咨询与建议

限定检索结果

文献类型

  • 5,010 篇 会议
  • 280 册 图书
  • 84 篇 期刊文献

馆藏范围

  • 5,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,879 篇 工学
    • 2,570 篇 计算机科学与技术...
    • 1,720 篇 软件工程
    • 968 篇 信息与通信工程
    • 368 篇 电气工程
    • 306 篇 控制科学与工程
    • 182 篇 网络空间安全
    • 126 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 119 篇 安全科学与工程
    • 111 篇 机械工程
    • 102 篇 生物工程
    • 70 篇 建筑学
    • 69 篇 仪器科学与技术
    • 54 篇 生物医学工程(可授...
    • 45 篇 土木工程
    • 43 篇 交通运输工程
  • 614 篇 理学
    • 369 篇 数学
    • 118 篇 生物学
    • 103 篇 系统科学
    • 100 篇 统计学(可授理学、...
    • 84 篇 物理学
  • 488 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 162 篇 工商管理
  • 242 篇 法学
    • 166 篇 法学
    • 82 篇 社会学
  • 78 篇 医学
    • 65 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 51 篇 公共卫生与预防医...
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 41 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 12 篇 文学
  • 1 篇 艺术学

主题

  • 504 篇 security
  • 355 篇 wireless sensor ...
  • 308 篇 computer network...
  • 254 篇 protocols
  • 249 篇 computer archite...
  • 219 篇 intrusion detect...
  • 213 篇 authentication
  • 210 篇 computer communi...
  • 201 篇 ip networks
  • 193 篇 computer crime
  • 172 篇 servers
  • 166 篇 computer securit...
  • 160 篇 network security
  • 158 篇 information secu...
  • 155 篇 internet of thin...
  • 150 篇 distributed comp...
  • 147 篇 computer science
  • 146 篇 cryptography
  • 145 篇 computational mo...
  • 142 篇 internet

机构

  • 25 篇 shandong provinc...
  • 21 篇 key laboratory o...
  • 13 篇 shandong fundame...
  • 12 篇 chitkara univers...
  • 10 篇 information syst...
  • 10 篇 department of co...
  • 9 篇 shandong enginee...
  • 9 篇 king saud univer...
  • 9 篇 school of comput...
  • 9 篇 institute of inf...
  • 8 篇 school of comput...
  • 8 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 department of la...
  • 7 篇 hannam universit...
  • 6 篇 shandong enginee...
  • 6 篇 chinese acad sci...
  • 6 篇 department of el...

作者

  • 17 篇 eyas el-qawasmeh
  • 11 篇 tai-hoon kim
  • 9 篇 hammoudeh mohamm...
  • 9 篇 dominik ślęzak
  • 9 篇 obaidat mohammad...
  • 9 篇 igor kotenko
  • 8 篇 isaac woungang
  • 8 篇 azizah abd manaf
  • 8 篇 mukaddim pathan
  • 7 篇 osvaldo gervasi
  • 7 篇 yanmin zhu
  • 7 篇 mohammad s. obai...
  • 7 篇 barolli leonard
  • 7 篇 lin zhang
  • 7 篇 jasni mohamad za...
  • 7 篇 wei wang
  • 6 篇 klaus wehrle
  • 6 篇 zarai faouzi
  • 6 篇 yunhao liu
  • 6 篇 shahid raza

语言

  • 5,022 篇 英文
  • 321 篇 其他
  • 43 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Security in Computer Networks and Distributed Systems, SNDS 2012"
5374 条 记 录,以下是981-990 订阅
排序:
Deep Learning Approaches for Intrusion Detection with Emerging Cybersecurity Challenges
Deep Learning Approaches for Intrusion Detection with Emergi...
收藏 引用
Sustainable Communication networks and Application (ICSCNA), international conference on
作者: S. Hemalatha M. Mahalakshmi V. Vignesh M. Geethalakshmi D. Balasubramanian Anand A. Jose Department of Electrical and Electronics Engineering St. Joseph's Institute of Technology Chennai India Department of Networking and Communications SRM Institute of Science and Technology India Department of Computer Science and Engineering Karpagam College of Engineering Coimbatore India Department of Mathematics KCG College of Technology Chennai India Department of MCA Jaya Engineering College Chennai India Department of ECE KCG College of Technology Chennai Tamil Nadu India
Intrusion Detection systems (IDS) play a pivotal role in preventing computer networks from an ever-evolving landscape of cybersecurity threats. As cyberattacks become increasingly sophisticated and diversified, the ne...
来源: 评论
A Layered Taxonomy of Internet of Things Attacks  22
A Layered Taxonomy of Internet of Things Attacks
收藏 引用
Proceedings of the 6th international conference on Future networks & distributed systems
作者: Farag Azzedin Ibraheem Alhejri Information and Computer Science Department King Fahd University of Petroleum and Minerals Saudi Arabia
Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. However, ensuring the security of IoT systems is really challenging due to... 详细信息
来源: 评论
An Associated Random Neural Network Detects Intrusions and Estimates Attack Graphs
An Associated Random Neural Network Detects Intrusions and E...
收藏 引用
international Symposium on Modeling, Analysis and Simulation of computer and Telecommunication systems (MASCOTS)
作者: Mert Nakıp Erol Gelenbe Polish Academy of Sciences (IITIS-PAN) Inst. Theoretical & App. Informatics Gliwice PL CNRS I3S Université Côte d’Azur FR Yaşar University Bornova Izmir TR King’s College London UK
Cyberattacks, especially Botnet distributed Denial of Service (DDoS), increasingly target networked systems, compromise interconnected nodes by constantly spreading malware. In order to prevent these attacks in their ... 详细信息
来源: 评论
A Survey on distributed Denial of Service Attack - Detection Mechanisms and Mitigation Mechanisms in the Cloud Environment
A Survey on Distributed Denial of Service Attack - Detection...
收藏 引用
IEEE UP Section conference on Electrical computer and Electronics (UPCON)
作者: Chris Harry Kandikattu Sam Sangeeth Panguluri Sandeep Kumar Suneetha Bulla Abdul Raheem Shaik Department of Computer Science and Engineering Koneru Lakshmaiah Educational Foundations Vijayawada India
It is evident that problems associated with vast amounts of information occur with complicated systems and processes that act collaboratively to provide services. Also, other related issues such as security problems, ...
来源: 评论
A controllable cross-domain anonymous authentication system based on blockchain  6
A controllable cross-domain anonymous authentication system ...
收藏 引用
6th international conference on Futuristic Trends in networks and Computing Technologies, FTNCT 2024
作者: Cheng, Cheng Zhong, Chen Jiang, Weijian School of Cyberspace Security Hainan University Haikou570228 China
There are often multiple independent information systems within an enterprise or between different enterprises. However, due to the differences in security policies and data management methods among different manageme... 详细信息
来源: 评论
Demo Abstract: Hands-On IoT Education with Mobile Devices  20
Demo Abstract: Hands-On IoT Education with Mobile Devices
收藏 引用
20th ACM/IEEE international conference on Information Processing in Sensor networks (IPSN)
作者: Jean, Devin Stein, Gordon Ledeczi, Akos Vanderbilt Univ 221 Kirkland Hall Nashville TN 37235 USA
distributed computing, computer networking, cyber-physical systems and the Internet of Things (IoT) are all around us, yet very little of the underlying concepts are being taught in introductory computer science cours... 详细信息
来源: 评论
Mind the Amplification: Cracking Content Delivery networks via DDoS Attacks  1
收藏 引用
16th international conference on Wireless Algorithms, systems, and Applications (WASA)
作者: Li, Zihao Meng, Weizhi Tech Univ Denmark Dept Appl Math & Comp Sci Lyngby Denmark
A content delivery network (CDN) refers to a geographically distributed network of web servers, aiming to enhance the website performance and reliability, i.e., providing fast delivery of the Internet content. CDN is ... 详细信息
来源: 评论
Analysis of security Problems in Groups of Intelligent Sensors  12th
Analysis of Security Problems in Groups of Intelligent Senso...
收藏 引用
12th international conference on Swarm Intelligence (ICSI)
作者: Grigoryan, Karen Olefirenko, Evgeniya Basan, Elena Lapina, Maria Mecella, Massimo Southern Fed Univ Chekova St 2 Taganrog 347922 Russia North Caucasus Fed Univ Pushkina St 1 Stavropol 355000 Russia Sapienza Univ Rome Via Ariosto 25 I-00185 Rome Italy
Today, the creation of intelligent sensors became possible due to the development of the hardware base, the use of small boards, where the processor, memory, and network interfaces can be placed. Examples of such card... 详细信息
来源: 评论
On Large-Scale Qualitative Spatio-Temporal Constraint Redundancy Removal  16
On Large-Scale Qualitative Spatio-Temporal Constraint Redund...
收藏 引用
16th IEEE international conference on Intelligent systems and Knowledge Engineering, ISKE 2021
作者: Hu, Qiyuan Gao, Yang Long, Zhiguo Wang, Hongjun Li, Tianrui Sioutis, Michael Southwest Jiaotong University School of Computing and Artificial Intelligence Chengdu China University of Bamberg Faculty of Information Systems and Applied Computer Sciences Bamberg Germany
Qualitative spatio-temporal representation and reasoning is an important research direction in the field of artificial intelligence, and qualitative constraint networks are a key tool for representing and reasoning wi... 详细信息
来源: 评论
The Markov Model of the Needham-Schroeder Protocol  25th
The Markov Model of the Needham-Schroeder Protocol
收藏 引用
25th international conference on distributed computer and Communication networks, DCCN 2022
作者: Shukmanova, A.A. Yermakov, A.S. Paltashev, T.T. Mamyrova, A.K. Ziro, A.A. Kazakh National Technical University Almaty Kazakhstan Caspian University Almaty Kazakhstan ITMO University Saint Petersburg Russia Turan University Almaty Kazakhstan
A user-friendly Markov model of procedures for the Needham-Schroeder information security algorithm is developed. To implement the development, auxiliary system models of three asynchronous execution algorithms are us... 详细信息
来源: 评论