咨询与建议

限定检索结果

文献类型

  • 4,982 篇 会议
  • 280 册 图书
  • 89 篇 期刊文献

馆藏范围

  • 5,351 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,876 篇 工学
    • 2,567 篇 计算机科学与技术...
    • 1,716 篇 软件工程
    • 978 篇 信息与通信工程
    • 373 篇 电气工程
    • 304 篇 控制科学与工程
    • 183 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 121 篇 电子科学与技术(可...
    • 121 篇 安全科学与工程
    • 112 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 44 篇 交通运输工程
  • 615 篇 理学
    • 368 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 101 篇 统计学(可授理学、...
    • 85 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 185 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 240 篇 法学
    • 165 篇 法学
    • 81 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 500 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 152 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,230 篇 英文
  • 90 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5351 条 记 录,以下是71-80 订阅
排序:
Machine Learning Techniques to Detect a DDoS Attack in Flying AD-HOC Network
Machine Learning Techniques to Detect a DDoS Attack in Flyin...
收藏 引用
Device Intelligence, Computing and Communication Technologies, (DICCT), international conference on
作者: Khushbu Jaiswal Sudesh Kumar Neeraj Kumar Rathore Department of Computer Science Indira Gandhi National Tribal University Amarkantak Madhya Pradesh India
Flying Ad-hoc Network (FANET) consists of aerial devices, such as Unmanned Aerial Vehicles (UAVs), which work together to perform specific tasks. The system stands out because of its unique coverage, speed, and mobili... 详细信息
来源: 评论
Advancements in Suspicious and Violent Activity Recognition for Intelligent Video Surveillance
Advancements in Suspicious and Violent Activity Recognition ...
收藏 引用
Disruptive Technologies (ICDT), international conference on
作者: Niyati Rana Deepak Parashar Nilesh Bahadure Hetal Jethani Sudipta Banerjee Kanhaiya Sharma Department of Computer Scinece & Engineering GSFC University Vadodara Gujarat Gujarat India Dept. of CSE Symbiosis Institute of Technology Pune Symbiosis International Univesity Pune Maharashtra India
Recognition of suspicious or violent activity in video surveillance has become increasingly important in terms of public safety and security. This synthesis examined state-of-the-art methodologies for detecting anomal... 详细信息
来源: 评论
Integrating Blockchain and VANET for Privacy-Preserving and Authentication
Integrating Blockchain and VANET for Privacy-Preserving and ...
收藏 引用
international conference on ent Computing and Control systems (ICICCS)
作者: Sivagami A Sachin A Mohammad Arshath A Kiruthika N Department of Computer Science and Engineering Karpagam Academy of Higher Education Coimbatore India
Apart from safeguarding the cars' identity privacy within Vehicular Ad-hoc networks (VANETs), privacy-preserving authentication is considered the primary protection against potential attacks. Unfortunately, the cu... 详细信息
来源: 评论
Assessing the Impact of Machine Learning-Based DDoS Attack Detection on SDN Network Performance
Assessing the Impact of Machine Learning-Based DDoS Attack D...
收藏 引用
international conference on Information Networking
作者: SmritiArora HariBabuK ShrinivasChoudhary CSIS BITS Pilani Rajasthan India
In recent years, the field of network security has seen significant progress. Researchers and developers have focused their efforts on designing innovative techniques to detect and counter various security threats and... 详细信息
来源: 评论
Real-Time IoT Cybersecurity using Machine Learning-based AI Threat Detection System to Train Generative Robots
Real-Time IoT Cybersecurity using Machine Learning-based AI ...
收藏 引用
Trends in Material Science and Inventive Materials (ICTMIM), international conference on
作者: P Srilakshmi Koushik Reddy Chaganti Talachendri Suryam Sweety Julia I D. Chaithanya Jami Kavitha Department of CSE G Pulla Reddy Engineering College Dept. of Computer and Information Systems University of the Cumberlands Department of CSE (DATA SCIENCE) Vignan Institute of Technology and Science Department of AI&ML Malla Reddy University Department of CSE CVR College of Engineering Department of CSE Sanketika Vidya Parishad Engineering College
Existing security protocols encounter major cybersecurity difficulties because the online devices' growing popularity continues to spread across networks. These security protocols are ineffective because they do n... 详细信息
来源: 评论
Trust-Based Assured Sensor Fusion in distributed Aerial Autonomy  25
Trust-Based Assured Sensor Fusion in Distributed Aerial Auto...
收藏 引用
Proceedings of the ACM/IEEE 16th international conference on Cyber-Physical systems (with CPS-IoT Week 2025)
作者: R. Spencer Hallyburton Miroslav Pajic Department of Electrical and Computer Engineering Duke University Durham NC USA
Multi-agent collaboration enhances situational awareness in intelligence, surveillance, and reconnaissance (ISR) missions. Ad hoc networks of unmanned aerial vehicles (UAVs) allow for real-time data sharing, but they ... 详细信息
来源: 评论
Research on computer Network Big Data security Defense System Based on Support Vector Machine and Deep Learning
Research on Computer Network Big Data Security Defense Syste...
收藏 引用
Electronics, Energy systems and Power Engineering (EESPE), IEEE international conference on
作者: Yi Wang Jikui Wang Gansu Province Natural Resources Information Center Lanzhou Gansu China Lanzhou University of Finance and Economics Lanzhou Gansu China
Due to the swift progress of big data technology, traditional network security systems that are in use can hardly deal with complex and diverse network attacks. In the current paper, a network security system that is ... 详细信息
来源: 评论
Quantum Long Sort-Term Memory-based Identification of distributed Denial of Service Attacks
Quantum Long Sort-Term Memory-based Identification of Distri...
收藏 引用
AI in Cybersecurity (ICAIC), international conference on
作者: Sarvapriya Tripathi Himanshu Upadhyay Jayesh Soni Electrical and Computer Engineering Florida International University Miami USA
distributed Denial of Service (DDoS) is defined as an attack targeting a server, where the server is overwhelmed by an overflow of traffic, leading to a computer system being compromised. To prevent these attacks from... 详细信息
来源: 评论
5th international conference on Computing Science, Communication and security, COMS2 2024
5th International Conference on Computing Science, Communica...
收藏 引用
5th international conference on Computing Science, Communication and security, COMS2 2024
The proceedings contain 31 papers. The special focus in this conference is on Computing Science, Communication and security. The topics include: Osmotic Computing-Based Task Offloading: A Fuzzy Logic-Based Approach;Tr...
来源: 评论
Investigating a Comprehensive IoT security Solution Based on Blockchain  6th
Investigating a Comprehensive IoT Security Solution Based on...
收藏 引用
6th international conference on Advanced Informatics for Computing Research, ICAICR 2023
作者: Madhan, Ravinder Singh Singh, Randeep IEC University Himachal Pradesh Baddi174103 India
The term "Internet of Things" (IoT) refers to a network of interconnected objects capable of gathering data from their immediate surroundings and facilitating communication with one another over the Internet... 详细信息
来源: 评论