咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 84 篇 期刊文献

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,879 篇 工学
    • 2,570 篇 计算机科学与技术...
    • 1,720 篇 软件工程
    • 968 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 355 篇 wireless sensor ...
  • 308 篇 computer network...
  • 254 篇 protocols
  • 249 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 201 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 166 篇 computer securit...
  • 160 篇 network security
  • 158 篇 information secu...
  • 155 篇 internet of thin...
  • 150 篇 distributed comp...
  • 147 篇 computer science
  • 146 篇 cryptography
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,022 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5374 条 记 录,以下是881-890 订阅
排序:
Real-Time Adaptive Intrusion Detection System [RTPIDS] for Internet of Things Using Federated Learning and Blockchain
Real-Time Adaptive Intrusion Detection System [RTPIDS] for I...
收藏 引用
Data Intelligence and Cognitive Informatics (ICDICI), international conference on
作者: Sunil Raj Y E. Helen Parimala V. S Jayakumar Paul Bosco Adarsh Samuel Raj J P. J. Rosario Vasantha Kumar Vinothkumar Kolluru Department of Data Science St. Xavier’s College (Autonomous) India Department of Computer Science Gitam Deemed to be University Bangalore India Department of BCA Sacred Heart College (Autonomous) Tirupattur India San Jose State University San Jose California USA Librarian St. Xavier’s College (Autonomous) India Department of Data Science Stevens Institute of Technology NJ USA
In the growing field of the Internet of Things (IoT), ensuring security and privacy has become a critical concern, particularly in sensitive domains such as healthcare. This paper presents a Real-Time Adaptive Intrusi... 详细信息
来源: 评论
Securing Smart City networks - Intelligent Detection of DDoS Cyber Attacks  5
Securing Smart City Networks - Intelligent Detection of DDoS...
收藏 引用
5th international conference on Contemporary Computing and Informatics, IC3I 2022
作者: Bennet, Deepthi Tabitha Bennet, Preethi Samantha Anitha, D. Thiagarajar College of Engineering Department of Applied Mathematics and Computational Science Madurai India
A distributed denial-of-service (DDoS) is a malicious attempt by attackers to disrupt the normal traffic of a targeted server, service or network. This is done by overwhelming the target and its surrounding infrastruc... 详细信息
来源: 评论
LGDB-Net: Dual-Branch Path for Building Extraction from Remote Sensing Image
LGDB-Net: Dual-Branch Path for Building Extraction from Remo...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Ronghuan Zhang Jing Zhao Ming Li Qingzhi Zou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Intelligence and Information Engineering Shandong University of Traditional Chinese Medicine Jinan China
Extracting buildings from remote sensing images using deep learning techniques is a widely applied and crucial task. Convolutional Neural networks (CNNs) adopt hierarchical feature representation, showcasing powerful ... 详细信息
来源: 评论
Enhanced DDoS Defense in SDN: Double-Layered Strategy with Blockchain Integration
Enhanced DDoS Defense in SDN: Double-Layered Strategy with B...
收藏 引用
international conference on Communications, Circuits and systems (ICCCAS)
作者: Jialin Tian Zhaogang Shu Shuwu Chen Haihui Xie Xiaolong Liu Caiyu Qiu The Computer and Information College Fujian Agriculture And Forestry University Fuzhou China
With the development of technologies such as cloud computing, big data, and the Internet of Things (IoT), Software-Defined Networking (SDN) has emerged as a novel network architecture in today's Internet era. It c... 详细信息
来源: 评论
A Parallelizable Counterfactual Generation Method Based on Gradient Optimization
A Parallelizable Counterfactual Generation Method Based on G...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Haorun Ding Xuesong Jiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China State Key Laboratory of High-end Server & Storage Technology Jinan China
Post-hoc explanations are important for people to understand the predictions of explanation models. One class of methods in post-hoc explanation is the generation of counterfactuals, where a hypothetical example is ob...
来源: 评论
EdgeShield: Hybrid Real-Time Attack Detection in IOTA Tangle via Edge Devices
EdgeShield: Hybrid Real-Time Attack Detection in IOTA Tangle...
收藏 引用
international conference on Computing and Networking Technology (ICCNT)
作者: V Arunodhai Leena P Susan Jinesh M. Kannimoola Department of Computer Science and Applications Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India
The Internet of Things (IoT) revolutionizes technology interaction by enabling seamless connectivity and automation, but it introduces significant security challenges. A distributed ledger technology (DLT) called IOTA... 详细信息
来源: 评论
Depth Analysis on Recognition and Prevention of DDoS Attacks via Machine Learning and Deep Learning Strategies in SDN
Depth Analysis on Recognition and Prevention of DDoS Attacks...
收藏 引用
Self Sustainable Artificial Intelligence systems (ICSSAS), international conference on
作者: Pranay Yadav Nishchol Mishra Sanjeev Sharma School of Information Technology (SoIT) Rajiv Gandhi Proudyogiki Vishwavidyalaya Bhopal M.P INDIA
Recent years have witnessed the exponential growth of global digitization. Similarly, the rise in distributed Denial of Service (DDoS) attacks continues unabated. DDoS is a significant threat to network security in th... 详细信息
来源: 评论
Shared-Dining: Broadcasting Secret Shares Using Dining-Cryptographers Groups  21st
Shared-Dining: Broadcasting Secret Shares Using Dining-Crypt...
收藏 引用
21st IFIP WG 6.1 international conference on distributed Applications and Interoperable systems (DAIS) Held as Part of the 16th international Federated conference on distributed Computing Techniques (DisCoTec)
作者: Moedinger, David Dispan, Juri Hauck, Franz J. Ulm Univ Inst Distributed Syst D-89081 Ulm Germany
We introduce a combination of Shamir's secret sharing and dining-cryptographers networks, which provides (n - vertical bar attackers vertical bar)-anonymity for up to k - 1 attackers and has manageable performance... 详细信息
来源: 评论
OpenAuth: Human Body-Based User Authentication Using mmWave Signals in Open-World Scenarios
OpenAuth: Human Body-Based User Authentication Using mmWave ...
收藏 引用
international conference on distributed Computing systems
作者: Junlin Yang Jiadi Yu Linghe Kong Yanmin Zhu Hong-Ning Dai Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Department of Computer Science Hong Kong Baptist University Hong Kong China
User authentication is evolving with expanded application scenarios and innovative techniques. New authentication approaches utilize RF signals to sense specific human behaviors and characteristics, such as faces, spe... 详细信息
来源: 评论
Effective DDoS Attack Detection using Deep Generative Radial Neural Network in the Cloud Environment  7
Effective DDoS Attack Detection using Deep Generative Radial...
收藏 引用
7th international conference on Communication and Electronics systems, ICCES 2022
作者: Kiruthiga, G. Saraswathi, P. Rajkumar, S. Suresh, S. Dhiyanesh, B. Radha, R. Cse Ies College of Engineering Thrissur India It Velammal College of Engineering and Technology Chennai India It Sona College of Technology Salem India Cse P.A. College of Engineering and Technology Pollachi India Hindusthan College of Engineering and Technology Coimbatore India Karpagam Institute of Technology Coimbatore India
Recently, internet services have increased rapidly due to the Covid-19 epidemic. As a result, cloud computing applications, which serve end-users as subscriptions, are rising. Cloud computing provides various possibil... 详细信息
来源: 评论