咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 60 篇 期刊文献

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,855 篇 工学
    • 2,546 篇 计算机科学与技术...
    • 1,705 篇 软件工程
    • 944 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 346 篇 wireless sensor ...
  • 304 篇 computer network...
  • 253 篇 protocols
  • 247 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 205 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 165 篇 computer securit...
  • 161 篇 network security
  • 158 篇 information secu...
  • 154 篇 internet of thin...
  • 153 篇 distributed comp...
  • 148 篇 cryptography
  • 146 篇 computer science
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 19 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 jasni mohamad za...
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 natrayan l
  • 7 篇 lin zhang
  • 7 篇 wei wang
  • 7 篇 mukaddim pathan
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu

语言

  • 4,998 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5350 条 记 录,以下是961-970 订阅
排序:
Enhancing Small Object Detection in Aerial Imagery Based on Strong Feature Extraction and Batch Dimension
Enhancing Small Object Detection in Aerial Imagery Based on ...
收藏 引用
international Joint conference on Neural networks (IJCNN)
作者: Bingnan Cao Di Wang Ying Guo Hu Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China The Institute of Data Science City University of Macau Macau China
Object detection is a fundamental component of computer vision, playing a pivotal role in various applications. However, the accurate detection of small and densely distributed objects remains a challenging problem in... 详细信息
来源: 评论
Design and Implementation of a distributed Firewall Management System for Improved security
Design and Implementation of a Distributed Firewall Manageme...
收藏 引用
Roedunet international conference (RoEduNet)
作者: Andrei-Daniel Tudosi Adrian Graur Doru Gabriel Balan Alin Dan Potorac Department of Computers Electronics and Automation Stefan cel Mare University of Suceava Suceava Romania
Network security is the practice of protecting computer networks and devices from unauthorized access, attacks, and threats. These threats can come from a variety of sources, including hackers, malware, and external a...
来源: 评论
Hashgraph-Based Model Parameter Management for Reliable and Secure Deep Learning
Hashgraph-Based Model Parameter Management for Reliable and ...
收藏 引用
2025 IEEE international conference on Consumer Electronics, ICCE 2025
作者: Roh, Eunsung Choi, Jinheock Park, Younghoon Seo, Seung-Woo Big Data Research Center for New Value Creation Sookmyung Women's University Seoul Korea Republic of Department of Electric Engineering Seoul National University Seoul Korea Republic of Division of Computer Science Sookmyung Women's University Seoul Korea Republic of
Deep learning networks have rapidly developed across various fields, with several high-performing models already being applied in real-world applications. However, even with identical network architectures, variations... 详细信息
来源: 评论
Online Scheduling Unbiased distributed Learning over Wireless Edge networks  27
Online Scheduling Unbiased Distributed Learning over Wireles...
收藏 引用
27th IEEE international conference on Parallel and distributed systems, ICPADS 2021
作者: Han, Ziyi Zhou, Ruiting Pang, Jinlong Cao, Yue Tan, Haisheng School of Cyber Science and Engineering Wuhan University China School of Computer Science and Technology University of Science and Technology of China China
To realize high quality smart IoT services, such as intelligent video surveillance in Auto Driving and Smart City, tremendous amount of distributed machine learning jobs train unbiased models in wireless edge networks... 详细信息
来源: 评论
Enhancing Network Resilience against DDoS Attacks: Critical Node Identification using Load based k-shell Analysis
Enhancing Network Resilience against DDoS Attacks: Critical ...
收藏 引用
Knowledge Engineering and Communication systems (ICKECS), international conference on
作者: L Manjula G T Raju Department of CSE Ramaiah Institute of Technology Visvesvaraya Technological University Belagavi India Department of CSE SJC Institute of technology Visvesvaraya Technological University Belagavi India
Although IoT technology streamlines services by linking various nodes via the Internet, this interconnect brings forth security hurdles. These challenges arise from the integration itself, rendering IoT infrastructure... 详细信息
来源: 评论
CS-NIDS: Network Intrusion Detection Based on Cross-Silo Federated Learning
CS-NIDS: Network Intrusion Detection Based on Cross-Silo Fed...
收藏 引用
Electrical Engineering (ICEENG), international conference on
作者: Maged Abdelaty Informatics Research Institute (IRI) City of Scientific Research and Technological Applications (SRTA-City) Alexandria Egypt
Network intrusions are malicious attacks that target the confidentiality, integrity, and availability of computer networks. Network Intrusion Detection System (NIDS) can identify these intrusions and provide timely al... 详细信息
来源: 评论
Strategic Renewable Integration for Resilient Power systems: Insights from Kefallonia Island
Strategic Renewable Integration for Resilient Power Systems:...
收藏 引用
international conference on High Voltage Engineering and Application, ICHVE
作者: E.G. Goulioti E.M. Voumvoulakis V.T. Kontargyri C.A. Christodoulou N.P. Papanikolaou School of Electrical and Computer Engineering High Voltage and Electrical Measurement Laboratory National Technical University of Athens 9 Iroon Polytechniou Str. Zografou Campus Athens Greece Hellenic Electricity Distribution Operator S.A. 20 Perraivou & 5 Kallirrois Str. Athens Greece Department of Electrical and Electronics Engineering Faculty of Engineering University of West Attica Athens Greece Department of Electrical and Computer Engineering Electrical Machines Laboratory Democritus University of Thrace Xanthi Greece
The current evolution of power systems from a unidirectional to a multi-directional power flow system, in which distributed Energy Resources (DERs) are increasing, directly impacts the way they are being operated to e... 详细信息
来源: 评论
Multilingual Knowledge Graph Completion via Multimodal Decouple and Relation-based Ensemble Inference
Multilingual Knowledge Graph Completion via Multimodal Decou...
收藏 引用
international conference on Parallel and distributed systems (ICPADS)
作者: Xiaojing Liu Xuesong Jiang Fengge Yi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The objective of Multimodal Knowledge Graph Completion (MKGC) is to forecast absent entities within a knowledge graph by leveraging additional textual and visual modalities. Existing studies commonly utilize a singula...
来源: 评论
A Graph Convolutional networks-Based DDoS Detection Model
A Graph Convolutional Networks-Based DDoS Detection Model
收藏 引用
Annual IEEE systems conference
作者: Braden J. Saunders Patrice Kisanga Glaucio H.S. Carvalho Isaac Woungang Department of Computer Science Brock University St. Catharines Canada Department of Computer Science Toronto Metropolitan University Toronto Canada Department of Computer Science and Engineering Brock University St. Catharines Canada
Network attacks have exponentially increased over the last years and, seriously, impacting fundamental aspects of our modern society at all levels, i.e., individual, critical infrastructure, and national security. To ... 详细信息
来源: 评论
Effective Intrusion Detection in Heterogeneous Internet-of-Things networks via Ensemble Knowledge Distillation-Based Federated Learning
Effective Intrusion Detection in Heterogeneous Internet-of-T...
收藏 引用
IEEE international conference on Communications (ICC)
作者: Jiyuan Shen Wenzhuo Yang Zhaowei Chu Jiani Fan Dusit Niyato Kwok-Yan Lam Strategic Centre for Research in Privacy-Preserving Technologies & Systems Nanyang Technological University Singapore School of Computer Science and Engineering Nanyang Technological University Singapore
With the rapid development of low-cost consumer electronics and cloud computing, Internet-of- Things (IoT) devices are widely adopted for supporting next-generation distributed systems such as smart cities and industr... 详细信息
来源: 评论