咨询与建议

限定检索结果

文献类型

  • 6,717 篇 会议
  • 65 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,827 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 503 篇 控制科学与工程
    • 362 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 217 篇 机械工程
    • 200 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,665 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 310 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,139 篇 管理学
    • 678 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 13 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,557 篇 英文
  • 180 篇 中文
  • 167 篇 其他
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6827 条 记 录,以下是91-100 订阅
排序:
Analyzing the Impact of security Measures on Wi-Fi Quality of Service  2
Analyzing the Impact of Security Measures on Wi-Fi Quality o...
收藏 引用
2nd International conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Kopcho, Thomas J. Fouda, Mostafa M. Krome, Cameron J. Quach, Anna T. Olaveson, Israel G. Idaho State University Department of Computer Science PocatelloID United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States Ai Data & Visualization Idaho National Laboratory Idaho FallsID United States
This study examines the relationship between Quality of Service (QoS) and security in Wi-Fi networks. Using a detailed dataset consisting of QoS metrics of file transfers under various security configurations, we anal... 详细信息
来源: 评论
Innovative Method for Camouflaged Wildlife Segmentation in Agricultural Practices  2
Innovative Method for Camouflaged Wildlife Segmentation in A...
收藏 引用
2nd International conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Parab, Mithun Ingle, Palash R.J. College Department of Computer Science Mumbai India Sejong University Computer and Information Security Seoul Korea Republic of
Accurately identifying concealed wildlife, including arachnids, serpents, and arthropods, is paramount for proficient agricultural management. This study introduces a deep learning approach utilizing transformers for ... 详细信息
来源: 评论
Genetic and Decision Tree-Based Secure Data Dissemination Framework for Autonomous Vehicles  2
Genetic and Decision Tree-Based Secure Data Dissemination Fr...
收藏 引用
2nd IEEE International conference on Contemporary Computing and communications, InC4 2024
作者: Patel, Tanisha Jadav, Nilesh Kumar Tanwar, Sudeep Garg, Deepak Institute of Technology Nirma University Department of Comp. Sci. & Engg. Ahmedabad India School of Computer Science and Artificial Intelligence SR University Telangana Warangal India
In this article, we proposed a hybrid model comprising a genetic algorithm and a decision tree for secure data exchange in autonomous vehicles (AVs). The integration of a genetic algorithm enables systematic feature o... 详细信息
来源: 评论
Efficient Approach to Improve the security of PDF Readers Using Transfer Learning for Few Shots Sample Scenario  2
Efficient Approach to Improve the Security of PDF Readers Us...
收藏 引用
2nd International conference on Machine Learning and Autonomous Systems, ICMLAS 2025
作者: Bhardwaj, Sonam Dave, Mayank Dalal, Sumit School of Computer Science Engineering and Technology Bennett University Greater Noida India National Institute of Technology Department of Computer Engineering Kurukshetra India
PDF malware is a significant threat to computer security. The purpose of this study is to introduce a new approach for improving the security of PDF readers. The method utilizes transfer learning by leveraging existin... 详细信息
来源: 评论
Enhanced IoT Data security with Robust AES-CBC Encryption Algorithm  2
Enhanced IoT Data Security with Robust AES-CBC Encryption Al...
收藏 引用
2nd International conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Torad, Mohamed A. Elkassas, Mohamed Abdulhamid Ashour, Ahmed F. Fouda, Mostafa M. El-Mokadem, Eslam Samy Higher Technological Institute Department of Electronics and Communication Eng. 10th of Ramadan City Egypt Idaho State University Department of Electrical and Computer Engineering PocatelloID United States
In the past decade, the proliferation of Internet of Things (IoT) applications and implementations has exhibited exponential growth, concurrent with advancements in technologies such as machine learning and cloud comp... 详细信息
来源: 评论
Theoretical Framework for Integrating IoT and Explainable AI in a Smart Home Intrusion Detection System  2
Theoretical Framework for Integrating IoT and Explainable AI...
收藏 引用
2nd IEEE International conference on Contemporary Computing and communications, InC4 2024
作者: Dixit, Mahi Siby, Swetha Maria Jenefa, J. Vetriveeran, Divya Sambandam, Rakoth Kandan Vinodha, D. CHRIST University Department of Computer Science and Engineering Bengaluru India
Using IoT devices in smart homes brings benefits and security dangers. This study extensively examines various intrusion detection methods within smart home environments. It also suggests a novel hybrid intrusion dete... 详细信息
来源: 评论
Secure and Efficient Mobile DNN Using Trusted Execution Environments  23
Secure and Efficient Mobile DNN Using Trusted Execution Envi...
收藏 引用
18th acm ASIA conference on computer and communications security (ASIA CCS)
作者: Hu, Bin Wang, Yan Cheng, Jerry Zhao, Tianming Xie, Yucheng Guo, Xiaonan Chen, Yingying Rutgers State Univ Piscataway NJ 08855 USA Temple Univ Temple TX USA New York Inst Technol New York NY USA Univ Dayton Dayton OH USA Indiana Univ Purdue Univ Indiana PA USA George Mason Univ Fairfax VA USA
Many mobile applications have resorted to deep neural networks (DNNs) because of their strong inference capabilities. Since both input data and DNN architectures could be sensitive, there is an increasing demand for s... 详细信息
来源: 评论
A Ship Network security Assessment Model  2
A Ship Network Security Assessment Model
收藏 引用
2nd Asia conference on Electrical, Power and computer Engineering, EPCE 2023
作者: Xin, Liu China Agricultural University Beijing China
At present, the new era needs a method that can accurately guide maritime personnel to evaluate ship network security, so this paper constructs a ship network security evaluation method to analyze different indicators... 详细信息
来源: 评论
A Review of Blockchain based Decentralised Authentication Solutions and their improvement through Metamask  2
A Review of Blockchain based Decentralised Authentication So...
收藏 引用
2nd International conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Khan, Andleeb Nand, Parma Bhushan, Bharat Hameed, Alaa Ali Jamil, Akhtar Sharda School of Engineering & Technology Department of Computer Science & Engineering Greater Noida India Istinye University Department of Computer Engineering Istanbul Turkey National University of Computer and Emerging Sciences Department of Computer Science Islamabad Pakistan
With the advancing technology, it becomes difficult to cope up with novel trends and configurations. Similarly, it is difficult to secure the systems against each emerging threat. With this the loopholes in convention... 详细信息
来源: 评论
Quantum Encrypted Messaging Application: Harnessing Quantum Mechanics for Secure Communication  2
Quantum Encrypted Messaging Application: Harnessing Quantum ...
收藏 引用
2nd IEEE International conference on Device Intelligence, Computing and Communication Technologies, DICCT 2024
作者: Gabriela Sharon, R. Kumar, Aswin Sanil Mayan, Albert Catharine, A. Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai India
This research aims to develop a quantum encrypted messaging application that uses the principles of quantum mechanics to provide secure and privacy communication between users This project focuses on using quantum enc... 详细信息
来源: 评论