咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 84 篇 期刊文献

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,879 篇 工学
    • 2,570 篇 计算机科学与技术...
    • 1,720 篇 软件工程
    • 968 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 355 篇 wireless sensor ...
  • 308 篇 computer network...
  • 254 篇 protocols
  • 249 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 201 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 166 篇 computer securit...
  • 160 篇 network security
  • 158 篇 information secu...
  • 155 篇 internet of thin...
  • 150 篇 distributed comp...
  • 147 篇 computer science
  • 146 篇 cryptography
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,022 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5374 条 记 录,以下是931-940 订阅
排序:
Optimizing IoT security:Advanced Intrusion Detection for IoT networks Using Deep Learning Techniques
Optimizing IoT Security:Advanced Intrusion Detection for IoT...
收藏 引用
Intelligent Technologies (ACOIT), Asian conference on
作者: Khandakar Rabbi Ahmed Nusrat Ameri Jannat Rosul Nisha Aminul Hoque Towfika Salam Md Istiak Hasan Rial Miyan Research Institute International University of Business Agriculture and Technology Uttara Model Town Dhaka Bangladesh Dept. of Mechatronics Engineering Rajshahi University of Engineering and Technology (RUET) Kazla Rajshahi Bangladesh Physics Discipline Science Engineering and Technology School Khulna University Khulna Bangladesh Dept. of Computer Science and Engineering Jahangirnagar University (JU) Savar Dhaka Bangladesh Dept. of Computer Science and Engineering Bangabandhu Road Tongabari Asian University of Bangladesh Ashulia Dhaka Dept. of Computer Science and Engineering Rajshahi University of Engineering and Technology (RUET) Kazla Rajshahi Bangladesh Dept. of Computer Science and Engineering Aditya College of Engineering (AOCE) Surampelam Kakinada Andhra Pradesh India
The advancement of Internet of Things (IoT) devices has ushered in a new era of connectivity and convenience. Intrusion Detection systems (IDS) are vital for protecting IoT networks by identifying abnormal activities ... 详细信息
来源: 评论
Autoencoder-based Temporal Convolutional Network for Real-Time Anomaly Detection in Large-Scale Network Traffic
Autoencoder-based Temporal Convolutional Network for Real-Ti...
收藏 引用
distributed Computing and Electrical Circuits and Electronics (ICDCECE), IEEE international conference on
作者: Rana Veer Samara Sihman Bharattej R Raed Hamyd Mamatha Bai B G Sandeep Reddy Sasikumar Gurumoorthy Doctorate of Business Administration National Louis University FL USA Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of Computer Science and Engineering Nitte Meenakshi Institute of Technology Bengaluru India School of Computer Science and Engineering Malla Reddy Engineering College for Women (UGC-Autonomous) Hyderabad India Department of Computer Science and Engineering School of Engineering and Technology Dhanalakshmi Srinivasan University Tiruchirappalli India
Nowadays, the rapid growth of network traffic has needed the development of efficient anomaly detection systems to ensure network security and reliability. However, the existing One-Class Support Vector Machine (One-c... 详细信息
来源: 评论
CyberGuardian 2: Integrating LLMs and Agentic AI Assistants for Securing distributed networks  20
CyberGuardian 2: Integrating LLMs and Agentic AI Assistants ...
收藏 引用
20th international conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2025
作者: Paduraru, Ciprian Patilea, Catalina Camelia Stefanescu, Alin Department of Computer Science University of Bucharest Romania Institute for Logic and Data Science Romania
Robust cybersecurity measures are essential to protect complex information systems from a variety of cyber threats, which requires sophisticated security solutions. This paper explores the integration of Large Languag... 详细信息
来源: 评论
Bridging security and Efficiency: Energy-Aware Clustering for Data Encryption in Smart Agriculture
Bridging Security and Efficiency: Energy-Aware Clustering fo...
收藏 引用
international conference on Computing, Networking and Communications (ICNC)
作者: Huzaif Khan Lokesh Purohit Ali Jalooli Department of Computer Science California State University Dominguez Hills Carson CA USA
Securing data communication in smart agriculture is essential to ensure data integrity and confidentiality in distributed sensor networks. While Cheon-Kim-Kim-Song (CKKS) homomorphic encryption offers strong security ... 详细信息
来源: 评论
FERI: Feature Enhancement and Relational Interaction for Image-text Matching
FERI: Feature Enhancement and Relational Interaction for Ima...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Yu Zhang Jianqiang Zhang Gongpeng Song Qin Lu Shuo Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Image-text matching is an important problem at the intersection of computer vision and natural language processing. It aims to establish the semantic link between image and text to achieve high-quality semantic alignm... 详细信息
来源: 评论
Visually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection
Visually Analyze SHAP Plots to Diagnose Misclassifications i...
收藏 引用
IEEE international conference on Data Mining Workshops (ICDM Workshops)
作者: Maraz Mia Mir Mehedi A. Pritom Tariqul Islam Kamrul Hasan Department of Computer Science Tennessee Tech Cookeville TN USA School of Information Studies Syracuse University Syracuse NY USA Department of ECE Tennessee State University Nashville TN USA
Intrusion detection has been a commonly adopted detective security measures to safeguard systems and networks from various threats. A robust intrusion detection system (IDS) can essentially mitigate threats by providi... 详细信息
来源: 评论
Lightweight Multi-tier IDS for UAV networks: Enhancing UAV Zero-Day Attack Detection with Honeypot Threat Intelligence  15th
Lightweight Multi-tier IDS for UAV Networks: Enhancing UAV ...
收藏 引用
15th EAI international conference on Digital Forensics and Cyber Crime, ICDF2C 2024
作者: Jamil, Abdul Majid Cao, Yue Ahmad, Naveed Sali, Aduwati Binti Alshare, Mohammed Ali Chen, Long Hadi, Hassan Jalil School of Cyber Science and Engineering Wuhan University Wuhan China College of Computer and Information Sciences Riyadh Saudi Arabia Universiti Putra Malaysia Serdang Malaysia Beijing University of Chemical Technology Beijing China
Unmanned Aerial Vehicles (UAVs) present unique security challenges due to their distributed nature and susceptibility to evolving threats. Current Intrusion Detection systems (IDS) struggle to keep pace with real-time... 详细信息
来源: 评论
Reconnaissance Detection in Decentralised IoT System using Model-Contrastive Federated Learning
Reconnaissance Detection in Decentralised IoT System using M...
收藏 引用
international Symposium on Advanced networks and Telecommunication systems (ANTS)
作者: Rajdeep Kumar Dutta Bishal Chhetry Rakesh Matam Ferdous Ahmed Barbhuiya Dept. of Computer Science and Engineering Indian Institute of Information Technology Guwahati India
The detection of reconnaissance attacks is crucial for safeguarding Internet of Things (IoT) environments, which are inherently more vulnerable and resource-constrained compared to traditional computing systems. Tradi... 详细信息
来源: 评论
A Drug Box Recognition System Based on Deep Learning and Cloud-Edge Collaboration for Pharmacy Automation
A Drug Box Recognition System Based on Deep Learning and Clo...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Honglei Zhu Anming Dong Jiguo Yu Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Big Data Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Drug box recognition is an integral part of the pharmacy automation system (PAS), which checks for discrepancies between the drugs provided by the system and the doctor’s prescription with the help of modern image re...
来源: 评论
FL-EVCS: Federated Learning based Anomaly Detection for EV Charging Ecosystem
FL-EVCS: Federated Learning based Anomaly Detection for EV C...
收藏 引用
international conference on computer Communications and networks (ICCCN)
作者: Shaurya Purohit Manimaran Govindarasu Department of Electrical and Computer Engineering Iowa State University Ames IA
The rapid expansion of electric vehicle (EV) technologies and their seamless integration into smart grids herald a significant transition toward sustainable energy practices, highlighting the need to bolster Electric ... 详细信息
来源: 评论