咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,231 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5348 条 记 录,以下是71-80 订阅
排序:
Machine Learning Techniques to Detect a DDoS Attack in Flying AD-HOC Network
Machine Learning Techniques to Detect a DDoS Attack in Flyin...
收藏 引用
Device Intelligence, Computing and Communication Technologies, (DICCT), international conference on
作者: Khushbu Jaiswal Sudesh Kumar Neeraj Kumar Rathore Department of Computer Science Indira Gandhi National Tribal University Amarkantak Madhya Pradesh India
Flying Ad-hoc Network (FANET) consists of aerial devices, such as Unmanned Aerial Vehicles (UAVs), which work together to perform specific tasks. The system stands out because of its unique coverage, speed, and mobili... 详细信息
来源: 评论
Quantum Long Sort-Term Memory-based Identification of distributed Denial of Service Attacks
Quantum Long Sort-Term Memory-based Identification of Distri...
收藏 引用
AI in Cybersecurity (ICAIC), international conference on
作者: Sarvapriya Tripathi Himanshu Upadhyay Jayesh Soni Electrical and Computer Engineering Florida International University Miami USA
distributed Denial of Service (DDoS) is defined as an attack targeting a server, where the server is overwhelmed by an overflow of traffic, leading to a computer system being compromised. To prevent these attacks from... 详细信息
来源: 评论
Assessing the Impact of Machine Learning-Based DDoS Attack Detection on SDN Network Performance
Assessing the Impact of Machine Learning-Based DDoS Attack D...
收藏 引用
international conference on Information Networking
作者: SmritiArora HariBabuK ShrinivasChoudhary CSIS BITS Pilani Rajasthan India
In recent years, the field of network security has seen significant progress. Researchers and developers have focused their efforts on designing innovative techniques to detect and counter various security threats and... 详细信息
来源: 评论
Enhancing Intrusion Detection in Smart Grids: A Machine Learning-based Defense Against DDoS Attacks with Imbalance-Aware Optimization
Enhancing Intrusion Detection in Smart Grids: A Machine Lear...
收藏 引用
Electronics and Renewable systems (ICEARS), international conference on
作者: Mahaveerakannan R T. Rajesh Kumar Balamanigandan R Parnandi Srinu Vasarao Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai Tamil Nadu India Department of Computer Science and Engineering Swarnandhra College of Engineering and Technology Narsapur Andhra Pradesh India
The presence of numerous bidirectional communication devices connecting customers to the grid makes smart grid networks particularly vulnerable to network attacks. As an instance of a network attack that could impact ... 详细信息
来源: 评论
A Blockchain-Based Intelligent IoT Communication System for Enhanced security, Reliability, and Efficiency
A Blockchain-Based Intelligent IoT Communication System for ...
收藏 引用
Advanced Computing Technologies (ICoACT), international conference on
作者: Dinesh Kumar K J. Gobinath Jayavadivel Ravi S. Saravanakumar Senthil P B. Prabhu Shankar Department of Computer Science and Engineering Vel Tech University Chennai India Department of Computer Science and Engineering Rajiv Gandhi College of Engineering Chennai India School of Computer Science and Engineering Presidency University Bengaluru India Department of Information Technology Paavai Engineering College Paachal India Department of Artificial Intelligence and Data Science T.J.S.Engineering college Chennai India Department of Artificial Intelligence and Machine Learning Vel Tech University Chennai India
This research proposes a new approach for developing and implementing a smart communication system of IoT through developmental blockchain technology. Regarding the proposed solution, it is suggested that a distribute... 详细信息
来源: 评论
Investigating a Comprehensive IoT security Solution Based on Blockchain  6th
Investigating a Comprehensive IoT Security Solution Based on...
收藏 引用
6th international conference on Advanced Informatics for Computing Research, ICAICR 2023
作者: Madhan, Ravinder Singh Singh, Randeep IEC University Himachal Pradesh Baddi174103 India
The term "Internet of Things" (IoT) refers to a network of interconnected objects capable of gathering data from their immediate surroundings and facilitating communication with one another over the Internet... 详细信息
来源: 评论
Trust-Based Assured Sensor Fusion in distributed Aerial Autonomy  25
Trust-Based Assured Sensor Fusion in Distributed Aerial Auto...
收藏 引用
Proceedings of the ACM/IEEE 16th international conference on Cyber-Physical systems (with CPS-IoT Week 2025)
作者: R. Spencer Hallyburton Miroslav Pajic Department of Electrical and Computer Engineering Duke University Durham NC USA
Multi-agent collaboration enhances situational awareness in intelligence, surveillance, and reconnaissance (ISR) missions. Ad hoc networks of unmanned aerial vehicles (UAVs) allow for real-time data sharing, but they ... 详细信息
来源: 评论
Research on computer Network Big Data security Defense System Based on Support Vector Machine and Deep Learning
Research on Computer Network Big Data Security Defense Syste...
收藏 引用
Electronics, Energy systems and Power Engineering (EESPE), IEEE international conference on
作者: Yi Wang Jikui Wang Gansu Province Natural Resources Information Center Lanzhou Gansu China Lanzhou University of Finance and Economics Lanzhou Gansu China
Due to the swift progress of big data technology, traditional network security systems that are in use can hardly deal with complex and diverse network attacks. In the current paper, a network security system that is ... 详细信息
来源: 评论
5th international conference on Computing Science, Communication and security, COMS2 2024
5th International Conference on Computing Science, Communica...
收藏 引用
5th international conference on Computing Science, Communication and security, COMS2 2024
The proceedings contain 31 papers. The special focus in this conference is on Computing Science, Communication and security. The topics include: Osmotic Computing-Based Task Offloading: A Fuzzy Logic-Based Approach;Tr...
来源: 评论
Enhancing Cyber security Against DDoS Attacks: A Comprehensive Review and Future Directions
Enhancing Cyber Security Against DDoS Attacks: A Comprehensi...
收藏 引用
AIML-Applications for Engineering & Technology (ICAET), international conference on
作者: Smruti Jagtap Vikrant Kavitkar Mahek Jain Anup Ingle Jayashree P. Tamkhade Ketki Kshirsagar Vishwakarma Institute of Information Technology Pune India
distributed Denial of Service (DDoS) attacks pose significant threats to network infrastructures, particularly in critical sectors such as smart grid systems. This paper presents a comprehensive review of DDoS attack ... 详细信息
来源: 评论