咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,231 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5348 条 记 录,以下是81-90 订阅
排序:
Method for Filtering DDoS Attack Traffic through Routing Path within SDN Domain
Method for Filtering DDoS Attack Traffic through Routing Pat...
收藏 引用
IEEE international conference on Big Data security on Cloud (BigDatasecurity), High Performance and Smart Computing (HPSC) and Intelligent Data and security (IDS)
作者: Meng Yue Mingzhi Yang Hanwen Xu Zhijun Wu College of Safety Science and Engineering Civil Aviation University of China Tianjin China
Attacks that aim to disrupt services, known as distributed Denial of Service (DDoS), exploit protocol vulnerabilities and utilize legitimate traffic to target systems, thereby threatening the normal operation of the n... 详细信息
来源: 评论
MultiMal: Multimodal Fusion Combining Graph and Entropy Features for Malware Detection
MultiMal: Multimodal Fusion Combining Graph and Entropy Feat...
收藏 引用
IEEE international conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Kaiyan He Haining Lu Dawu Gu Shanghai Jiao Tong University Shanghai China
As software becomes widespread, malware poses a significant threat to information system security. Graph neural networks (GNNs) used in existing machine learning-based methods for malware detection ignore deeper seman... 详细信息
来源: 评论
Privacy-Preserving Publishing Mechanism for Real-Time Vehicle Trajectory in Vehicle-to-Grid networks
Privacy-Preserving Publishing Mechanism for Real-Time Vehicl...
收藏 引用
Power Electronics, computer Applications (ICPECA), IEEE international conference on
作者: Yulong Wang Jianbo Xu Bo Gong School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China
The Vehicle-to-Grid (V2G) network is a smart grid technology generated under the background of the rapid development of new energy technology, which allows mobile energy storage vehicles (MESVs) to realize bidirection... 详细信息
来源: 评论
Octopus: Experiences with a Hybrid Event-Driven Architecture for distributed Scientific Computing  24
Octopus: Experiences with a Hybrid Event-Driven Architecture...
收藏 引用
Proceedings of the SC '24 Workshops of the international conference on High Performance Computing, Network, Storage, and Analysis
作者: Haochen Pan Ryan Chard Sicheng Zhou Alok Kamatar Rafael Vescovi Valérie Hayot-Sasson André Bauer Maxime Gonthier Kyle Chard Ian Foster Department of Computer Science University of Chicago Chicago IL USA Data Science and Learning Division Argonne National Laboratory Lemont IL USA Department of Computer Science Southern University of Science and Technology Guangdong China Department of Computer Science Illinois Institute of Technology Chicago IL USA Department of Computer Science University of Chicago Chicago IL USA and Data Science and Learning Division Argonne National Laboratory Lemont IL USA
Scientific research increasingly relies on distributed computational resources, storage systems, networks, and instruments, ranging from HPC and cloud systems to edge devices. Event-driven architecture (EDA) benefits ... 详细信息
来源: 评论
Advanced Machine Learning Approach for Cyber Attack Detection in Cloud Computing
Advanced Machine Learning Approach for Cyber Attack Detectio...
收藏 引用
Intelligent Control, Computing and Communications (IC3), international conference on
作者: Shashi Bhushan Singh Yadav Nitin Arvind Shelke Jagendra Singh Yasmeen Deependra Pandey Himanshi Department Computer Science & Engineering BBD Northern India Institute of Technology Lucknow India School of Computer Science Engineering & Technology Bennett University Greater Noida India Department of CSE-DS CVR College of Engineering Hyderabad India Department of ECE Amity School of Engineering and Technology Amity University Lucknow India Department of Information Technology Raj Kumar Goel Institute of Technology Ghaziabad India
Cloud computing has become the most important part of modern IT infrastructure, which is scalable and flexible. However, with such wide-scale adoption, new vulnerabilities have been introduced into the system, making ... 详细信息
来源: 评论
Hashgraph-Based Model Parameter Management for Reliable and Secure Deep Learning
Hashgraph-Based Model Parameter Management for Reliable and ...
收藏 引用
IEEE international conference on Consumer Electronics (ICCE)
作者: Eunsung Roh Jinheock Choi Younghoon Park Seung-Woo Seo Big Data Research Center for New Value Creation Sookmyung Women's University Seoul South Korea Department of Electric Engineering Seoul National University Seoul South Korea Division of Computer Science Sookmyung Women's University Seoul South Korea
Deep learning networks have rapidly developed across various fields, with several high-performing models already being applied in real-world applications. However, even with identical network architectures, variations... 详细信息
来源: 评论
SHAKTI: Securing Hardware IPs by Cascade Gated Multiplexer-Based Logic Obfuscation
SHAKTI: Securing Hardware IPs by Cascade Gated Multiplexer-B...
收藏 引用
international conference on VLSI Design
作者: Jugal Gandhi Nikhil Handa Abhay Nayak Diksha Shekhawat M. Santosh Jaya Dofe Jai Gopal Pandey CSIR- Central Electronics Engineering Research Institute (CEERI) Pilani India Academy of Scientific and Innovative Research (AcSIR) Ghaziabad India Birla Institute of Technology and Science (BITS) Pilani India Department of Electrical and Computer Engineering California State University Fullerton CA USA
The modern distributed chip design chain is increasingly vulnerable to piracy and overproduction. Logic locking has emerged as a prominent solution, allowing chip designers to enhance the security of their hardware in... 详细信息
来源: 评论
Recent Trends in computer networks and distributed systems security  2012
收藏 引用
丛书名: Communications in computer and Information Science
2012年
作者: Sabu M. Thampi Albert Y. Zomaya Thorsten Strufe Jose M. Alcaraz-Calero Tony Thomas
This book constitutes the refereed proceedings of the international conference on Recent Trends in computer networks and distributed systems security, held in Trivandrum, India, in October 2012. The 34 revised full pa...
来源: 评论
Bridging security and Efficiency: Energy-Aware Clustering for Data Encryption in Smart Agriculture
Bridging Security and Efficiency: Energy-Aware Clustering fo...
收藏 引用
international conference on Computing, Networking and Communications (ICNC)
作者: Huzaif Khan Lokesh Purohit Ali Jalooli Department of Computer Science California State University Dominguez Hills Carson CA USA
Securing data communication in smart agriculture is essential to ensure data integrity and confidentiality in distributed sensor networks. While Cheon-Kim-Kim-Song (CKKS) homomorphic encryption offers strong security ... 详细信息
来源: 评论
distributed Denial of Service Attack Detection by Machine Learning Techniques
Distributed Denial of Service Attack Detection by Machine Le...
收藏 引用
Learning and Technology conference (L&T)
作者: Varkha K. Jewani Prafulla E. Ajmire Mohd. Atique Bhisham Sharma Imed Ben Dhaou Suhashini Awadhesh Chaurasia Sant Gadge Baba Amravati University Amravati India Centre of Research Impact and Outcome Chitkara University Rajpura Punjab India Department of Computer Science Hekma School of Engineering Computing and Design Dar Al-Hekma University Jeddah Saudi Arabia Department of Computer Science RTM Nagpur University Nagpur
The exponential expansion of computer networks and the internet makes it clear that there is a chance of being attacked and harmed. In the meantime, one of the most crucial defensive measures against the more complex ... 详细信息
来源: 评论