咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 60 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,855 篇 工学
    • 2,546 篇 计算机科学与技术...
    • 1,705 篇 软件工程
    • 944 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 346 篇 wireless sensor ...
  • 304 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 205 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 165 篇 computer securit...
  • 161 篇 network security
  • 158 篇 information secu...
  • 154 篇 internet of thin...
  • 153 篇 distributed comp...
  • 148 篇 cryptography
  • 146 篇 computer science
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 19 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 jasni mohamad za...
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 natrayan l
  • 7 篇 lin zhang
  • 7 篇 wei wang
  • 7 篇 mukaddim pathan
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu

语言

  • 4,998 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是831-840 订阅
排序:
Simulation of distributed denial of service attack against ethereum smart contract on the blockchain
Simulation of distributed denial of service attack against e...
收藏 引用
international conference on computer Vision and Internet of Things 2023 (ICCVIoT'23)
作者: N. Jeyakkannan G. Subathra R. Karthika A. Lavanya N. Kirupanithi Rathinam Technical Campus Coimbatore India Sathyabama Institute of Science and Technology Chennai India
The perception and functional infrastructure of smart networks are changing as a result of the advent of blockchain technology and the proliferation of IoT-driven devices. Deploying Ethereum's smart contracts, the...
来源: 评论
Quantum Assisted Scheduling Algorithm for Federated Learning in distributed networks
Quantum Assisted Scheduling Algorithm for Federated Learning...
收藏 引用
international conference on computer Communications and networks (ICCCN)
作者: Xinliang Wei Lei Fan Yuanxiong Guo Yanmin Gong Zhu Han Yu Wang Department of Computer and Information Sciences Temple University Philadelphia PA USA Department of Engineering Technology University of Houston Houston TX USA Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio TX USA Department of Electrical and Computer Engineering University of Texas at San Antonio San Antonio TX USA Department of Electrical and Computer Engineering University of Houston Houston TX USA
The scheduling problem for federated learning (FL) with multiple models in a distributed network is challenging, as it involves NP-hard mixed-integer nonlinear programming. Moreover, it requires optimal participant se...
来源: 评论
AI-Powered Real-Time Obstacle Detection for UAVs using Blockchain
AI-Powered Real-Time Obstacle Detection for UAVs using Block...
收藏 引用
international conference on Parallel distributed and Grid Computing (PDGC)
作者: Aparna Kumari Patel Ansh Alkeshbhai Shah Akshat Nimesh Safaa Najah Saud Al-Humairi Prasun Kumar Sunil Kumar Prakriti Lohumi Department of Computer Science and Engineering Institute of Technology Nirma University Ahmedabad India Department of Computer Science and Engineering Faculty of Engineering Science and Technology Adani University Ahmedabad India Faculty of Information Sciences and Engineering Management and Science University Malaysia Department of Biotechnology SSET Sharda University Greater Noida U.P. India Department of AI and Data Science Guru Jambheshwar University of Science & Technology Hisar Haryana India Department of Artificial Intelligence and Data Science Bhagwan Parshuram Institute of Technology New Delhi Delhi India
AI integration with UAVs has brought significant advancements in aerial control and operational safety, particularly in real-time obstacle detection—an essential aspect for navigating unknown environments. This work ... 详细信息
来源: 评论
Hyperledger Fabric Platform for Secure and Efficient Data Sharing in Autonomous Vehicles
Hyperledger Fabric Platform for Secure and Efficient Data Sh...
收藏 引用
international conference on Wireless networks and Mobile Communications (WINCOM)
作者: Reem Alhabib Poonam Yadav Department of Computer Science University of York York UK
Advancements in wireless communication, en-compassing cellular and non-terrestrial networks, are empow-ering Autonomous Vehicles (AVs) to revolutionize transportation. The achievement of real-time data exchange and se... 详细信息
来源: 评论
Hyperledger Fabric Blockchain Using CCTV Surveillance Cameras for Pipelines of Oil and Gas Fields
Hyperledger Fabric Blockchain Using CCTV Surveillance Camera...
收藏 引用
international conference on Wireless networks and Mobile Communications (WINCOM)
作者: Noor Ali Alshuraify Ali A. Yassin Zaid Ameen Abduljabbar Department of Computer Science Education College for Pure Sciences University of Basrah Basrah Iraq
The oil and gas industry represents the beating heart of life in the world. These industries suffer from risks of unsustainability, whether they exist in infrastructure such as pipeline oil and gas leaks, vandalism, o... 详细信息
来源: 评论
Blockchain Enabled Secure and Efficient DDoS Attack Detection Mechanisms in Connected Internet of Vehicles Using Federated Learning
Blockchain Enabled Secure and Efficient DDoS Attack Detectio...
收藏 引用
Frontiers of Information Technology (FIT)
作者: Muhammad Dilshad Adeel Anjum Madiha Haider Syed Institute of Information Technology Quaid-i-Azam University Islamabad Pakistan
distributed Denial of Service (DDoS) attacks pose a growing threat to the security and stability of Internet-of- Vehicles (IoV) networks. Traditional detection methods, which often rely on centralized systems, are vul... 详细信息
来源: 评论
SUPPLYDECK - A Blockchain-Based Pharmaceutical Supply Chain Management  4
SUPPLYDECK - A Blockchain-Based Pharmaceutical Supply Chain ...
收藏 引用
4th international conference on Advancements in Computing, ICAC 2022
作者: Amarasinghe, A.A.B.G. Gamagedara, G.M.H.S. Pitigala, K.K. Subawickrama, H.D.A.E. Abeywardena, Kavinga Yapa Yapa, Kanishka Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Information Technology Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Information Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
With the rising competition among pharmaceutical companies, the current drug supply chain market has become more competitive with high-quality product segments. The rapid growth of internet pharmacies has made it more... 详细信息
来源: 评论
Improvement and Application of Blockchain Consensus Algorithm for distributed Power Energy System
Improvement and Application of Blockchain Consensus Algorith...
收藏 引用
IEEE international conference on Big Data Analysis (ICBDA)
作者: Junlong Liang Xiangzhi Liu Xiaoming Wu Ran Chen Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology ( Shandong Academy of Sciences) Jinan China
This article focuses on the application of blockchain consensus algorithms in the power energy trading system and the comparison of these algorithms such as PBFT(Practical Byzantine Fault Tolerance), Raft and IBFT(Ist... 详细信息
来源: 评论
An Efficient Solution for the Collusion Problem of DECO
An Efficient Solution for the Collusion Problem of DECO
收藏 引用
Information security and Cryptology (ISCTURKEY), international conference on
作者: Uğur Şen Murat Osmanoğlu Ali Aydin Selçuk Institute of Applied Mathematics Middle East Technical University Ankara Turkey Department of Computer Engineering Ankara University Ankara Turkey Department of Computer Engineering TOBB University of Economics and Technology Ankara Turkey
DECO is one of the state-of-the-art TLS evidence protocols that enables privacy-preserving verification without necessitating server-side modifications. It allows applications to extract verifiable data from websites.... 详细信息
来源: 评论
Reinforcement Learning for Dynamic Traffic Routing and Optimization
Reinforcement Learning for Dynamic Traffic Routing and Optim...
收藏 引用
international conference on Inventive Computation Technologies (ICICT)
作者: Sahar Ebadinezhad Ahmed Conteh Khaldoon Arshed Ali Ibrahim Khalaf Hussein Department of Computer Information Systems Computer Information Systems Research and Technology Center (CISRTC) Near East University Nicosia Cyprus Department of Computer Information Systems Near East University Nicosia Cyprus
This paper addresses the rapidly evolving and expanding needs of network traffic with new methods, most notably Reinforcement Learning (RL). The RL has shown significant potential in addressing the challenges of dynam... 详细信息
来源: 评论