咨询与建议

限定检索结果

文献类型

  • 5,039 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,406 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,904 篇 工学
    • 2,594 篇 计算机科学与技术...
    • 1,728 篇 软件工程
    • 989 篇 信息与通信工程
    • 376 篇 电气工程
    • 327 篇 控制科学与工程
    • 200 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 129 篇 动力工程及工程热...
    • 127 篇 电子科学与技术(可...
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 73 篇 仪器科学与技术
    • 70 篇 建筑学
    • 59 篇 交通运输工程
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
  • 620 篇 理学
    • 371 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 101 篇 统计学(可授理学、...
    • 85 篇 物理学
  • 506 篇 管理学
    • 355 篇 管理科学与工程(可...
    • 201 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 243 篇 法学
    • 166 篇 法学
    • 83 篇 社会学
  • 79 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 52 篇 公共卫生与预防医...
  • 63 篇 经济学
    • 63 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 510 篇 security
  • 357 篇 wireless sensor ...
  • 308 篇 computer network...
  • 254 篇 protocols
  • 249 篇 computer archite...
  • 222 篇 intrusion detect...
  • 214 篇 authentication
  • 210 篇 computer communi...
  • 201 篇 ip networks
  • 196 篇 computer crime
  • 172 篇 servers
  • 166 篇 computer securit...
  • 163 篇 network security
  • 158 篇 information secu...
  • 157 篇 internet of thin...
  • 149 篇 distributed comp...
  • 147 篇 computer science
  • 146 篇 computational mo...
  • 145 篇 cryptography
  • 142 篇 data security

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 graphic era deem...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 natrayan l.
  • 6 篇 yunhao liu

语言

  • 4,953 篇 英文
  • 422 篇 其他
  • 45 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5406 条 记 录,以下是871-880 订阅
排序:
Hyperledger Fabric Blockchain Using CCTV Surveillance Cameras for Pipelines of Oil and Gas Fields
Hyperledger Fabric Blockchain Using CCTV Surveillance Camera...
收藏 引用
international conference on Wireless networks and Mobile Communications (WINCOM)
作者: Noor Ali Alshuraify Ali A. Yassin Zaid Ameen Abduljabbar Department of Computer Science Education College for Pure Sciences University of Basrah Basrah Iraq
The oil and gas industry represents the beating heart of life in the world. These industries suffer from risks of unsustainability, whether they exist in infrastructure such as pipeline oil and gas leaks, vandalism, o... 详细信息
来源: 评论
Hyperledger Fabric Platform for Secure and Efficient Data Sharing in Autonomous Vehicles
Hyperledger Fabric Platform for Secure and Efficient Data Sh...
收藏 引用
international conference on Wireless networks and Mobile Communications (WINCOM)
作者: Reem Alhabib Poonam Yadav Department of Computer Science University of York York UK
Advancements in wireless communication, en-compassing cellular and non-terrestrial networks, are empow-ering Autonomous Vehicles (AVs) to revolutionize transportation. The achievement of real-time data exchange and se... 详细信息
来源: 评论
SUPPLYDECK - A Blockchain-Based Pharmaceutical Supply Chain Management  4
SUPPLYDECK - A Blockchain-Based Pharmaceutical Supply Chain ...
收藏 引用
4th international conference on Advancements in Computing, ICAC 2022
作者: Amarasinghe, A.A.B.G. Gamagedara, G.M.H.S. Pitigala, K.K. Subawickrama, H.D.A.E. Abeywardena, Kavinga Yapa Yapa, Kanishka Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Information Technology Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Information Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
With the rising competition among pharmaceutical companies, the current drug supply chain market has become more competitive with high-quality product segments. The rapid growth of internet pharmacies has made it more... 详细信息
来源: 评论
Blockchain Enabled Secure and Efficient DDoS Attack Detection Mechanisms in Connected Internet of Vehicles Using Federated Learning
Blockchain Enabled Secure and Efficient DDoS Attack Detectio...
收藏 引用
Frontiers of Information Technology (FIT)
作者: Muhammad Dilshad Adeel Anjum Madiha Haider Syed Institute of Information Technology Quaid-i-Azam University Islamabad Pakistan
distributed Denial of Service (DDoS) attacks pose a growing threat to the security and stability of Internet-of- Vehicles (IoV) networks. Traditional detection methods, which often rely on centralized systems, are vul... 详细信息
来源: 评论
An Efficient Solution for the Collusion Problem of DECO
An Efficient Solution for the Collusion Problem of DECO
收藏 引用
Information security and Cryptology (ISCTURKEY), international conference on
作者: Uğur Şen Murat Osmanoğlu Ali Aydin Selçuk Institute of Applied Mathematics Middle East Technical University Ankara Turkey Department of Computer Engineering Ankara University Ankara Turkey Department of Computer Engineering TOBB University of Economics and Technology Ankara Turkey
DECO is one of the state-of-the-art TLS evidence protocols that enables privacy-preserving verification without necessitating server-side modifications. It allows applications to extract verifiable data from websites.... 详细信息
来源: 评论
Improvement and Application of Blockchain Consensus Algorithm for distributed Power Energy System
Improvement and Application of Blockchain Consensus Algorith...
收藏 引用
IEEE international conference on Big Data Analysis (ICBDA)
作者: Junlong Liang Xiangzhi Liu Xiaoming Wu Ran Chen Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology ( Shandong Academy of Sciences) Jinan China
This article focuses on the application of blockchain consensus algorithms in the power energy trading system and the comparison of these algorithms such as PBFT(Practical Byzantine Fault Tolerance), Raft and IBFT(Ist... 详细信息
来源: 评论
Reinforcement Learning for Dynamic Traffic Routing and Optimization
Reinforcement Learning for Dynamic Traffic Routing and Optim...
收藏 引用
international conference on Inventive Computation Technologies (ICICT)
作者: Sahar Ebadinezhad Ahmed Conteh Khaldoon Arshed Ali Ibrahim Khalaf Hussein Department of Computer Information Systems Computer Information Systems Research and Technology Center (CISRTC) Near East University Nicosia Cyprus Department of Computer Information Systems Near East University Nicosia Cyprus
This paper addresses the rapidly evolving and expanding needs of network traffic with new methods, most notably Reinforcement Learning (RL). The RL has shown significant potential in addressing the challenges of dynam... 详细信息
来源: 评论
Machine Learning and Deep Learning for Enhanced DDoS Detection in IoT-Based Intrusion Detection System
Machine Learning and Deep Learning for Enhanced DDoS Detecti...
收藏 引用
Innovative and Intelligent Information Technologies (IC3IT), international conference on
作者: Kamir Kharoubi Sarra Cherbal Maroua Akkal LRSD Lab Faculty of Sciences Ferhat Abbas University Setif 1 Setif Algeria
Securing Internet of Things (IoT) networks is critical due to their increasing prevalence and susceptibility to cyberattacks. Machine Learning (ML) and Deep Learning (DL)powered Intrusion Detection systems (IDS) provi... 详细信息
来源: 评论
Enhance security for the E-payment Application with Blockchain Technology
Enhance Security for the E-payment Application with Blockcha...
收藏 引用
international conference on Integrated Circuits, Design, and Verification (ICDV)
作者: Hung Le-Huy Thuat Nguyen-Khanh Quan Le-Trung Faculty of Computer Networks and Communications University of Information Technology Ho Chi Minh City Viet Nam Vietnam National University Ho Chi Minh City Vietnam
E-payment systems, despite their practicality, face challenges such as data manipulation, limited bandwidth, and potential denial-of-service attacks. These issues can impact businesses, financial institutions, and ind... 详细信息
来源: 评论
Taxonomy and Future Threat of Rogue Access Point for Wireless Network  9
Taxonomy and Future Threat of Rogue Access Point for Wireles...
收藏 引用
9th international conference on Computing for Sustainable Global Development, INDIACom 2022
作者: Patel, Kashyap C. Patel, Ajaykumar Ganpat University Department of Computer Science Gujarat India A. M. Patel Institute of Computer Studies Ganpat University Gujarat India
Wireless network communication is an enormous and vast area of research. Many companies and organizations, related to wireless security have struggled due to the narrow, limited, and restricted access to the legitimat... 详细信息
来源: 评论