咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 60 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,855 篇 工学
    • 2,546 篇 计算机科学与技术...
    • 1,705 篇 软件工程
    • 944 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 346 篇 wireless sensor ...
  • 304 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 205 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 165 篇 computer securit...
  • 161 篇 network security
  • 158 篇 information secu...
  • 154 篇 internet of thin...
  • 153 篇 distributed comp...
  • 148 篇 cryptography
  • 146 篇 computer science
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 19 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 jasni mohamad za...
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 natrayan l
  • 7 篇 lin zhang
  • 7 篇 wei wang
  • 7 篇 mukaddim pathan
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu

语言

  • 4,998 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是921-930 订阅
排序:
DDoS Attack Intrusion Detection System with CNN and LSTM Hybridization
DDoS Attack Intrusion Detection System with CNN and LSTM Hyb...
收藏 引用
Sustainable Computing and Smart systems (ICSCSS), international conference on
作者: V Poornachander Konga Sathish Kumar Sripelli Jagadish Department of Computer science and Applications Government Degree College (Autonomous) Narsampet Warangal Telangana Department of Computer Science & Engineering Chaitanya (Deemed to be) University Hanamkonda Telangana Dept of CS & AI SR University Ananthasagar Telangana
distributed Denial of service (DDoS) threats are among the most harmful events to network security. DDoS attacks are considered among the most common types of network attacks. When servers get attacked by these attack... 详细信息
来源: 评论
Advancements in Suspicious and Violent Activity Recognition for Intelligent Video Surveillance  3
Advancements in Suspicious and Violent Activity Recognition ...
收藏 引用
3rd international conference on Disruptive Technologies, ICDT 2025
作者: Rana, Niyati Parashar, Deepak Bahadure, Nilesh Jethani, Hetal Banerjee, Sudipta Sharma, Kanhaiya Gsfc University Department of Computer Scinece & Engineering Gujarat Vadodara India Symbiosis Institute of Technology Pune Symbiosis International Univesity Dept. of Cse Maharashtra Pune India
Recognition of suspicious or violent activity in video surveillance has become increasingly important in terms of public safety and security. This synthesis examined state-of-the-art methodologies for detecting anomal... 详细信息
来源: 评论
A new ontological approach for multilingual scientific research  23
A new ontological approach for multilingual scientific resea...
收藏 引用
Proceedings of the 7th international conference on Future networks and distributed systems
作者: Mohammed Charaf Eddine Meftah Okba Kazar LIAP Laboratory University of El Oued Algeria Smart Computer Science Laboratory (LINFI) Computer Science Department University of Biskra Algeria and Department of Information Systems and Security College of Information Technology United Arab Emirate University United Arab Emirates
Abstract— Scientific research is all the actions undertaken to produce and develop scientific knowledge. The representation of this knowledge can take various forms: it can be publications, reports, patents, etc. Thi...
来源: 评论
SHAKTI: Securing Hardware IPs by Cascade Gated Multiplexer-Based Logic Obfuscation
SHAKTI: Securing Hardware IPs by Cascade Gated Multiplexer-B...
收藏 引用
international conference on VLSI Design
作者: Jugal Gandhi Nikhil Handa Abhay Nayak Diksha Shekhawat M. Santosh Jaya Dofe Jai Gopal Pandey CSIR- Central Electronics Engineering Research Institute (CEERI) Pilani India Academy of Scientific and Innovative Research (AcSIR) Ghaziabad India Birla Institute of Technology and Science (BITS) Pilani India Department of Electrical and Computer Engineering California State University Fullerton CA USA
The modern distributed chip design chain is increasingly vulnerable to piracy and overproduction. Logic locking has emerged as a prominent solution, allowing chip designers to enhance the security of their hardware in... 详细信息
来源: 评论
Sequential Pattern Mining: A Proposed Approach for Intrusion Detection systems  23
Sequential Pattern Mining: A Proposed Approach for Intrusion...
收藏 引用
Proceedings of the 7th international conference on Future networks and distributed systems
作者: Moemedi Lefoane Ibrahim Ghafir Sohag Kabir Irfan Ullah Awan Computer Science University of Bradford United Kingdom
Technological advancements have played a pivotal role in the rapid proliferation of the fourth industrial revolution (4IR) through the deployment of Internet of Things (IoT) devices in large numbers. COVID-19 caused s... 详细信息
来源: 评论
An Overview of Adaptive Network Control in the Internet of Things: Machine Learning Methods for Optimizing Traffic and Dynamic Resource Management
An Overview of Adaptive Network Control in the Internet of T...
收藏 引用
Data Science and Business systems (ICDSBS), international conference on
作者: A Karthikeyan J Joel Department of Electronics and Communication Engineering Vel Tech Multi Tech Dr Rangarajan Dr Sakunthala Engineering College Chennai Department of Computer Science and Engineering RMK Engineering College Chennai
The Internet of Things (IoT) ecosystem has witnessed exponential growth, making network settings complex and dynamic. These challenges in energy efficiency, traffic, and resource allocation have already made adaptive ... 详细信息
来源: 评论
Keynote Speech 2 Towards a Continuum Computing Framework for Decentralised Federated Learning Based Context-aware IoT Applications
Keynote Speech 2 Towards a Continuum Computing Framework for...
收藏 引用
international conference on Social networks Analysis, Management and security (SNAMS)
作者: Nabil Abdennadher University of Applied Sciences Western Switzerland
The proliferation of sensing device technologies, and the growing demand for data-intensive loT applications, are paving the way to the next wave of transformation in IoT computing systems architecture. The goal today... 详细信息
来源: 评论
A Mutual Intrusion Detection System for MANET to Address DDoS attacks using Data Mining Techniques
A Mutual Intrusion Detection System for MANET to Address DDo...
收藏 引用
Sustainable Computing and Data Communication systems (ICSCDS), international conference on
作者: K. Bala P N Renjith M Latha. S.T. Santhanalakshmi Department of Computer Science and Engineering School of Computing Bharath Institute of Higher Education and Research Chennai Tamilnadu India Department of Computer Science and Engineering VIT Chennai Campus Chennai Tamilnadu India Department Of Information Technology Ramapuram Campus SRM Institute of Science and Technology Chennai Tamilnadu India Department of Computer Science and Engineering Panimalar Engineering College Chennai Tamil Nadu India
A type of wireless communication network called a mobile ad hoc network (MANET) is composed of numerous flexible components that can move in any of the network’s many directions. The Intrusion Detection System (IDS) ... 详细信息
来源: 评论
Design and Implementation of a 5G security Testbed Based on Zero Trust Architecture
Design and Implementation of a 5G Security Testbed Based on ...
收藏 引用
international conference on Information and Communication Technology Convergence (ICTC)
作者: Mahnsuk Yoon Jihun Seo Jonghoon Lee Keuchul Cho Future Mobile Communication Research Center GERI(Gumi Electronics & Information Technology Research Institute) Gumi Korea Department of The Fourth Industrial Revolution & Transport Center for Connected & Automated Driving Research Korea Transport Institute Sejong Korea Cyber Security Research Division ETRI(Electronics and Telecommunications Research Institute) Daejeon Korea School of Computer Secience and Engineering Software Education Center Kyungpook National University Daegu Korea
This paper presents the design and implementation of a 5G security testbed based on Zero Trust Architecture (ZTA). As 5G networks offer ultra-high speeds, low latency, and massive connectivity, ensuring their security... 详细信息
来源: 评论
Autoencoder-based Temporal Convolutional Network for Real-Time Anomaly Detection in Large-Scale Network Traffic
Autoencoder-based Temporal Convolutional Network for Real-Ti...
收藏 引用
distributed Computing and Electrical Circuits and Electronics (ICDCECE), IEEE international conference on
作者: Rana Veer Samara Sihman Bharattej R Raed Hamyd Mamatha Bai B G Sandeep Reddy Sasikumar Gurumoorthy Doctorate of Business Administration National Louis University FL USA Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of Computer Science and Engineering Nitte Meenakshi Institute of Technology Bengaluru India School of Computer Science and Engineering Malla Reddy Engineering College for Women (UGC-Autonomous) Hyderabad India Department of Computer Science and Engineering School of Engineering and Technology Dhanalakshmi Srinivasan University Tiruchirappalli India
Nowadays, the rapid growth of network traffic has needed the development of efficient anomaly detection systems to ensure network security and reliability. However, the existing One-Class Support Vector Machine (One-c... 详细信息
来源: 评论