed. When there is access to the internet, it uses some techniques like Service-Oriented Architecture (SOA), virtualization...
来源: 评论
The Role of IoT in Enhancing Wireless Sensor Network Applications: A Comprehensive Analysis
The Role of IoT in Enhancing Wireless Sensor Network Applica...
收藏 引用
Emerging Trends in Engineering and Medical Sciences (ICETEMS), international conference on
作者: Sonia Singh Neha Gupta School of Computer Applications Manav Rachna International Institute of Research & Studies Faridabad India
WSNs are a system of spatially distributed sensors that sense some environmental phenomena and communicate the information without wires to a central system. Now, integration with the IoT further strengthens WSNs in a... 详细信息
来源: 评论
Scalable and Adaptive Intrusion Detection in Cloud Environments Using Machine Learning with CIML-IDS
Scalable and Adaptive Intrusion Detection in Cloud Environme...
收藏 引用
Next Generation Communication & Information Processing (INCIP), international conference on
作者: Uma Reddy Yagateela Pandu Rangaiah Amandeep Nagpal Abhishek Kaushik Mustafa Abdulhussein Al-Allak Department of Artificial Intelligence and Machine Learning N.H. College of Engineering Bangalore India Department of Electronics and Communication Enfineering Institute of Aeronautical Engineering Dundigal Hyderabad India Lovely Professional University Phagwara India Lloyd Institute of Engineering & Technology Greater Noida Uttar Pradesh College of Medical Technology The Islamic University Najaf Iraq
The combination of Machine Learning (ML) with Network Intrusion Detection systems (NIDS) can be considered a revolutionary step that took place in the sphere of network security especially when implemented in cloud en... 详细信息
来源: 评论
University distributed computer Network Vulnerability Assessment
University Distributed Computer Network Vulnerability Assess...
收藏 引用
Smart Information systems and Technologies (SIST), IEEE international conference on
作者: Valerii Lakhno Volodimir Malyukov Bakhtyzhan Akhmetov Bagdat Yagaliyeva Olena Kryvoruchko Alona Desiatko Department of Computer Systems Networks and Cybersecurity National University of Life and Environmental Sciences of Ukraine Kyiv Ukraine Department of Informatics and Informatization of Education Abai Kazakh National Pedagogical University Almaty Kazakhstan Department of Computer Sciences Yessenov University Aktau Kazakhstan Department of Software Engineering and Cybersecurity State University of Trade and Economics Kyiv Ukraine
A methodology for evaluating information security (IS) for a distributed computer network (DCN) of a university (hereinafter referred to as UDCN) has been proposed. A mathematical model for calculating the UDCN vulner...
来源: 评论