咨询与建议

限定检索结果

文献类型

  • 6,717 篇 会议
  • 67 册 图书
  • 43 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,828 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,597 篇 工学
    • 5,010 篇 计算机科学与技术...
    • 3,741 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,665 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 310 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 13 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,559 篇 英文
  • 180 篇 中文
  • 166 篇 其他
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6828 条 记 录,以下是101-110 订阅
排序:
Privacy Preservation Techniques in Smart Grids: Balancing security and Utility in IoT-Driven Environments  2
Privacy Preservation Techniques in Smart Grids: Balancing Se...
收藏 引用
2nd International conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Abdelraouf, Hussien Long, Michael Tran, Paul Baral, Luna Khan, Zuha Mahmoud, Mohamed Fouda, Mostafa M. Ibrahem, Mohamed I. Augusta University School of Computer and Cyber Sciences AugustaGA30912 United States George Mason University Cyber Security Engineering Department FairfaxVA United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States
The Internet of Things (IoT) has significantly impacted the energy industry, leading to increased reliance on smart grid (SG) technology. However, integrating electricity with the internet introduces security vulnerab... 详细信息
来源: 评论
Email Protection in the Digital Age: Evaluating Symmetric Cryptographic Algorithms  2
Email Protection in the Digital Age: Evaluating Symmetric Cr...
收藏 引用
2nd IEEE International conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2024
作者: Sangeetha, V. Rokhade, Komal S. Vijayalakshmi, N.B. Ramaiah Institute of Technology Department of Cse Bangalore India
Nowadays, digital data interaction plays an increasingly pivotal role across various industries. Ensuring the security of information during data storage and transmission is of paramount importance. Cryptography serve... 详细信息
来源: 评论
Identification of Financial Fraud in Listed Companies Based on Bayesian-LightGBM Model  24
Identification of Financial Fraud in Listed Companies Based ...
收藏 引用
2nd International conference on Artificial Intelligence, Systems and Network security, AISNS 2024
作者: Zhao, Runtong Zhang, Li Li, Zhuosong School of Computer Science Beijing Information Science and Technology University Beijing Beijing China
In line with the priorities outlined in the 20th Party Congress report, which emphasizes enhancing financial supervision and mitigating systemic risks, this paper introduces a Bayesian-optimized LightGBM model for imp... 详细信息
来源: 评论
Evaluating the security Posture of Real-World FIDO2 Deployments  23
Evaluating the Security Posture of Real-World FIDO2 Deployme...
收藏 引用
30th acm SIGSAC conference on computer and communications security (acm CCS)
作者: Kuchhal, Dhruv Saad, Muhammad Oest, Adam Li, Frank Georgia Inst Technol Atlanta GA 30332 USA PayPal Inc Scottsdale AZ USA
FIDO2 is a suite of protocols that combines the usability of local authentication (e.g., biometrics) with the security of public-key cryptography to deliver passwordless authentication. It eliminates shared authentica... 详细信息
来源: 评论
Efficient Breast Cancer Detection using Lightweight Multimodal Approach  2
Efficient Breast Cancer Detection using Lightweight Multimod...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Kaladevi, P. Vivekananthan, P. Sanjith, B. Praveen, S.V. K. S. Rangasamy College of Technology Department of Computer Science and Engineering Tiruchengode637 215 India
In the realm of breast cancer detection, the pursuit of efficiency and accuracy remains paramount. This paper explores the integration of lightweight multimodal approaches to enhance the efficacy of breast cancer dete... 详细信息
来源: 评论
Intrusion Detection System Using Generative Adversarial Network (GAN)  2
Intrusion Detection System Using Generative Adversarial Netw...
收藏 引用
2nd International conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Antony Sophia, N. Sivasai, A.S.V. Sachin, S. SRM Institute of Science & Technology Department of Computational Intelligence Kattankulathur Chennai India
Network attacks are effectively noticed with helping from Viagra Detection Systems, which are based on washing machine learning algorithms. Because technology development, the next algorithm has been showing to be les... 详细信息
来源: 评论
Assessment and Prediction of Enterprise’s Innovation Capability Based on Variational AutoEncoder and Long Short-Term Memory Network  24
Assessment and Prediction of Enterprise’s Innovation Capabi...
收藏 引用
2nd International conference on Artificial Intelligence, Systems and Network security, AISNS 2024
作者: Chen, Zhisen Zhang, Xiaochen Tang, Lingling College of Computer and Cyber Security Fujian Normal University Fujian Fuzhou China School of Economics and Trade Guangdong University of Foreign Studies Guangdong Guangzhou China
Under the background of innovation capability as the key driving force of enterprise development, this paper proposes an enterprise innovation capability assessment and prediction method based on Variational AutoEncod... 详细信息
来源: 评论
Water quality PH prediction study based on improved Ceemdan and RLNNA  24
Water quality PH prediction study based on improved Ceemdan ...
收藏 引用
2nd International conference on Artificial Intelligence, Systems and Network security, AISNS 2024
作者: Xie, Bingshu Zhang, Kuo An, Hongsen Liao, Jiacheng School of Computer Science Engineering Tianjin University of Technology Tianjin China School of Electrical Engineer Automation Tianjin University of Technology Tianjin China
In recent years, water quality Ph detection has gradually become a hot spot. However, the existing classical models in the field of water quality prediction, such as machine learning and deep learning, have insufficie... 详细信息
来源: 评论
Advancing 3D Face Morphing Detection Via Synthetic Data and Deep Neural Network  2
Advancing 3D Face Morphing Detection Via Synthetic Data and ...
收藏 引用
2nd International conference on Machine Learning and Autonomous Systems, ICMLAS 2025
作者: Malathi, P. Manobala, P. Suwetha, B. Simiyon, J. KIT-Kalaignarkarunanidhi Institute of Technology Dept of Computer Science Tamil Nadu India
Face morphing attacks have posed great threats to the security of biometrics by mixing face features with the intention of passing identity verifications. In this regard, most of the current detection methods usually ... 详细信息
来源: 评论
A Machine Learning Approach for Recommending Soil Nutrient Levels  2
A Machine Learning Approach for Recommending Soil Nutrient L...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Anitha, R. Ramathilagam, A. Jeyavelan, M. Pandi, C. Karthi Karthieswaran, R.A. P.S.R Engineering College Department of Computer Science and Engineering Tamilnadu Sivakasi India
India's coastal state of Tamil Nadu is confronted with difficulties in agriculture as a result of climate-related variables and unpredictability. Even though both the people and the area are expanding, there is no... 详细信息
来源: 评论