咨询与建议

限定检索结果

文献类型

  • 6,676 篇 会议
  • 44 篇 期刊文献
  • 25 册 图书
  • 1 篇 学位论文

馆藏范围

  • 6,746 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,588 篇 工学
    • 5,003 篇 计算机科学与技术...
    • 3,738 篇 软件工程
    • 1,718 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 362 篇 安全科学与工程
    • 357 篇 生物工程
    • 323 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 226 篇 网络空间安全
    • 216 篇 机械工程
    • 198 篇 仪器科学与技术
    • 182 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,664 篇 理学
    • 926 篇 数学
    • 393 篇 生物学
    • 310 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,137 篇 管理学
    • 676 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 421 篇 法学
    • 241 篇 社会学
    • 193 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 60 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 48 篇 computer science
  • 46 篇 big data
  • 45 篇 computer archite...
  • 45 篇 computer securit...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 13 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...
  • 8 篇 georgia inst tec...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,476 篇 英文
  • 180 篇 中文
  • 167 篇 其他
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6746 条 记 录,以下是1-10 订阅
排序:
SaTS '24: The 2nd acm Workshop on Secure and Trustworthy Superapps  24
SaTS '24: The 2nd ACM Workshop on Secure and Trustworthy Sup...
收藏 引用
31st conference on computer and communications security
作者: Lin, Zhiqiang Xing, Luyi Ohio State Univ Columbus OH 43210 USA Indiana Univ Bloomington IN 47405 USA
Mobile super apps are revolutionizing mobile computing by offering diverse services through integrated "miniapps", creating comprehensive ecosystems akin to app stores like Google Play and Apple's App St... 详细信息
来源: 评论
RICSS'24: 2nd International Workshop on Re-design Industrial Control Systems with security  24
RICSS'24: 2nd International Workshop on Re-design Industrial...
收藏 引用
31st conference on computer and communications security
作者: Sun, Ruimin Zhang, Mu Florida Int Univ Miami FL 33199 USA Univ Utah Salt Lake City UT 84112 USA
Industrial Control System (ICS) and its software touches every aspect of the critical infrastructure used by our industry, academia, and government. Back in the days, these systems and software were not designed with ... 详细信息
来源: 评论
Investigation of Data Interception and its Vulnerabilities in HTTP and HTTPS networks through Packet Sniffers  2
Investigation of Data Interception and its Vulnerabilities i...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Matthew Samuel Raj, A. Shiny Priyadarshini, J. Minnie, D. Madras Christian College Department of Computer Science Chennai India
Packet analysis is a decisive process in the field of networks and cybersecurity. It is indispensable to maintain the reliability, security and performance of computer networks. Packet sniffers, also known as network ... 详细信息
来源: 评论
WPES '23: 22nd Workshop on Privacy in the Electronic Society  23
WPES '23: 22nd Workshop on Privacy in the Electronic Society
收藏 引用
30th acm SIGSAC conference on computer and communications security (acm CCS)
作者: Knijnenburg, Bart P. Papadimitratos, Panagiotis Clemson Univ Clemson SC 29631 USA KTH Royal Inst Technol Stockholm Sweden
These proceedings contain the papers selected for inclusion in the technical program for the 22st acm Workshop on Privacy in the Electronic Society (acm WPES 2023), held in conjunction with the 30th acm conference on ... 详细信息
来源: 评论
CSCS '24-Cyber security in CarS Workshop  24
CSCS '24-Cyber Security in CarS Workshop
收藏 引用
31st conference on computer and communications security
作者: Fritz, Mario Krauss, Christoph Hof, Hans-Joachim CISPA Helmholtz Ctr Informat Secur Saarbrucken Germany Darmstadt Univ Appl Sci Darmstadt Germany Tech Hsch Ingolstadt CARISSMA Inst Elect Connected & Secure Mobil Ingolstadt Germany
The increasing attack surface of modern cars and the new regulatory requirements for cybersecurity (like UNECE R155) made cybersecurity an important part of car design. The "CSCS'24 Cyber security in Cars Wor... 详细信息
来源: 评论
Rule and Encryption based Secure Routing for Internet of Vehicle Networks  2
Rule and Encryption based Secure Routing for Internet of Veh...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Anand, M. Muthurajkumar, S. Selvi, M. Thangaramya, K. Svn, Santhosh Kumar Kannan, A. Anna University Madras Institute of Technolog Department of Computer Technology Chennai India Vellore Institute of Technology School of Computer Science and Engineering Vellore India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
The Internet of Vehicles (IoV) has become one challenging communication technology in the current internet world. IoV enables real-time data exchange between vehicles, road infrastructures, and mobile communication de... 详细信息
来源: 评论
POSTER: MalaQ - A Malware Against Quantum computer  19
POSTER: MalaQ - A Malware Against Quantum Computer
收藏 引用
19th acm Asia conference on computer and communications security (acm AsiaCCS)
作者: Wang, Siyi Jin, Alex Deb, Suman Dutta, Tarun Mukherjee, Manas Chattopadhyay, Anupam Nanyang Technol Univ Singapore Singapore Natl Univ Singapore Singapore Singapore ASTAR Inst Mat Res & Engn IMRE Singapore Singapore
Quantum computers are set to revolutionize multiple application domains, including financial portfolio optimization, drug discovery, supply chain optimization, and cryptography, by offering algorithmic speed-up over t... 详细信息
来源: 评论
Blockchain Technology for Enhancing Trust and security in Mobile Networks  2
Blockchain Technology for Enhancing Trust and Security in Mo...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Vadakkethil Somanathan Pillai, Sanjaikanth E. Pawar, Priyanka University Of North Dakota School of Electrical Engineering and Computer Science Grand ForksND United States University of the Cumberlands Dept. of Information Technology WilliamsburgKY United States
Blockchain technology, the backbone of popular cryptocurrencies like Bitcoin, has garnered massive interest in recent years for its capability to revolutionize traditional economic structures. However, Blockchain appl... 详细信息
来源: 评论
Intense Triad Defender for End-User security in Cyber Physical System  2
Intense Triad Defender for End-User Security in Cyber Physic...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Sheryl Sharon, G. Maranco, M. Nidhya, R. Sivakumar, M. Coimbatore Institute of Technology Department of Computer Science and Engineering Coimbatore641014 India SRM Institute of Science and Technology School of Computing Faculty of Engineering and Technology Department of Networking and Communications Kattankulathur603203 India Madanapalle Institute of Technology and Science Department of Computer Science and Engineering Andhra Pradesh Madanapalle India
The rapid advancement of technology has undoubtedly brought comfort to humanity, but it also necessitates robust authentication measures to ensure security in the ever-expanding e-world. This research aims to address ... 详细信息
来源: 评论
DNS Enhancement with DNSSEC and DoT for Enhanced Online security  2
DNS Enhancement with DNSSEC and DoT for Enhanced Online Secu...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Abirami, S. Naresh, R. SRM Institute of Science and Technology Department of Networking and Communications Tamilnadu Chennai603 203 India
DNS cache poisoning, also known as DNS spoofing, remains a significant cybersecurity threat, allowing attackers to manipulate DNS caches to redirect users to malicious websites. This paper delves into the mechanisms o... 详细信息
来源: 评论