咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 84 篇 期刊文献

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,879 篇 工学
    • 2,570 篇 计算机科学与技术...
    • 1,720 篇 软件工程
    • 968 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 355 篇 wireless sensor ...
  • 308 篇 computer network...
  • 254 篇 protocols
  • 249 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 201 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 166 篇 computer securit...
  • 160 篇 network security
  • 158 篇 information secu...
  • 155 篇 internet of thin...
  • 150 篇 distributed comp...
  • 147 篇 computer science
  • 146 篇 cryptography
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,022 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5374 条 记 录,以下是971-980 订阅
排序:
Machine Learning Algorithms to Detect Illicit Accounts on Ethereum Blockchain  23
Machine Learning Algorithms to Detect Illicit Accounts on Et...
收藏 引用
Proceedings of the 7th international conference on Future networks and distributed systems
作者: Chibuzo Obi-Okoli Olamide Jogunola Bamidele Adebisi Mohammad Hammoudeh Department of Computing and Mathematics Manchester Metropolitan University UK Department of Engineering Manchester Metropolitan University UK Information and Computer Science Department King Fahd University of Petroleum and Minerals Saudi Arabia
The rapid growth and psudonomity inherent in blockchain technology such as in Bitcoin and Ethereum has marred its original intent to reduce dependant on centralised system, but created an avenue for illicit activities... 详细信息
来源: 评论
Federated Learning in Malware Detection
Federated Learning in Malware Detection
收藏 引用
international conference on Emerging Technologies and Factory Automation (ETFA)
作者: Dimitrios Serpanos Georgios Xenos Computer Technology Institute and Press DIOPHANTUS & Dept. of Electrical and Computer Engineering University of Patras Patras Greece Computer Technology Institute and Press DIOPHANTUS University of Patras Campus Patras Greece
Malware detection constitutes a fundamental step in safe and secure computational systems, including industrial systems and the Internet of Things (IoT). Modern malware detection is based on machine learning methods t...
来源: 评论
Machine Learning for Cloud-Based DDoS Attack Detection: A Comprehensive Algorithmic Evaluation
Machine Learning for Cloud-Based DDoS Attack Detection: A Co...
收藏 引用
international conference on Confluence The Next Generation Information Technology Summit (Confluence)
作者: Anukriti Naithani Shailendra Narayan Singh Krishna Kant Singh Sushil Kumar Computer Science and Engineering ASET Amity University Noida India Computer Science and Engineering NIT Kurukshetra India
distributed denial of service attacks, in the recent times, have become a critical threat to not only private server connections but also meta scale cloud computing environments. This research paper furnishes a detail...
来源: 评论
Analyzing the Attacks on Blockchain Technologies  2nd
Analyzing the Attacks on Blockchain Technologies
收藏 引用
2nd international conference on Machine Learning, Advances in Computing,Renewable Energy and communication, MARC 2020
作者: Vats, Vinay Kumar Katarya, Rahul Department of Computer Science & Engineering Delhi Technological University Shahbad Daulatpur Delhi110042 India
Blockchain technology has gained significant interest because of a wide variety of possible uses. It was first developed as a Bitcoin cryptocurrency but has since been used in many other business and non-business appl... 详细信息
来源: 评论
A Comparative Analysis of IoT Protocols for Resource Constraint Devices and networks  22
A Comparative Analysis of IoT Protocols for Resource Constra...
收藏 引用
Proceedings of the 6th international conference on Future networks & distributed systems
作者: Sara Holm Mohammad Hammoudeh School of Computing and Mathematics Manchester Metropolitan University United Kingdom Information Computer Science King Fahd University of Petroleum and Minerals Saudi Arabia
Communication standards and protocols are detrimental to the success of any Internet of Things (IoT) system or application. Selecting a communication standard and a suitable middleware or messaging protocol for IoT co... 详细信息
来源: 评论
Demo Abstract: distributed Virtual CPS Environment for K12  20
Demo Abstract: Distributed Virtual CPS Environment for K12
收藏 引用
20th ACM/IEEE international conference on Information Processing in Sensor networks (IPSN)
作者: Stein, Gordon Jean, Devin Ledeczi, Akos Vanderbilt Univ 221 Kirkland Hall Nashville TN 37235 USA
While educational robotics and makerspaces are useful to modern STEM education, they introduce both physical and economic barriers to entry. By creating a simulated, networked environment, we can facilitate instructio... 详细信息
来源: 评论
The Impact of Quantum Computing on security in Emerging Technologies  5
The Impact of Quantum Computing on Security in Emerging Tech...
收藏 引用
5th international conference on Future networks and distributed systems: The Premier conference on Smart Next Generation Networking Technologies, ICFNDS 2021
作者: Abuarqoub, Abdelrahman Abuarqoub, Simak Alzu'bi, Ahmad Muthanna, Ammar Cardiff School of Technologies Cardiff Metropolitan University Cardiff United Kingdom Faculty of Engineering and Technology Liverpool John Moores University Liverpool United Kingdom Department of Computer Science Jordan University of Science and Technology Irbid22110 Jordan Department of Telecommunication Networks and Data Transmission Bonch-Bruevich Saint-Petersburg State University of Telecommunications Saint Petersburg193232 Russia
Quantum computing is rapidly shifting from high-tech lab to mainstream commercial use in the next few years, representing the next breakthrough in modern ICT. It is motivated by quantum computer's ability to perfo... 详细信息
来源: 评论
TON-IoT: Detection of Attacks on Internet of Things in Vehicular networks  6
TON-IoT: Detection of Attacks on Internet of Things in Vehic...
收藏 引用
6th international conference on Electronics, Communication and Aerospace Technology, ICECA 2022
作者: Sharma, Anshika Babbar, Himanshi Sharma, Avinash Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura140401 India Department of Computer Science and Engineering Mullana Haryana Ambala India
During the recent era, due to the exponential rise in the Internet of things (IoT) enabled devices around the globe, IoT and Machine learning (ML) has come out as usable and efficient approach to supply productive sol... 详细信息
来源: 评论
A Multistep Ahead Predictive Analysis of Crude Oil
A Multistep Ahead Predictive Analysis of Crude Oil
收藏 引用
Blockchain and distributed systems security (ICBDS), IEEE international conference on
作者: Srikanta Kumar Mohapatra Kamakhya Narayan Singh Prakash Kumar Sarangi Premananda Sahu Jayashree Mohanty Chitkara University Institute of Engineering and Technology Chitkara University Punjab India School Of Computer Application KIIT Deemed University Odisha India Department Of CSE(AI&ML) Vardhaman College of Engineering and Technology Hyderabad India School of Computer science and Engineering Lovely professional University Punjab India Dept.of AIT-CSE Chandigarh University Mohali Chandigarh Punjab India
The population is increasing in a rapid manner and the number of vehicles is increasing in the same ratio. Also, crude oils are very useful towards the energy needs in the industries. As a result, a day will come when...
来源: 评论
Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control systems  11
Game Theoretical Model for Cybersecurity Risk Assessment of ...
收藏 引用
11th IFIP international conference on New Technologies, Mobility and security, NTMS 2021
作者: Nassar, Mohamed Khoury, Joseph Erradi, Abdelkarim Bou-Harb, Elias Computer Science Department Beirut Lebanon Qatar University College of Engineering Computer Science and Engineering Department Doha Qatar Cyber Center for Security and Analytics United States
Supervisory Control and Data Acquisition (SCADA) and distributed Control systems (DCS) use advanced computing, sensors, control systems, and communication networks to monitor and control industrial processes and distr... 详细信息
来源: 评论