咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 60 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,855 篇 工学
    • 2,546 篇 计算机科学与技术...
    • 1,705 篇 软件工程
    • 944 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 346 篇 wireless sensor ...
  • 304 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 205 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 165 篇 computer securit...
  • 161 篇 network security
  • 158 篇 information secu...
  • 154 篇 internet of thin...
  • 153 篇 distributed comp...
  • 148 篇 cryptography
  • 146 篇 computer science
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 19 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 jasni mohamad za...
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 natrayan l
  • 7 篇 lin zhang
  • 7 篇 wei wang
  • 7 篇 mukaddim pathan
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu

语言

  • 4,998 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是911-920 订阅
排序:
Blockchain for IoT security and Privacy  9
Blockchain for IoT Security and Privacy
收藏 引用
9th IEEE international conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), ICRITO 2021
作者: Wadhwa, Devesh Gupta, Deepa Saini, Sonia Bathla, Ruchika Amity Institute of Information Technology Amity University Noida India
The Internet of Things (IoT) is increasing day by day as time is succeeding continuously. A rapid improvement is seen in the research and industrial area, yet it meets all promises of security that could be used to mi... 详细信息
来源: 评论
A 5G framework and its analysis of interference cancellation in multi-tier heterogeneous networks
A 5G framework and its analysis of interference cancellation...
收藏 引用
2021 IEEE international conference on Electrical, computer, Communications and Mechatronics Engineering, ICECCME 2021
作者: Gachhadar, Anand Maharjan, Ram Krishna Shrestha, Surendra Adhikari, Nanda Bikram Qamar, Faizan Institute of Engineering Tribhuvan University Department of Electronics and Computer Engineering Center of Cyber Security Malaysia
In order to attain the maximum data rate and better spectral efficiency for the 5G wireless communication network, the operators increase user density of cellular network to reduce the transmitter-receiver distance. D... 详细信息
来源: 评论
Cybersecurity in Internet of Things networks using Deep Learning Models
Cybersecurity in Internet of Things Networks using Deep Lear...
收藏 引用
Sustainable Computing and Data Communication systems (ICSCDS), international conference on
作者: V Anitha C.G. Naveen Kumar Ramu Kuchipudi Khushboo Sharma J Muralidharan R. Rajagopal Department of Computer Science and Engineering Imayam College of Engineering Kannanur Thuraiyur Trichy Tamil Nadu India Department of Studies and Research in Computer Science Karnataka State Open University Mysuru-06 Karnataka India Department of Information Technology Chaitanya Bharathi Institute of Technology Hyderabad Telangana India Department of Computer Science and Engineering JECRC University Jaipur Rajasthan Department of ECE KPR Institute of Engineering and technology Coimbatore Tamil Nadu India Department of Computer Science & Engineering Alliance College of Engineering & Design Alliance University Bangalore Karnataka India
The Internet of Things and global grid that connects millions of sensors and devices have made distributed software and services ubiquitous. IoT’s vast reach and economic value make it a natural target for hackers, m... 详细信息
来源: 评论
A distributed Ledger for Non-attributable Cyber Threat Intelligence Exchange  1
收藏 引用
17th EAI international conference on security and Privacy in Communication networks (SecureComm)
作者: Huff, Philip Li, Qinghua Univ Arkansas Fayetteville AR 72701 USA
Cyber threat intelligence (CTI) sharing provides cybersecurity operations an advantage over adversaries by more quickly characterizing the threat, understanding its tactics, anticipating the objective, and identifying... 详细信息
来源: 评论
Shaping the Future of Mobile Edge Computing with Innovative Architectures and Designs for Web3.0 over 5G/6G networks
Shaping the Future of Mobile Edge Computing with Innovative ...
收藏 引用
international conference on Communication systems and Network Technologies (CSNT)
作者: Ashwini Malviya Chandra Prakash Lora A Kannagi Department of uGDX ATLAS SkillTech University Mumbai Maharashtra India Department of Chemistry Vivekananda Global University Jaipur India Department of Computer Science and Information Technology Jain (Deemed to be University) Bangalore India
Web3.0 apps, with their emphasis on decentralization, real-time processing, and low latency, hold the key to MEC's bright future. This calls for an all-encompassing, future-oriented strategy in MEC architecture an... 详细信息
来源: 评论
Research on distributed Internet of Things Trusted Operation Based on Dynamic Trusted Metrics
Research on Distributed Internet of Things Trusted Operation...
收藏 引用
international conference on computers, Communications, and systems (ICCCS)
作者: Guiping Zheng Yu Zhang Tianqi Peng Chong Guo Chen Guo Ximing Liu Faculty of Information Technology Beijing University of Technology Beijing China Beijing Trusty Cloud Technology Co. Ltd. Beijing China China Cybersecurity Review Technology and Certification Center Beijing China Beijing Chuangan Hengyu Technology Co. Ltd. Beijing China
The Internet of Things (IoT) is a heterogeneous network composed of different types of wireless networks, such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, AD Hoc, and RFID. However, the openness of the IoT envi...
来源: 评论
Design and Comprehensive Review on Number of Different States of the Art Works Related to Botnet Attack Detection
Design and Comprehensive Review on Number of Different State...
收藏 引用
MIT Art, Design and Technology School of Computing international conference (MITADTSoCiCon)
作者: Sandip Y. Bobade Ravindra S. Apare Ravindra H. Borhade Computer Engineering Dept SMT. Kashibai Navale College Of Engineering SPPU Pune India IT Department SPPU Trinity College of Engineering and Research Pune Department of Computer Engineering STES Smt. Kashibai Navale College of Engineering SPPU Pune India
The Internet of Things is a novel example for communication which use the internet to connect a extensive range of common place things. A new age of clever gadgets that are effortlessly integrated into our day-to-day ... 详细信息
来源: 评论
Simulating Cyber Attacks and Designing Malware using Python
Simulating Cyber Attacks and Designing Malware using Python
收藏 引用
international conference on Signal Processing and Integrated networks (SPIN)
作者: Akash Ankit Shubham Inder Anuj Sharma Rahul Johari Deo Prakash Vidyarthi SWINGER: Security Wireless IoT Network Group of Engineering and Research University School of Information Communication and Technology Guru Gobind Singh Indraprastha University Dwarka New Delhi India Royal Melbourne Institute of Technology (RMIT University) Melboume Victoria Australia Parallel and Distributed System Lab School of Computer and Systems Sciences Jawaharlal Nehru University New Delhi India
In this Internet era, we have become heavily dependent on the World Wide Web and it has become a basic amenity for humans. A normal user can be trapped easily in this vicious web if not careful enough. It is a field t... 详细信息
来源: 评论
security Landscape of Anomaly based Defence Mechanisms in Edge Environments
Security Landscape of Anomaly based Defence Mechanisms in Ed...
收藏 引用
international conference on Smart Computing & Communications (ICSCC)
作者: Aditya Wath Tom Kurian John Paul Martin Department of Computer Science and Engineering Indian Institute of Information Technology Kottayam Kottayam Kerala
Edge computing is a computational paradigm that brings computation closer to the end user. Even though real-time applications benefit from the extremely low response time of such a computing paradigm, the heterogeneit...
来源: 评论
Network Operations Scheduling for distributed Quantum Computing
Network Operations Scheduling for Distributed Quantum Comput...
收藏 引用
IEEE international conference on Trust, Privacy and security in Intelligent systems and Applications (TPS-ISA)
作者: Nitish K. Chandra Eneet Kaur Kaushik P. Seshadreesan Department of Informatics & Networked Systems School of Computing & Information University of Pittsburgh Pittsburgh PA USA Cisco Quantum Lab Los Angeles CA USA
Realizing distributed architectures for quantum computing is crucial to scaling up computational power. A key component of such architectures is a scheduler that coordinates operations over a short-range quantum netwo... 详细信息
来源: 评论