咨询与建议

限定检索结果

文献类型

  • 6,718 篇 会议
  • 67 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,830 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,666 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 311 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 14 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,456 篇 英文
  • 271 篇 其他
  • 183 篇 中文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6830 条 记 录,以下是151-160 订阅
排序:
A Comprehensive Analysis of Cloud Computing in Wireless communications  2
A Comprehensive Analysis of Cloud Computing in Wireless Comm...
收藏 引用
2nd International conference on Disruptive Technologies, ICDT 2024
作者: Bansal, Anurag Sharma, Surbhi Shukla, Ajay Narayan Badhoutiya, Arti Research and Technology 13D Research & Strategy India Abes Engineering College Department of Computer Applications UP Ghaziabad India Computer Science & Engineering Graphic Era Hill University Uttarakhand Dehradun India Gla University Department of Electrical Engineering UP Mathura India
In the present-day digital landscape, cloud computing has grown to be a ubiquitous generation that offers numerous advantages to numerous businesses. Its software in wi-fi communications has had a mainly revolutionary... 详细信息
来源: 评论
MediLocker: Centralized Electronic Health Records System  2
MediLocker: Centralized Electronic Health Records System
收藏 引用
2nd International conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Harini, N. Karishma, R.S. Pranav, M. Duvvuri, Ananya Akhil, Marrivada Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Coimbatore India
The transition from traditional paper-based patient records to advanced digital formats has not been without its challenges. While Electronic Health Records (EHRs) offer instantaneous access to detailed patient health... 详细信息
来源: 评论
FG-PIH: A Fusion of Fresnelet Transform and Gradient Directional Pattern for Perceptual Image Hashing  2
FG-PIH: A Fusion of Fresnelet Transform and Gradient Directi...
收藏 引用
2nd International conference on Recent Trends in Microelectronics, Automation, Computing, and communications Systems, ICMACC 2024
作者: Meesala, Pavani Thounaojam, Dalton Meitei Computer Science and Engineering National Institute of Technology Silchar Computer Vision Laboratory Silchar India
Perceptual image hashing is pivotal in various image processing applications, including image authentication, content-based image retrieval, tampered image detection, and copyright protection. This paper proposes a no... 详细信息
来源: 评论
Towards a Pervasive Paradigm: Enabeling Patients Privacy Through Decentralized Identity and Data Control in E-Health  2
Towards a Pervasive Paradigm: Enabeling Patients Privacy Thr...
收藏 引用
2nd International conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Muharif, Mohammed H. Al Ahmed, Shakeel CCSIT King Faisal University Computer Science Department Alhassa Saudi Arabia
Patient care has certainly enriched by implementing digitalization in healthcare. This digital transformation has posed obstacles with data security and privacy. By the introduction of e-health, huge volumes of sensit... 详细信息
来源: 评论
Demand Response in Smart Grids: Challenges, Solutions, and security Implications  2
Demand Response in Smart Grids: Challenges, Solutions, and S...
收藏 引用
2nd International conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Abdelraouf, Hussien Gogolkiewicz, Ryker Kim, Nathaniel McCaughan, Nicholas Alanes, Joel Nadhaif, Ali Fouda, Mostafa M. Ibrahem, Mohamed I. Augusta University School of Computer and Cyber Sciences AugustaGA30912 United States George Mason University Cyber Security Engineering Department FairfaxVA United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States
This paper discusses demand response (DR) in the context of smart grids (SGs). DR is a method of controlling electricity consumption and production, usually for financial and security reasons. The topics covered inclu... 详细信息
来源: 评论
CacheFX: A Framework for Evaluating Cache security  23
CacheFX: A Framework for Evaluating Cache Security
收藏 引用
18th acm ASIA conference on computer and communications security (ASIA CCS)
作者: Genkin, Daniel Kosasih, William Liu, Fangfei Trikalinou, Anna Unterluggauer, Thomas Yarom, Yuval Georgia Inst Technol Atlanta GA 30332 USA Univ Adelaide Adelaide Australia Intel Labs Hillsboro OR USA Microsoft Seattle WA USA Intel Labs Villach Austria Ruhr Univ Bochum Bochum Germany
Over the last two decades, the danger of sharing resources between programs has been repeatedly highlighted. Multiple side-channel attacks, which seek to exploit shared components for leaking information, have been de... 详细信息
来源: 评论
Discussion on the Optimization and Integration of computer Application Intelligent Computing Technology and Information Digitization  2
Discussion on the Optimization and Integration of Computer A...
收藏 引用
2nd International conference on Data Analytics, Computing and Artificial Intelligence, ICDACAI 2023
作者: Chen, Lijuan Shandong University of Political Science and Law Shandong Jinan250014 China
Under the background of the era of network information, the optimization and integration of computer application technology and information management has an important value significance in providing guarantee for ent... 详细信息
来源: 评论
A Lightweight PUF-Based Authentication Protocol for M2M communications in Industrial IoT  24
A Lightweight PUF-Based Authentication Protocol for M2M Comm...
收藏 引用
14th International conference on Communication and Network security, ICCNS 2024
作者: Fan, Jingxuan Tu, Shanshan Wang, Haoran Liu, Ziyang College of Computer Science Beijing University of Technology Beijing China
In the Industrial Internet of Things (IIoT) landscape, machine-to-machine (M2M) communication is extensively employed, allowing IoT devices to interact autonomously without human intervention. Despite its benefits, M2... 详细信息
来源: 评论
A MultiLayer BlockChain Based Framework for Internet of Things  2
A MultiLayer BlockChain Based Framework for Internet of Thin...
收藏 引用
2nd International conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering, ETECTE 2023
作者: Fatima, Sameen Hussain, Shafiq Din, Badar Ul Shehzadi, Nimra Sajjad, Waseem Ali, Rashid University of Engineering and Technology Department of Computer Science Lahore Pakistan University of Sahiwal Department of Computer Science Sahiwal Pakistan Comsats University Islamabad Sahiwal Campus Department of Computer Science Pakistan
With the increasing use of smart devices in IoT networks, ensuring security in communications between these devices has become a major challenge. Blockchain technology, known for its decentralized and secure nature, h... 详细信息
来源: 评论
Generative Adversarial Networks for IoT security: A Convolutional Neural Network Approach  2
Generative Adversarial Networks for IoT Security: A Convolut...
收藏 引用
2nd IEEE Virtual conference on communications, VCC 2024
作者: Fernandez, Brandon Noor, Hafiz Yasir Woungang, Isaac Carvalho, Glaucio H.S. Brock University Department of Computer Science St. CatharinesON Canada Toronto Metropolitan University Department of Computer Science TorontoON Canada Brock University Department of Computer Science and Engineering St. CatharinesON Canada
The integration of Internet of Things (IoT) devices across various sectors has brought significant advancements but has also heightened security vulnerabilities. To address these challenges, it is essential to develop... 详细信息
来源: 评论