咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 60 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,855 篇 工学
    • 2,546 篇 计算机科学与技术...
    • 1,705 篇 软件工程
    • 944 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 346 篇 wireless sensor ...
  • 304 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 205 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 165 篇 computer securit...
  • 161 篇 network security
  • 158 篇 information secu...
  • 154 篇 internet of thin...
  • 153 篇 distributed comp...
  • 148 篇 cryptography
  • 146 篇 computer science
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 19 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 jasni mohamad za...
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 natrayan l
  • 7 篇 lin zhang
  • 7 篇 wei wang
  • 7 篇 mukaddim pathan
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu

语言

  • 4,998 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是941-950 订阅
排序:
User Mobility Prediction in 5G networks Using Recurrent Neural networks
User Mobility Prediction in 5G Networks Using Recurrent Neur...
收藏 引用
Communication, Computing and Signal Processing (IICCCS), IEEE international conference on
作者: Anubhav Shrestha Vikalp Sharma Layth Hussein M.Aishwarya A N Satyanarayana T. Saimanohar Department of Computer Application Chandigarh Engineering College Chandigarh Group of Colleges Mohali Punjab India Department of Computer Science & Engineering IES College of Technology Bhopal M.P. India Department Of Computers Techniques Engineering College Of Technical Engineering The Islamic University Najaf Iraq Department Of Computers Techniques Engineering College Of Technical Engineering The Islamic University Of Al Diwaniyah Al Diwaniyah Iraq Prince Shri Venkateshwara Padmavathy Engineering College Chennai India ECE Department Sreenidhi Institute of Science and Technology Hyderabad India Department CSE-AI Saveetha Institute of Medical and Technical Sciences Chennai Tamilnadu India
The use of new possibilities introduced by 5G networks also creates new problems and concerns, specifically in the field of user mobility in wireless communication systems. In this paper, the Authors investigate the e... 详细信息
来源: 评论
E-DDoS: An Evaluation System for DDoS Attack Detection
E-DDoS: An Evaluation System for DDoS Attack Detection
收藏 引用
international conference on Network Protocols
作者: Kaiwen Chi Xiaohui Xie Yannan Hu Dongyang Zhao Yuming Xie Liang Zhang Yong Cui Department of Computer Science and Technology Tsinghua University Beijing China Zhongguancun Laboratory Beijing China AI4NET Lab Huawei Technologies Company Ltd Beijing China
Research in the area of distributed Denial of Service (DDoS) attack detection is of paramount importance in the field of network security. Many existing studies employ static evaluation methods that fail to account fo... 详细信息
来源: 评论
Federated Clustering Defense: Mitigating Data Exposure in Collaborative Learning
Federated Clustering Defense: Mitigating Data Exposure in Co...
收藏 引用
2025 international conference on Emerging Technologies for Intelligent systems, ETIS 2025
作者: Radhakrishnan, Anuja Krishna, Sathya Bama Sathyabhama Institute of Science & Technology Department of Computer Science and Engineering Chennai India
The development of intelligent industrial applications is being driven globally by advancements in the next generation of Internet of Things (IoT) technologies. At the same time, artificial intelligence (AI) technolog... 详细信息
来源: 评论
Advancing Threat Detection in Fog Computing: A Comprehensive Approach to Real-Time Analysis and Model Generation
Advancing Threat Detection in Fog Computing: A Comprehensive...
收藏 引用
international conference on Fog and Mobile Edge Computing (FMEC)
作者: Lucía Cuadrillero Paredes Ángel Luis Perales Gómez Óscar Cánovas Lorenzo Fernández Maimó Félix J. García Clemente Faculty of Computer Science University of Murcia Murcia Spain
Fog computing, an extension of cloud computing, places computational resources closer to data sources, enhancing network efficiency and security. This paper addresses the challenges posed by cybersecurity threats with... 详细信息
来源: 评论
SPIRT: A Fault-Tolerant and Reliable Peer-to-Peer Serverless ML Training Architecture
SPIRT: A Fault-Tolerant and Reliable Peer-to-Peer Serverless...
收藏 引用
IEEE international conference on Software Quality, Reliability and security (QRS)
作者: Amine Barrak Mayssa Jaziri Ranim Trabelsi Fehmi Jaafar Fabio Petrillo Department of Computer Science and Mathematics University of Quebec at Chicoutimi UQAC Saguenay Canada Département de génie logiciel École de Technologie Supérieure ÉTS Montreal QC
The advent of serverless computing has ushered in notable advancements in distributed machine learning, particularly within parameter server-based architectures. Yet, the integration of serverless features within peer...
来源: 评论
K-Means-Based Mobile Adaptive networks for Swarm Robotic systems with Non-Cooperative Behaviors  6
K-Means-Based Mobile Adaptive Networks for Swarm Robotic Sys...
收藏 引用
6th international conference on Computational Intelligence and Applications, ICCIA 2021
作者: You, Jia Li, Zhenhui Yang, Jianhua Zhejiang University College of Information Science and Electronic Engineering Hangzhou China Zhejiang University College of Control Science and Engineering Hangzhou China Zhejiang University College of Computer Science and Technology Hangzhou China
Mobile adaptive networks enable distributed adaptation and learning over networks while maintaining the cooperative motion, and play an important role in multi-robot control. Non-cooperative behaviors are common in sw... 详细信息
来源: 评论
Enhancing Multi-UAV Path Planning Efficiency with security through Integration of Priority-Based Ant Lion Optimization Algorithm
Enhancing Multi-UAV Path Planning Efficiency with Security t...
收藏 引用
Next Generation Data-driven networks (NGDN), international conference on
作者: Yunchong Guan Wei Zhi Sturdy So Su Peng Yihang Zhang Yuanhao Zhang Yang Wang Fahreza Prima Hakim Mumtaz Zain Abdullah School of Computer Science Shenyang Aerospace University Shenyang China School of Cyberspace Security (School of Cryptology) Hainan University Haikou China
The research endeavors to revolutionize Multi-Robot systems (MRS) through a cutting-edge hybrid strategy, amalgamating Priority-Based Algorithms (PBA) and Ant Lion Optimization (ALO) algorithms. This innovative approa... 详细信息
来源: 评论
23rd international Symposium on Stabilization, Safety, and security of distributed systems, SSS 2021
23rd International Symposium on Stabilization, Safety, and S...
收藏 引用
23rd international Symposium on Stabilization, Safety, and security of distributed systems, SSS 2021
The proceedings contain 40 papers. The special focus in this conference is on Stabilization, Safety, and security of distributed systems. The topics include: Round-Oblivious Stabilizing Consensus in Dynamic Netwo...
来源: 评论
ZF-DDOS: An Enhanced Statistical-Based DDoS Detection Approach using Integrated Z-Score and Fast-Entropy Measures
ZF-DDOS: An Enhanced Statistical-Based DDoS Detection Approa...
收藏 引用
Computing and Informatics (ICCI), international conference on
作者: Mahmoud Hassan Khaked Metwally Mohamed A. Elshafey Departemnt of Computer Engineering and Artifitial Intelligence Military Technical Colleague Cairo Egypt
The fast emerging of Internet technologies and 5G connectivity played an imperative role in our daily lives. This allowed to incredible increase in the Internet usage, so, a large amount of information is exchanged be...
来源: 评论
RPA-Code for Secure Binary Sequence Generation from Graph-Based Scanning  23
RPA-Code for Secure Binary Sequence Generation from Graph-Ba...
收藏 引用
Proceedings of the 7th international conference on Future networks and distributed systems
作者: Ahcene Bounceur Mohammad Hammoudeh Jameleddine Hassine Madani Bezoui Adel Fadhl Ahmed Muhamad Felemban Computer Science Department King Fahd University of Petroleum and Minerals Saudi Arabia Information and Computer Science Department King Fahd University of Petroleum and Minerals Saudi Arabia CESI LINEACT CESI LINEACT France
This article introduces a novel method for generating random binary sequences from Random Polar Angles (RPA). These sequences can be derived from an image, akin to QR-Codes, making them suitable for cryptographic appl... 详细信息
来源: 评论