咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 60 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,855 篇 工学
    • 2,546 篇 计算机科学与技术...
    • 1,705 篇 软件工程
    • 944 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 346 篇 wireless sensor ...
  • 304 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 205 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 165 篇 computer securit...
  • 161 篇 network security
  • 158 篇 information secu...
  • 154 篇 internet of thin...
  • 153 篇 distributed comp...
  • 148 篇 cryptography
  • 146 篇 computer science
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 19 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 jasni mohamad za...
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 natrayan l
  • 7 篇 lin zhang
  • 7 篇 wei wang
  • 7 篇 mukaddim pathan
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu

语言

  • 4,998 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是891-900 订阅
排序:
A Short Survey of AI-driven Load Distribution for Electronic Health Record Management with Recent Deployed Techniques, Research Gaps and Challenges
A Short Survey of AI-driven Load Distribution for Electronic...
收藏 引用
Smart Electronics and Communication (ICOSEC), international conference on
作者: S. Suryanarayanaraju M.Chandra Naik R.N. V Jagan Mohan Department of Computer Science & Engineering GIET University Gunupur Odisha Department of Computer Science & Engineering SRKR Engineering College (A) Chinaamiram
With the arrival of Artificial Intelligence (AI), the Internet of Things (IoT), machine learning, and deep learning methodologies, data-driven medical applications have appeared as a promising solution for implementin... 详细信息
来源: 评论
Machine Learning (ML) assisted Edge security framework on FPGAs
Machine Learning (ML) assisted Edge security framework on FP...
收藏 引用
international conference on computer and Communication Engineering, ICCCE
作者: Abdul Manan Sheikh Md. Rafiqul Islam Mohamed Hadi Habaebi Suriza Ahmad Zabidi Athaur Rahman Bin Najeeb Ahmed Basahel Department of Electrical and Computer Engineering International Islamic University Malaysia Kuala Lumpur Malaysia
Edge computing (EC) is an act of bringing computational and storage capability near data sources. It helps to reduce response times and bandwidth requirements. However, the rapid proliferation of edge devices has expa...
来源: 评论
Sentences Similarity Model Based on Fusion of Semantic, Syntactic and Word Order Multi-Features
Sentences Similarity Model Based on Fusion of Semantic, Synt...
收藏 引用
Information Science, Parallel and distributed systems (ISPDS), international conference on
作者: Ya Zhou Ning Zhao Guimin Huang Nanxiao Deng Qingkai Guo Guangxi Key Laboratory of Image and Graphic Intelligent Processing School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China
In sentence similarity research methods, sentence similarity is often calculated from semantic aspects, however, the influence of other features is ignored. For example, the influence of sentence syntactic structure a...
来源: 评论
A Brief Study on Cloud security
A Brief Study on Cloud Security
收藏 引用
international conference on Computing and Networking Technology (ICCNT)
作者: Abhay Ajith Adharsh S Mathew Remya S Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India
distributed, parallel, and grid computing are all used in a kind of computing known as cloud computing. It serves as a flexible, affordable, and tried-and-true online delivery platform for IT services marketed to busi...
来源: 评论
Optimizing RF-Sensing for Drone Detection: The Synergy of Ensemble Learning and Sensor Fusion
Optimizing RF-Sensing for Drone Detection: The Synergy of En...
收藏 引用
international conference on distributed Computing in Sensor systems (DCOSS)
作者: Laiba Tanveer Muhammad Zeshan Alam Maham Misbah Farooq Alam Orakzai Ahmed Alkhayyat Zeeshan Kaleem Electrical and Computer Engineering COMSATS University Islamabad Wah Campus Pakistan Wah Pakistan Department of Computer Science Brandon University Canada Brandon Canada Department of Computer Technical Engineering College of Engineering Islamic University Najaf Iraq
Unmanned Aerial Vehicles (UAVs) find extensive applications across various industries, surveillance, and communication services. However, concerns regarding their potential misuse have prompted the development of coun... 详细信息
来源: 评论
SAfER: Simplified Auto-encoder for (Anomalous) Event Recognition
SAfER: Simplified Auto-encoder for (Anomalous) Event Recogni...
收藏 引用
international conference on distributed Computing in Sensor systems (DCOSS)
作者: Yuvin Perera Gustavo Batista Wen Hu Salil Kanhere Sanjay Jha University of New South Wales Australia
The IoT device marketplace has seen a large boom over the past decade. Myriad tech companies introduce IoT products to the market to capitalize on this demand. However, most IoT products have hidden security vulnerabi... 详细信息
来源: 评论
An Integrated Rule-Based and Machine Learning Technique for Efficient DoS Attack Detection in WSN
An Integrated Rule-Based and Machine Learning Technique for ...
收藏 引用
Disruptive Technologies (ICDT), international conference on
作者: Shalini Swami Pushpa Singh Sansar Singh Chauhan Department of Computer Science GL Bajaj Institute of Technology and Management Greater Noida UP
Wireless Sensor networks (WSNs) are highly distributed, lightweight nodes, deployed in large numbers to monitor systems. Because of the nature of wireless, there are various challenges for security and threats. An eff...
来源: 评论
An Analysis Model of English Text Coherence Based on RST Dependency Relationship
An Analysis Model of English Text Coherence Based on RST Dep...
收藏 引用
Information Science, Parallel and distributed systems (ISPDS), international conference on
作者: Guimin Huang Wanying Shuai Qingkai Guo Nanxiao Deng Jianxing Lin Guangxi Key Laboratory of Image and Graphic Intelligent Processing School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China
Text coherence analysis is an important and challenging task that is essential for subtasks such as automatic summarisation, viewpoint extraction and machine translation in natural language processing (NLP). A large b...
来源: 评论
Resilience of Blockchain Overlay networks  17th
Resilience of Blockchain Overlay Networks
收藏 引用
Network and System security - 17th international conference, NSS 2023, Proceedings
作者: Paphitis, Aristodemos Kourtellis, Nicolas Sirivianos, Michael Cyprus University of Technology Limassol Cyprus Telefonica Research Barcelona Spain
Blockchain (BC) systems are highly distributed peer-to-peer networks that offer an alternative to centralized services and promise robustness to coordinated attacks. However, the resilience and overall security of a B... 详细信息
来源: 评论
security and Privacy in Wireless Sensor networks Using Intrusion Detection Models to Detect DDOS and Drdos Attacks: A Survey
Security and Privacy in Wireless Sensor Networks Using Intru...
收藏 引用
IEEE Students' conference on Electrical, Electronics and computer Science (SCEECS)
作者: Kosaraju Chaitanya Sankara Narayanan Department of Computer Science and Engineering Veltech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Vignan's Nirula Institute of Technology and Science for Women Guntur Department of Computer Science and Engineering Veltech Rangarajan Dr Sagunthala R&D Institute of Science and Technology Avadi Chennai Tamilndu Indi
Wireless sensor networks (WSN) playa significant role in the collection and transmission of data. The principal data collectors and broadcasters are small wireless sensor nodes. As a result of their disorganized layou... 详细信息
来源: 评论