咨询与建议

限定检索结果

文献类型

  • 4,997 篇 会议
  • 280 册 图书
  • 88 篇 期刊文献

馆藏范围

  • 5,365 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,884 篇 工学
    • 2,574 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 970 篇 信息与通信工程
    • 370 篇 电气工程
    • 307 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 616 篇 理学
    • 370 篇 数学
    • 118 篇 生物学
    • 105 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 189 篇 computer crime
  • 171 篇 servers
  • 165 篇 computer securit...
  • 158 篇 information secu...
  • 156 篇 network security
  • 151 篇 internet of thin...
  • 151 篇 distributed comp...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,191 篇 英文
  • 143 篇 其他
  • 40 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5365 条 记 录,以下是791-800 订阅
排序:
On Developing Secure distributed Sensor networks
On Developing Secure Distributed Sensor Networks
收藏 引用
2021 international conference on Electrotechnical Complexes and systems, ICOECS 2021
作者: Makhmutov, Amir Vulfin, Alexey Mironov, Konstantin Ufa State Aviation Technical University Department of Computer Technology and Information Security Ufa Russia Moscow Institute of Physics and Technology Center of Cognitive Modelling Moscow Russia
This paper is devoted to the problem of using traditional cryptographic algorithms on low-resource ATmega328P microcontrollers. The performance of microcontrollers was assessed during working with cryptographic algori... 详细信息
来源: 评论
GA-Net: Gated Attention Mechanism Based Global Refinement Network for Image Inpainting
GA-Net: Gated Attention Mechanism Based Global Refinement Ne...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Ran Qiu Shengrong Zhao Hu Liang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Underwater images are often affected by problems such as light attenuation, color distortion, noise and scattering, resulting in image defects. A novel image inpainting method is proposed to intelligently predict and ...
来源: 评论
Cybersecurity elements in remote payment systems: research models
Cybersecurity elements in remote payment systems: research m...
收藏 引用
2022 IEEE international conference on Electrical, computer, and Energy Technologies, ICECET 2022
作者: Elena, Smirnova Sergey, Skryl Artyom, Sychev Mikhail, Sychev Bauman Moscow State Technical University Computer systems and networks dept Moscow Russia Bauman Moscow State Technical University Information security dept Moscow Russia
The article is devoted to the consideration of important elements of cybersecurity of payment systems for remote banking services. The existing technologies of customer service in the service of payment systems are an... 详细信息
来源: 评论
Towards a Resilient Multi-Agent Controller: Securing and Mitigating Overhead in Tactical SDN
Towards a Resilient Multi-Agent Controller: Securing and Mit...
收藏 引用
international conference on Software Defined systems (SDS)
作者: Paulo H. L. Rettore Philipp Zißner Marcio Lawisch Sean Kloth Edison Pignaton de Freitas Peter Sevenich Communication Systems (KOM) Fraunhofer FKIE Bonn Germany Federal University of Rio Grande do Sul Porto Alegre Brazil Institute of Computer Science 4 University of Bonn Bonn Germany
This study proposes a resilient multi-agent controller for Software-defined Tactical networks (SDTNs) to ensure both secure and available control plane communication. The methodology consists of a Cyber Defense Agent ... 详细信息
来源: 评论
A Multi-Agent System Based on Dynamic Load Balancing for Collaborative Intrusion Detection
A Multi-Agent System Based on Dynamic Load Balancing for Col...
收藏 引用
international conference on Networking and Advanced systems (ICNAS)
作者: Nadia Hocine Chihabeddine Zitouni Department of computer sciences CSTL laboratory University of Mostagnem Mostaganem Algeria Faculty of Computing and Telecommunications Poznan University of Technology Poznan Poland
Intrusion detection systems contribute to the improvement of the security of systems as well as the confidentiality and integrity of data. These systems are based on traffic analysis, which makes their performance and...
来源: 评论
Counter Denial of Service for Next-Generation networks within the Artificial Intelligence and Post-Quantum Era
Counter Denial of Service for Next-Generation Networks withi...
收藏 引用
IEEE international conference on Trust, Privacy and security in Intelligent systems and Applications (TPS-ISA)
作者: Saleh Darzi Attila A. Yavuz Computer Science & Engineering University of South Florida Tampa FL USA
Given the rise in cyber threats to networked systems, coupled with the proliferation of AI techniques and enhanced processing capabilities, Denial of Service (DoS) attacks are becoming increasingly sophisticated and e... 详细信息
来源: 评论
Harnessing Machine Learning for Enhanced distributed Computing in Wireless Network systems
Harnessing Machine Learning for Enhanced Distributed Computi...
收藏 引用
Communication, computer Sciences and Engineering (IC3SE), international conference on
作者: K Rashmi R J Anandhi Navdeep Singh V Surya Pavan Kumar Krashnkant Gupta Ali Albawi Department of Computer Science and Engineering Institute of Aeronautical Engineering Hyderabad Telangana India Department of Information Science Engineering New Horizon College of Engineering Bangalore India Lovely Professional University Phagwara India Department of CSE-AI&ML MLR Institute of Technology Hyderabad Telangana India Department of Electronics & Communication Engineering Amity University Greater Noida India Radiology Techniques Department College of Medical Technology The Islamic University Najaf Iraq
A complete wireless network system for flexible resource sharing, spectrum management, security, and cross-layer optimization is described in this paper. Five algorithms comprise the system. These are ADS, QoS-ML, CLO... 详细信息
来源: 评论
FedSec-CPS: Federated Learning Based security Framework for security of Cyber-Physical systems  6
FedSec-CPS: Federated Learning Based Security Framework for ...
收藏 引用
6th international conference on Futuristic Trends in networks and Computing Technologies, FTNCT 2024
作者: War, Muhammed Rafeeq Singh, Yashwant Sheikh, Zakir Ahmad Department of Computer Science and Information Technology Central University of Jammu J and K Rahya Suchani Bagla181143 India
The proliferation of cyber-physical systems (CPS) has posed significant challenges in ensuring their security due to their distributed nature and resource constraints. Machine learning (ML) techniques have been utiliz... 详细信息
来源: 评论
Performance Analysis of Ensemble Learning for Botnet Detection in IoT
Performance Analysis of Ensemble Learning for Botnet Detecti...
收藏 引用
IEEE international conference on Communication, networks and Satellite (ComNetSat)
作者: Fatur Rahman Satria Mandala School of Computing Telkom University Bandung Indonesia Humic Engineering & School of Computing Telkom University Bandung Indonesia
The phenomenal rise of the Internet of Things (IoT) has connected a wide range of devices, from industrial systems to household appliances, revolutionizing daily life, yet this unprecedented growth has introduced sign... 详细信息
来源: 评论
Internet-of-Things Data security: Challenges, Countermeasures and Opportunities  23
Internet-of-Things Data Security: Challenges, Countermeasure...
收藏 引用
Proceedings of the 7th international conference on Future networks and distributed systems
作者: Farag Azzedin Ibraheem Al-Hejri Information and Computer Science Department King Fahd University of Petroleum and Minerals Saudi Arabia
Internet of Things (IoT) has introduced a revolutionary paradigm that unleashes multitude of functionalities and possibilities. Currently, IoT and its extensive range of applications have become the focal point of num... 详细信息
来源: 评论