咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 60 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,855 篇 工学
    • 2,546 篇 计算机科学与技术...
    • 1,705 篇 软件工程
    • 944 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 346 篇 wireless sensor ...
  • 304 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 205 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 165 篇 computer securit...
  • 161 篇 network security
  • 158 篇 information secu...
  • 154 篇 internet of thin...
  • 153 篇 distributed comp...
  • 148 篇 cryptography
  • 146 篇 computer science
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 19 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 jasni mohamad za...
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 natrayan l
  • 7 篇 lin zhang
  • 7 篇 wei wang
  • 7 篇 mukaddim pathan
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu

语言

  • 4,998 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是861-870 订阅
排序:
Trust-based Approach to Secure Low-Power and Lossy networks Routing Protocol  5
Trust-based Approach to Secure Low-Power and Lossy Networks ...
收藏 引用
5th IEEE international conference on Networking and Advanced systems, ICNAS 2021
作者: Abid, Meriem Bahloul, Sarah Nait Hamlili, Sara University of Mostaganem Dept. of Mathematics and Computer Science Algeria University of USTO-MB Dept. of Computer Science Oran Algeria
Resource-constrained things can now connect to the Internet through Wireless Personal Area networks (WPAN) and Low Power Wide Area networks (LPWAN). Since then, they are vulnerable to both attacks from inside the netw... 详细信息
来源: 评论
An Efficient DDoS Attacks Detection and Mitigation Approach in SDN-IoT Network  6
An Efficient DDoS Attacks Detection and Mitigation Approach ...
收藏 引用
6th international conference on Futuristic Trends in networks and Computing Technologies, FTNCT 2024
作者: Singh, Chandrapal Jain, Ankit Kumar Department of Computer Engineering National Institute of Technology Kurukshetra India
The Internet of Things (IoT) has revolutionized modern life by introducing advanced solutions and enhancing processing power. However, managing IoT networks can be challenging due to the multitude of devices and commu... 详细信息
来源: 评论
Performance Comparison of Machine Learning Classifiers for DDOS Detection and Mitigation on Software Defined networks
Performance Comparison of Machine Learning Classifiers for D...
收藏 引用
IEEE international conference on Automatic Control and Intelligent systems (I2CACIS)
作者: Babangida Isyaku Kamalrulnizam Bin Abu Bakar Muhammad Salisu Ali Muhammed Nura Yusuf Department of Computer Science Universiti Teknologi Malaysia Johor Malaysia Sule Lamido University K/Hausa P.M.B. 048 Kafin Hausa Jigawa State Nigeria Department of Cyber Security Federal University Dutse Ibrahim Aliyu By-Pass P.M.B. 7156 Dutse Jigawa State
Software Defined networks (SDN) is an emerging network with better network management through the separation of Control logic and data forwarding elements. Several emerging networks, including the Internet of Things, ...
来源: 评论
Perception Poisoning Attacks in Federated Learning  3
Perception Poisoning Attacks in Federated Learning
收藏 引用
3rd EEE international conference on Trust, Privacy and security in Intelligent systems and Applications (TPS-ISA)
作者: Chow, Ka-Ho Liu, Ling Georgia Inst Technol Sch Comp Sci Atlanta GA 30332 USA
Federated learning (FL) enables decentralized training of deep neural networks (DNNs) for object detection over a distributed population of clients. It allows edge clients to keep their data local and only share param... 详细信息
来源: 评论
Workshop held at the 12th international conference on Model and Data Engineering, MEDI 2023
Workshop held at the 12th International Conference on Model ...
收藏 引用
Workshop held at the 12th international conference on Model and Data Engineering, MEDI 2023
The proceedings contain 18 papers. The special focus in this conference is on Model and Data Engineering. The topics include: Towards an Open Domain Arabic Question Answering System: Assessment of the Bert Approach;Mu...
来源: 评论
LiteCrypt: Enhancing IoMT security with Optimized HE and Lightweight Dual-Authorization
LiteCrypt: Enhancing IoMT Security with Optimized HE and Lig...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Qipeng Xie Weizheng Wang Yongzhi Huang Mengyao Zheng Shuai Shang Linshan Jiang Salabat Khan Kaishun Wu IoT Thrust Hong Kong University of Science and Technology (Guang Zhou) Guang Zhou China Hong Kong University of Science and Technology Hong Kong China Computer Science Engineer City University of Hong Kong Hong Kong China DSA Thrust Information Hub Hong Kong University of Science and Technology (Guang Zhou) Guang Zhou China Harvard T.H. Chan School of Public Health Boston United States University of Electronic Science and Technology of China Chengdu Chengdu China Institute of Data Science National University of Singapore Singapore
The integration of 5G/6G networks with intelligent healthcare systems has enabled early disease detection through patient data monitoring. However, the Internet of Medical Things (IoMT) and remote healthcare services ... 详细信息
来源: 评论
A Regression Model to Secure Cloud Datacenter Against DDoS Attack
A Regression Model to Secure Cloud Datacenter Against DDoS A...
收藏 引用
international Symposium on High Capacity Optical networks and Enabling Technologies, HONET
作者: Hamad Al-Thani Jarah Al-Otaibi Saad Al-Homaidan Shafi'i M. Abdulhamid Nadin Rana Abdullah H. Al-Ghushami Department of Information Technology Community College of Qatar Lusail Qatar Department of Computer Science Jazan University Jazan Saudi Arabia
Cloud computing is a major area for conventional IT executions since it offers insignificant expense and admittance to “pay-as-you-go” registering capacities and concerning requests by clients. The cloud offers syst... 详细信息
来源: 评论
security and Performance Comparison using QR Code through Blockchain Technology  4
Security and Performance Comparison using QR Code through Bl...
收藏 引用
4th international conference on Cognitive Computing and Information Processing, CCIP 2022
作者: Dash, Sonali S Rajasekar, V. AMC Engineering College Computer Science and Engineering Bengaluru India
Advances and transitions in healthcare system is constantly changing and acquiring fresh forms. The requirement of modern smart health systems is to protect sensitive patient data from attacks by potential adversaries... 详细信息
来源: 评论
An Efficient Multi-Layer Indexing Method on Blockchain for Multimodal Data Querying
An Efficient Multi-Layer Indexing Method on Blockchain for M...
收藏 引用
IEEE international conference on systems, Man and Cybernetics
作者: Haoyu Jia Xiaoming Wu Shanshan Liu Qile Yuan Bei Qi Xiangzhi Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In the digital society era, the generation frequency of multimodal data is rapidly increasing. Blockchain, recognized as a trusted distributed database technology, provides a new solution for the trustworthy storage a... 详细信息
来源: 评论
Adversarial Attack and Defense for Transductive Support Vector Machine
Adversarial Attack and Defense for Transductive Support Vect...
收藏 引用
international Joint conference on Neural networks (IJCNN)
作者: Li Liu Haiyan Chen Changchun Yin Liming Fang College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) China
As a classic semi-supervised approach, the Transductive Support Vector Machine (TSVM) has exhibited remarkable accuracy by utilizing unlabeled data. However, the robustness of TSVM against adversarial attacks remains ... 详细信息
来源: 评论