咨询与建议

限定检索结果

文献类型

  • 4,981 篇 会议
  • 280 册 图书
  • 87 篇 期刊文献

馆藏范围

  • 5,348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,872 篇 工学
    • 2,564 篇 计算机科学与技术...
    • 1,719 篇 软件工程
    • 966 篇 信息与通信工程
    • 369 篇 电气工程
    • 301 篇 控制科学与工程
    • 180 篇 网络空间安全
    • 125 篇 动力工程及工程热...
    • 124 篇 电子科学与技术(可...
    • 120 篇 安全科学与工程
    • 110 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 613 篇 理学
    • 367 篇 数学
    • 118 篇 生物学
    • 104 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 484 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 159 篇 工商管理
  • 241 篇 法学
    • 165 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 14 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 499 篇 security
  • 355 篇 wireless sensor ...
  • 309 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 216 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 200 篇 ip networks
  • 188 篇 computer crime
  • 171 篇 servers
  • 164 篇 computer securit...
  • 158 篇 information secu...
  • 154 篇 network security
  • 151 篇 distributed comp...
  • 150 篇 internet of thin...
  • 147 篇 computer science
  • 147 篇 cryptography
  • 142 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,231 篇 英文
  • 86 篇 其他
  • 38 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5348 条 记 录,以下是81-90 订阅
排序:
15th international conference on Emerging Ubiquitous systems and Pervasive networks / 14th international conference on Current and Future Trends of Information and Communication Technologies in Healthcare, EUSPN/ICTH 2024
15th International Conference on Emerging Ubiquitous Systems...
收藏 引用
15th international conference on Emerging Ubiquitous systems and Pervasive networks / 14th international conference on Current and Future Trends of Information and Communication Technologies in Healthcare, EUSPN/ICTH 2024
The proceedings contain 115 papers. The topics discussed include: receding horizon and optimization-based control for UAV path planning with collision avoidance;application of machine learning in technological forecas...
来源: 评论
Load Balancing Methods for distributed Data Storage: Challenges and Opportunities
Load Balancing Methods for Distributed Data Storage: Challen...
收藏 引用
international conference on Current Problems of Applied Mathematics and computer systems, CPAMCS 2023
作者: Shiriaev, Egor North Caucasus Federal University Stavropol Russia
The increased demand for big data processing has led to the development of distributed computing and data storage technologies. However, building an efficient distributed system is a rather difficult task and has a fe... 详细信息
来源: 评论
Group authentication algorithm based on region grouping and aggregate signcryption  4
Group authentication algorithm based on region grouping and ...
收藏 引用
4th international conference on Network Communication and Information security, ICNCIS 2024
作者: Li, Yong Gu, Jian Qiu, Jinyi He, Wenbo Zuo, Jiashuo State Grid Shaoxing Power Supply Company Zhejiang Shaoxing312000 China Department of Electronic and Communication Engineering North China Electric Power University Hebei Baoding071003 China
With the rapid development of the power Internet of Things and the increasing number of IoT devices and application scenarios, new requirements are put forward for the reliability and efficiency of equipment access ce... 详细信息
来源: 评论
Methods of increasing data reliability based on distributed and parallel technologies based on blockchain
Methods of increasing data reliability based on distributed ...
收藏 引用
international conference on Artificial Intelligence, Blockchain, Computing and security, ICABCS 2023
作者: Makhmadiyarovich, Nazarov Fayzullo Sherzodjon, Yarmatov Samarkand State University named after Sharof Rashidov Samarkand Uzbekistan
This article examines directions and mechanisms for increasing data reliability in computer networks. Currently, the rapid development of information technologies, the rapid growth of data flow, high-quality data proc... 详细信息
来源: 评论
DDoS Mitigation Dilemma Exposed: A Two-Wave Attack with Collateral Damage of Millions  19th
DDoS Mitigation Dilemma Exposed: A Two-Wave Attack with Coll...
收藏 引用
19th international conference on security and Privacy in Communication networks
作者: Shi, Lumin Li, Jun Sisodia, Devkishen Zhang, Mingwei Dainotti, Alberto Reiher, Peter Univ Oregon Eugene OR 97403 USA Georgia Inst Technol Atlanta GA USA UCLA Los Angeles CA USA
While mitigating link-flooding attacks on the Internet has become an essential task, little research has been done on how an attacker can further attack and abuse the mitigation solutions themselves. In this paper, we... 详细信息
来源: 评论
Evaluation of Microcontroller-Based SRAM PUF and the Authentication Scheme  24
Evaluation of Microcontroller-Based SRAM PUF and the Authent...
收藏 引用
4th international conference on computer, Internet of Things and Control Engineering
作者: Zhang, Yuting Ge, Yunfei Shanghai Univ Sch Comp Engn & Sci Shanghai Peoples R China
This paper tackles the security challenges of the Internet of Things (IoT) and introduces Physical Unclonable Functions (PUFs) as a low-cost, hardware-based security solution for resource-constrained IoT devices. Trad... 详细信息
来源: 评论
Advanced ARP Attack Protection in SDNs Using Deep Learning Approach  3
Advanced ARP Attack Protection in SDNs Using Deep Learning A...
收藏 引用
3rd IEEE international conference on Blockchain and distributed systems security, ICBDS 2024
作者: Kumar, M. Anand Purohit, Kamelsh Chandra Bhatt, Jaishankar Semuwal, Girija Shankar Presidency University School of Information Science Bengaluru India Graphic Era Deemed to be University Department of Computer Science Dehradun India Graphic Era Hill University Department of Media and Mass Communication Dehradun India
Software Defined networks have developed as a transformative standard in network architecture, providing centralized control, and dynamic supervision of network resources. In recent past several advancements have been... 详细信息
来源: 评论
Analysis on the consensus algorithms with reputation-based incentives in the healthcare blockchain networks
Analysis on the consensus algorithms with reputation-based i...
收藏 引用
2024 IEEE international conference on Signal Processing, Informatics, Communication and Energy systems, SPICES 2024
作者: Sajna, S. Pillai, Manu J TKM College of Engineering Affiliated to APJ Abdul Kalam Technological University Dept of Computer Science and Engineering Kerala India
Blockchain technology has gained significant attention in the healthcare sector due to its potential to address challenges related to data security, integrity, and interoperability. One critical aspect of blockchain n... 详细信息
来源: 评论
RAPID-AV: Realtime Adaptive and Intelligent Detection For AV's Against DDoS Attacks  18
RAPID-AV: Realtime Adaptive and Intelligent Detection For AV...
收藏 引用
18th IEEE international conference on Advanced networks and Telecommunications systems, ANTS 2024
作者: Kotha, Aditya Venkanna, U. International Institute of Information Technology Department of Computer Science and Engineering Naya Raipur India National Institute of Technology Department of Computer Science and Engineering Warangal India
Autonomous vehicles (AVs) increasingly rely on vehicle-to-everything (V2X) networks for communication. However, due to the devices' heterogeneity, they are more susceptible to attacks like distributed denial of se... 详细信息
来源: 评论
Affinity and Class Probability based Fuzzy Support Vector Machine for Path Loss Prediction in 5G Communication System
Affinity and Class Probability based Fuzzy Support Vector Ma...
收藏 引用
2024 international conference on distributed systems, computer networks and Cybersecurity, ICDSCNC 2024
作者: Cong, Zhiru Wang, Shuqing Inner Mongolia Electronic Information Vocational and Technical College Department of Electronics and Automation Hohhot China China United Network Communications Co. Ltd Department of Office/Security Supervision Hohhot China
Wireless propagation channel is a primary factor for optimizing and planning 5G communication system. Predicting path loss in 5G plays a vital role in optimizing performance of network and ensure appropriate communica... 详细信息
来源: 评论