咨询与建议

限定检索结果

文献类型

  • 6,717 篇 会议
  • 65 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,827 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 503 篇 控制科学与工程
    • 362 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 217 篇 机械工程
    • 200 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,665 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 310 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,139 篇 管理学
    • 678 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 13 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,557 篇 英文
  • 180 篇 中文
  • 167 篇 其他
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6827 条 记 录,以下是11-20 订阅
排序:
Improving Biometric security Using PulsePrint: Real-Time Defense Against Fingerprint Spoofing  2
Improving Biometric Security Using PulsePrint: Real-Time Def...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Vigneshwaran, P. Maranco, M. Ivaturi, Kashyapa Abhiram Takur, Purab Acharya University Department of Computer Science and Engineering Karakul Bukhara Uzbekistan SRM Institute of Science and Technology School of Computing Faculty of Engineering and Technology Department of Networking and Communications Chengalpattu Kattankulathur603203 India
Biometric authentication systems have become increasingly popular due to their convenience and perceived security benefits. However, traditional biometric modalities such as fingerprint recognition are vulnerable to s... 详细信息
来源: 评论
Research on the detection and analysis of weak signals with low SNR based on the Welch algorithm  24
Research on the detection and analysis of weak signals with ...
收藏 引用
2nd International conference on Communication Networks and Machine Learning, CNML 2024
作者: Wu, Bin Zhang, Wanqing Zhang, Jun Yu, Jing Huangfu, Taoyu Hebei Key Laboratory of Marine Perception Network and Data Processing School of Computer and Communication Engineering Northeastern University at Qinhuangdao Hebei Qinhuangdao China Southeast University Jiangsu Nanjing China
Submarines are vital for military defense and national security in strategic communication systems. Power Spectral Density (PSD) characterizes signal spectrum frequency dependence and is crucial for analyzing broadban... 详细信息
来源: 评论
proceedings of 2024 2nd International conference on Artificial Intelligence, Systems and Network security, AISNS 2024
Proceedings of 2024 2nd International Conference on Artifici...
收藏 引用
2nd International conference on Artificial Intelligence, Systems and Network security, AISNS 2024
The proceedings contain 57 papers. The topics discussed include: water quality pH prediction study based on improved Ceemdan and RLNNA;research on the military application and development suggestions of artificial int...
来源: 评论
Smart Wildlife security: Fog-Powered Video Compression for Cloud Efficiency  2
Smart Wildlife Security: Fog-Powered Video Compression for C...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Hore, Shayan Achari, Silpi Kartheek Pradeep, Chinta Deepa Thilak, K. SRM Institute of Science and Technology Dept of Networking and Communications Chengalpet Kattankulathur India
To address the pressing issue of wild animal incursions in rural areas, we propose an inventive solution to safeguard local communities, the project integrates fog computing and smart video compression. The system rec... 详细信息
来源: 评论
Enhancing security: A Hybrid Encryption Algorithm for Effective Key Generation  2
Enhancing Security: A Hybrid Encryption Algorithm for Effect...
收藏 引用
2nd International conference on Recent Trends in Microelectronics, Automation, Computing, and communications Systems, ICMACC 2024
作者: Jacob, Jeevan John Kiran, P.S. Shenoy, Jaigovind B Basavaraju, Sagar Amrita School of Computing Department of Computer Science and Engineering Bengaluru India Amrita School of Engineering Department of Electronics and Communication Engineering Bengaluru India
The abstract Data security is of most importance, in the present day- the introduction of high-level wireless communication channels has led to generation and transfer of massive amounts of data. Data security must ke... 详细信息
来源: 评论
Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities  19
Camel: E2E Verifiable Instant Runoff Voting without Tallying...
收藏 引用
19th acm Asia conference on computer and communications security (acm AsiaCCS)
作者: Harrison, Luke Bag, Samiran Hao, Feng Univ Warwick Warwick England
Instant Runoff Voting (IRV) is one example of ranked-choice voting. It provides many known benefits when used in elections, such as minimising vote splitting, ensuring few votes are wasted, and providing resistance to... 详细信息
来源: 评论
Quantum-Safe Account Recovery for WebAuthn  19
Quantum-Safe Account Recovery for WebAuthn
收藏 引用
19th acm Asia conference on computer and communications security (acm AsiaCCS)
作者: Stebila, Douglas Wilson, Spencer Univ Waterloo Waterloo ON Canada
WebAuthn is a passwordless authentication protocol which allows users to authenticate to online services using public-key cryptography. Users prove their identity by signing a challenge with a private key, which is st... 详细信息
来源: 评论
Securing Smart Networks and Privacy Intrusion Detection System Utilizing Blockchain and Machine Learning  2
Securing Smart Networks and Privacy Intrusion Detection Syst...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Gnana Jeslin, J. Uma Maheswari, G. Amutha, S. Vargheese, M. Rajeshkumar, C. Valarmathi, S. RMK College of Engineering and Technology Department of Computer Science and Engineering Pudhuvayal Tamil Nadu Chennai India Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India PSN College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Tirunelveli India Sri Krishna College of Technology Department of Information Technology Tamil Nadu Coimbatore India
The digital landscape is facing threats from malicious actors, including malware, phishing, ransomware, and distributed denial-of-service attacks. This article introduces the Hybrid Intelligent Random Forest (HIRF) me... 详细信息
来源: 评论
proceedings - 2nd International conference on Advancement in Computation and computer Technologies, InCACCT 2024
Proceedings - 2nd International Conference on Advancement in...
收藏 引用
2nd International conference on Advancement in Computation and computer Technologies, InCACCT 2024
The proceedings contain 164 papers. The topics discussed include: watch product categorization through Conv2D sequential covolutional neural network with truncated normal kernel initializer;tweeting the blues: leverag...
来源: 评论
EffTEE: Efficient Image Classification and Object Detection on Mobile Devices Using Trusted Execution Environments
收藏 引用
IEEE Access 2025年 13卷 31423-31441页
作者: Hu, Bin You, Junyong Huang, Kuan Xu, Meng Liu, Dan Ma, Sugang Kean University Department of Computer Science and Technology UnionNJ07083 United States NORCE Norwegian Research Centre Bergen5008 Norway Kean University Department of Management UnionNJ07083 United States Xi'an University of Posts and Telecommunications School of Computer Science and Technology Xi'an710122 China
Deep neural networks (DNNs) play a crucial role in image classification and object detection, with applications in autonomous driving, security, Unmanned AerialVehicle (UAV) navigation, and robotics. Ensuring secure e... 详细信息
来源: 评论