咨询与建议

限定检索结果

文献类型

  • 6,718 篇 会议
  • 67 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,830 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,666 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 311 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 14 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,456 篇 英文
  • 271 篇 其他
  • 183 篇 中文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6830 条 记 录,以下是121-130 订阅
排序:
From Code to Conundrum: Machine Learning's Role in Modern Malware Detection  2
From Code to Conundrum: Machine Learning's Role in Modern Ma...
收藏 引用
2nd International conference on Advancements in Smart, Secure and Intelligent Computing, ASSIC 2024
作者: Jha, Vaibhavi Saxena, Akshat School of Computer Science & Engineering Vellore Institute of Technology Vellore India
In this research paper, we'll be diving into the combination of malware analysis and machine learning to stepup security. Right now, our digital world is like an anthill: connected in every possible way. In this s... 详细信息
来源: 评论
Detection and Prevention of Cyber Threats in Smart Cities Using Machine Learning and Intrusion Detection Systems  2
Detection and Prevention of Cyber Threats in Smart Cities Us...
收藏 引用
2nd International conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2024
作者: Rangani, Himabindu Chandrashekar, K. Aurora University Department of Computer Science and Engineering Telangana Hyderabad India
The increasing interconnectedness of smart cities has led to a surge in cyber threats. This research investigates the application of machine learning (ML) techniques to bolster the security of smart city environments.... 详细信息
来源: 评论
Research on computer Network Information System security Model and Mathematical Evaluation  2
Research on Computer Network Information System Security Mod...
收藏 引用
2nd International conference on Mechatronics, IoT and Industrial Informatics, ICMIII 2024
作者: Liu, Yanwu Beijing Polytechnic Beijing China
This paper firstly proposes a distributed network Information filtering architecture based on multi-level, multi-strategy and scalability. The architecture of this model includes the functions of analyzing, filtering ... 详细信息
来源: 评论
Developing Verifiable Computations and Homomorphic Encryption to Promote Federated Learning  2
Developing Verifiable Computations and Homomorphic Encryptio...
收藏 引用
2nd IEEE International conference on Advances in Information Technology, ICAIT 2024
作者: Maurya, Vikas Kumar, Indrajeet Kumar, Nitin School of CSE Galgotias University Greater Noida India Department of Computer Science & Engineering Graphic Era Hill University Dehradun India Graphic Era Deemed to be University Dehradun248001 India
This paper proposes creative solutions to address security issues in federated learning, particularly regarding malicious nodes and confidentiality protection for the global model. It employs recently created cryptogr... 详细信息
来源: 评论
An enhanced mutual authentication scheme for healthcare systems using Elgamal and ECC  2
An enhanced mutual authentication scheme for healthcare syst...
收藏 引用
2nd IEEE International conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2024
作者: Manickam, Muthukumar Devarajan, Ganesh Gopal Srm Institute of Science and Technology Department of Computer Science and Engineering Delhi-NCR Campus Uttar Pradesh Ghaziabad201204 India
With the advancement and expertise in telecommunications technologies, the World Health Organization utilizes telemedicine systems to offer healthcare services from different distances to perform diagnosis, precaution...
来源: 评论
Hybrid Technique for Constructing Footprint Extraction System from Satellite Imaginary  2
Hybrid Technique for Constructing Footprint Extraction Syste...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Raghavendran, N. Menaga, P. Prabu, V. Vignesh Manimaran, V. Robinson, Y. Harold Ramanan, K. Francis Xavier Engineering College Department of Computer Science and Engineering Tamil Nadu Tirunelveli India Rajalakshmi Engineering College Department Of Computer Science & Business Systems Tamil Nadu Chennai India Bannari Amman Institute of Technology Department of Civil Engineering Tamil Nadu India National Engineering College Department of Information Technology Tamil Nadu Kovilpatti India NPR College of Engineering and Technology Natham Department of Computer Science and Engineering Tamil Nadu Dindigul India
The building extraction of the footprint from the satellite imagination has been a research problem that needs to be solved efficiently. The hybrid semantic segmentation framework is used to increase the footprint ext... 详细信息
来源: 评论
Web Application security Testing Framework using Flask  2
Web Application Security Testing Framework using Flask
收藏 引用
2nd International conference on Applied Artificial Intelligence and Computing, ICAAIC 2023
作者: Rohit, R. Hasan Firnas, I. Abishek, M. Albert Mayan, J. Dhamodaran, S. Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai India
This research presents a novel framework for automated web application security scanning and information gathering using the Axiom methodology. The framework assists organizations and security researchers in identifyi... 详细信息
来源: 评论
Enhancing ATM security: A Finger Vein Biometrics Approach  2
Enhancing ATM Security: A Finger Vein Biometrics Approach
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Ibrahim, Mohammad Mufeez Sujith, Chitram Metilda Florence, S. Rajagopal, Shivapravin SRM Institute of Science and Technology Department of Networking and Communications Kattankulathur India Open Sky IT Services LLC PhoenixAZ85085 United States
The purpose of this study is to highlight a revolutionary real-time embedded finger-vein detection system that was developed for the purpose of enhancing the safety of automated teller machines. The technology takes a... 详细信息
来源: 评论
Smart Lock security System  2
Smart Lock Security System
收藏 引用
2nd IEEE International conference on Advances in Information Technology, ICAIT 2024
作者: Ravikumar, Pushpa Arpitha, C.N. Hemanth, N.G. Department of Computer Science and Engineering Adichunchanagiri Institute of Technology Chikkamagaluru India
With the percentage of single-parent households rising quickly, criminal vulnerability is becoming more of a social issue The main issue is often worry over stranger visiting, especially in the case of single female f... 详细信息
来源: 评论
STC (Sketch To Code)-An Enhanced Html & CSS Autocode Generator from Handwritten Text and Image Using Deep Learning  2
STC (Sketch To Code)-An Enhanced Html & CSS Autocode Generat...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Srinath, R. Siva Prasath, K.R. Varun Raj, S. Vinith, W. Srinivasan, L. Dr. N.G.P. Institute of Technology Department of Computer Science and Engineering India
This paper presents an innovative solution for automating the transformation of hand-drawn sketches into HTML and CSS code. The process unfolds in four distinct phases: Pre-processing optimizes input sketches, Segment... 详细信息
来源: 评论