咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 84 篇 期刊文献

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,879 篇 工学
    • 2,570 篇 计算机科学与技术...
    • 1,720 篇 软件工程
    • 968 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 355 篇 wireless sensor ...
  • 308 篇 computer network...
  • 254 篇 protocols
  • 249 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 201 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 166 篇 computer securit...
  • 160 篇 network security
  • 158 篇 information secu...
  • 155 篇 internet of thin...
  • 150 篇 distributed comp...
  • 147 篇 computer science
  • 146 篇 cryptography
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,022 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5374 条 记 录,以下是851-860 订阅
排序:
Seagull-optimized Deep Convolutional Neural Network for Detecting distributed Denial of Service Attack in Cloud Computing
Seagull-optimized Deep Convolutional Neural Network for Dete...
收藏 引用
Self Sustainable Artificial Intelligence systems (ICSSAS), international conference on
作者: Yogesh B. Sanap Pushpalata G. Aher Computer Science and Engineering Sandip University Nashik Sandip University Nashik Maharashtra
Due to the enormous benefits and applications of cloud computing, there is a lot of interest from researchers on cloud computing. The most significant security risk associated with cloud computing is insider distribut... 详细信息
来源: 评论
GAF-GAN: Gated Attention Feature Fusion Image Inpainting Network Based on Generative Adversarial Network
GAF-GAN: Gated Attention Feature Fusion Image Inpainting Net...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Ran Qiu Hu Liang Yuchen Liu Shengrong Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Image inpainting, which aims to reconstruct reasonably clear and realistic images from known pixel information, is one of the core problems in computer vision. However, due to the complexity and variability of the und...
来源: 评论
E-Voting System Using Blockchain Technology  4
E-Voting System Using Blockchain Technology
收藏 引用
4th international conference on Advances in Computing, Communication Control and Networking, ICAC3N 2022
作者: Nagesh, H.R. Guru Prasad, M.S. Shivaraj, B.G. Jain, Dhawal Puneeth, B.R. Anadkumar, M. Sahyadri College of Engg. & Management Dept. of Computer Science & Engg. Mangaluru India Dept. of Computer Science & Engg. Dehradun India Mangalore Institute of Technology & Engg. Dept. of Computer Science & Engg. Moodabidri India Sdm Institute of Technology Dept. of Computer Science & Engg. Ujire India Department of Mca Nitte Karnataka India Dept. of Computer Applications Dehradun India
In every nation, democratic elections are a momentous and weighty occurrence, and the voting system that is now in place requires the use of ballots or electronic voting machines (EVM). Transparency, poor turnout, vot... 详细信息
来源: 评论
Role of Neural Network, Fuzzy, and IoT in Integrating Artificial Intelligence as a Cyber security System
Role of Neural Network, Fuzzy, and IoT in Integrating Artifi...
收藏 引用
Electronics and Renewable systems (ICEARS), international conference on
作者: Papri Das Manikumari Illa Rajesh Pokhariyal Akhilesh Latoria Hemlata DilipKumar Jang Bahadur Saini School of Information Technology AURO University Surat Gujarat Artificial Intelligence & Data Science (AI&DS) Vignan's Institute Of Information Technology Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India Department of Computer Science and Engineering Central University of Haryana Mahendergarh Haryana Department of Computer Science & Engineering Sawmi Rama Himalayan University Dehradun India
The "Internet of Things" has a vast number interconnected devices. These interconnected devices collect vital data that may have a significant effect on the company, society, and the environment as a whole. ... 详细信息
来源: 评论
Blockchain Based security Enabled Smart Contract for Energy Management
Blockchain Based Security Enabled Smart Contract for Energy ...
收藏 引用
security of Information and networks (SIN), international conference on
作者: Aditi Sharma Mukta Patel Arjun Choudhary Gajender Kumar Department of Computer Science and Engineering Symbiosis Institute of Engineering and Technology Symbiosis International (Deemed University) Pune Maharashtra India Department of Computer Science and Engineering Parul Institute of Technology Parul University Vadodara Gujarat India Center for Cyber Security Security and Criminal Justice Sardar Patel University of Police Jodhpur India Department of Computer Science and Engineering SRM Institute of Science and Technology (SRMIST) SRM University Delhi-NCR Campus India
Energy consumption is highly demanded area for major security concerns due to the high eye from attackers. In 2020, the “Recorded future” released report for massive power outage in India[1]. With the increasing ado...
来源: 评论
From Attacks to Insights: XAI and Defense in Network security
From Attacks to Insights: XAI and Defense in Network Securit...
收藏 引用
Sustainable Communication networks and Application (ICSCNA), international conference on
作者: Bharathi Ganesh Kumar E. Shanthini Department of Computer Science and Engineering PSG College of Technology Tamil Nadu India Department of Electronics and Communication Engineering Sri Ramakrishna Engineering College Coimbatore Tamil Nadu India
Network intrusion poses significant threats to cyber security, as malicious attacks can disrupt systems and compromise sensitive information. Real-world scenarios include unauthorized access to corporate networks, dat... 详细信息
来源: 评论
Deep Neural Network Model for Improved DDoS Attack Detection in Cloud Environments
Deep Neural Network Model for Improved DDoS Attack Detection...
收藏 引用
Emerging Technology (INCET), international conference for
作者: Rashmi Verma Manisha Jailia Munish Kumar Bhawna Kaliraman Department of Computer Science and Engineering Banasthali Vidyapith Tonk Rajasthan Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram India Department of Computer Science and Engineering DPG Institute of Technology and Management Gurugram India
As the prevalence of distributed Denial of Service (DDoS) attacks continues to escalate, safeguarding cloud environments against these threats becomes paramount. This paper introduces a Deep Neural Network (DNN) model... 详细信息
来源: 评论
Trust-based Approach to Secure Low-Power and Lossy networks Routing Protocol  5
Trust-based Approach to Secure Low-Power and Lossy Networks ...
收藏 引用
5th IEEE international conference on Networking and Advanced systems, ICNAS 2021
作者: Abid, Meriem Bahloul, Sarah Nait Hamlili, Sara University of Mostaganem Dept. of Mathematics and Computer Science Algeria University of USTO-MB Dept. of Computer Science Oran Algeria
Resource-constrained things can now connect to the Internet through Wireless Personal Area networks (WPAN) and Low Power Wide Area networks (LPWAN). Since then, they are vulnerable to both attacks from inside the netw... 详细信息
来源: 评论
DDoS Detection in SDN using Deep Learning
DDoS Detection in SDN using Deep Learning
收藏 引用
international conference on Internet of Things and Applications (IoT)
作者: Zahra Fatehi Ahmadreza Montazerolghaem Faculty of Computer Engineering University of Isfahan Isfahan Iran
In this paper, we present a deep learning approach for the detection of distributed Denial of Service (DDoS) attacks within Software-Defined Networking (SDN) environments. The escalating threat of DDoS attacks poses s... 详细信息
来源: 评论
Cross-chain Transaction Validation using Lock-and-Key Method for Multi-System Blockchain
Cross-chain Transaction Validation using Lock-and-Key Method...
收藏 引用
IEEE international conference on Communications Workshops, ICC
作者: Gaurav Kumar Samarthi Lahiri Amit Dua Gagangeet Singh Aujla Computer Science and Information Systems BITS Pilani Pilani India Department of Computer Science Durham University UK
Blockchains have profoundly impacted finance and administration, but there are several issues with the current blockchain platforms, including a lack of system interoperability. Currently used blockchain application p...
来源: 评论