咨询与建议

限定检索结果

文献类型

  • 6,718 篇 会议
  • 67 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,830 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,666 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 311 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 14 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,456 篇 英文
  • 271 篇 其他
  • 183 篇 中文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6830 条 记 录,以下是191-200 订阅
排序:
Detection and Analysis of Autism Spectrum Disorder Using Random Forest Classifier  2
Detection and Analysis of Autism Spectrum Disorder Using Ran...
收藏 引用
2nd International conference on Recent Trends in Microelectronics, Automation, Computing, and communications Systems, ICMACC 2024
作者: Zambre, Ganesh Albhar, Harshad Masli, Toukir Patil, Sarita G H Raisoni College of Engineering and Management Department of Computer Engineering Pune India
Autism Spectrum Disorder (ASD) diagnosis is difficult due to its complex and diverse symptomatology. This study focuses on using machine learning, specifically the Random Forest algorithm, to identify ASD. We use a la... 详细信息
来源: 评论
Lanturn: Measuring Economic security of Smart Contracts Through Adaptive Learning  23
Lanturn: Measuring Economic Security of Smart Contracts Thro...
收藏 引用
30th acm SIGSAC conference on computer and communications security (acm CCS)
作者: Babel, Kushal Javaheripi, Mojan Ji, Yan Kelkar, Mahimna Koushanfar, Farinaz Juels, Ari Cornell Tech IC3 New York NY 10044 USA Univ Calif San Diego La Jolla CA 92093 USA
We introduce Lanturn: a general purpose adaptive learning-based framework for measuring the cryptoeconomic security of composed decentralized-finance (DeFi) smart contracts. Lanturn discovers strategies comprising of ... 详细信息
来源: 评论
Research on the application of artificial intelligence in computer network technology based on the era of big data  2
Research on the application of artificial intelligence in co...
收藏 引用
2nd International conference on Artificial Intelligence and Autonomous Robot Systems, AIARS 2023
作者: Chen, Xiangge Tianjin University of Technology Tianjin China
With the arrival of the era of big data, the value of artificial intelligence technology has become more and more prominent, and its application in computer network technology has become more extensive. In practice, t... 详细信息
来源: 评论
An Efficient Cluster Head Selection Method for Enhanced security and Energy Optimization in Wireless Sensor Networks  2
An Efficient Cluster Head Selection Method for Enhanced Secu...
收藏 引用
2nd International conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2024
作者: Kandasamy, Kathirvel Shanmugam, Hemalatha Karpagam Academy of Higher Education Department of Computer Science TamilNadu Coimbatore India
Wireless Sensor Networks (WSNs) consist of sensors that transmit data wirelessly, making energy consumption a critical factor in the overall transmission process. Detecting malicious nodes in WSNs is a significant cha... 详细信息
来源: 评论
2nd International conference on Deep Sciences for Computing and communications, IcondeepCom 2023
2nd International Conference on Deep Sciences for Computing ...
收藏 引用
2nd International conference on Deep Sciences for Computing and communications, IcondeepCom 2023
The proceedings contain 82 papers. The special focus in this conference is on Deep Sciences for Computing and communications. The topics include: Digital Identity System for Real World Asset Using Blockchain;blockchai...
来源: 评论
GROTTO: Screaming fast (2+1)-PC for Z2n via (2,2)-DPFs  30
GROTTO: Screaming fast (2+1)-PC for Z2n via (2,2)-DPFs
收藏 引用
30th acm SIGSAC conference on computer and communications security (acm CCS)
作者: Storrier, Kyle Vadapalli, Adithya Lyons, Allan Henry, Ryan Univ Calgary Calgary AB Canada IIT Kanpur Kanpur Uttar Pradesh India
We introduce GROTTO, a framework and C++ library for space- and time-efficient (2 + 1)-party piecewise polynomial (i.e., spline) evaluation on secrets additively shared over Z(2n). GROTTO improves on the state-of-the-... 详细信息
来源: 评论
Enhancing Cloud security with Deep Learning-Based Intrusion Detection in Cloud Computing Environments  2
Enhancing Cloud Security with Deep Learning-Based Intrusion ...
收藏 引用
2nd International conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Aswini Devi, T. Jain, Arpit Koneru Lakshmaiah Education Foundation Department of Computer Science & Engineering AP Vaddeswaram India GRIET Hyderabad India
Cloud computing (CC) offers a wide range of on-demand resources and services over the internet. However, due to the inherent vulnerability of the cloud's dispersed architecture, guaranteeing the privacy and securi... 详细信息
来源: 评论
An AI-Enabled Smart Healthcare Application for Remote Patient Monitoring System  2
An AI-Enabled Smart Healthcare Application for Remote Patien...
收藏 引用
2nd International conference on Recent Trends in Microelectronics, Automation, Computing, and communications Systems, ICMACC 2024
作者: Abdullah, A Sheik Pooja, A. Poovithazhan, K. Anjali, K. Kavya, R. School of Computer Science and Engineering Vellore Institute of Technology Chennai India Vellore Institute of Technology Chennai India
This research presents a groundbreaking healthcare application aimed at revolutionizing patient care and improving the overall healthcare experience. The application is developed through an extensive research and deve... 详细信息
来源: 评论
Post-quantum cryptography for Multiple high-resolution millimeter wave images for enhanced security in IOT Networks  2
Post-quantum cryptography for Multiple high-resolution milli...
收藏 引用
2nd International conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Govindhan, P. Kumar, K. Puducherry Technological University Electronics and Communication Pondicherry India
In the current era, the exponential rise in security threats is a significant concern, extending beyond the realm of the Internet of Things (IoT). The data being transferred and stored requires a robust encryption and... 详细信息
来源: 评论
Research on security resource allocation algorithm of edge computing based on mobile blockchain  2
Research on security resource allocation algorithm of edge c...
收藏 引用
2nd IEEE International conference on Electrical, Automation and computer Engineering, ICEACE 2024
作者: Wang, Yuhang Chungbuk National University Cheongju Korea Republic of
Blockchain technology is predicted to be one of the key technologies of 6G cellular mobile communication due to its advantages of decentralization, anonymity, openness and immutability. Blockchain technology based on ... 详细信息
来源: 评论