咨询与建议

限定检索结果

文献类型

  • 6,718 篇 会议
  • 67 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,830 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,666 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 311 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 14 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,456 篇 英文
  • 271 篇 其他
  • 183 篇 中文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6830 条 记 录,以下是201-210 订阅
排序:
Poster: M2ASK : A Correlation-Based Multi-Step Attack Scenario Detection Framework Using MITRE ATT&CK Mapping  24
Poster: M<SUP>2</SUP>ASK : A Correlation-Based Multi-Step At...
收藏 引用
31st conference on computer and communications security
作者: Meng, Qiaoran Oo, Nay Jiang, Yuning Lim, Hoon Wei Sikdar, Biplab Natl Univ Singapore Singapore Singapore NCS Cyber Special Ops R&D Singapore Singapore
Traditional Network Intrusion Detection Systems (NIDS) often generate large volumes of alerts with redundancies and false positives, incapable of correlating detected attack actions. This adds difficulty for security ... 详细信息
来源: 评论
End-to-End Secure Video Streaming Using Homomorphic Encryption Techniques  2
End-to-End Secure Video Streaming Using Homomorphic Encrypti...
收藏 引用
2nd International conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Darwich, Mahmoud Khalil, Kasem Bayoumi, Magdy University of Mount Union Department of Mathematics and Computer Science AllianceOH44601 United States University of Mississippi University Department of Electrical and Computer Engineering MS38677 United States University of Louisiana Department of Electrical and Computer Engineering LafayetteLA70504 United States
In the rapidly evolving landscape of digital media, video streaming has become a ubiquitous method of content delivery. However, the increasing sophistication of cyber threats poses significant risks to the security a... 详细信息
来源: 评论
Optimizing Urban Waste Data Collection via IoT Network: ABC Algorithm-Based Approach  24
Optimizing Urban Waste Data Collection via IoT Network: ABC ...
收藏 引用
2nd International conference on communications, Computing and Artificial Intelligence, CCCAI 2024
作者: Alghamdi, Mansoor Abdallah, Wajih Dept. of Computer Sciences Applied College University of Tabuk Tabuk Saudi Arabia
The increasing amount of solid waste, driven by population growth, particularly in urban areas, poses a significant challenge for local governments, impacting important aspects of our standard of living such as socio-... 详细信息
来源: 评论
Automated Implementation of a TCPDUMP Solution for Network Traffic Analysis, Strengthening Digital security in Cyberspace  2
Automated Implementation of a TCPDUMP Solution for Network T...
收藏 引用
2nd International conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2024
作者: Colca-Mendoza, Jhoel Auccahuasi, Wilver Universidad Continental Huancayo Peru
The advance of information technology gave rise to new information and communication technologies, providing a conjunctural environment to cyberspace (Internet). This constitutes the fifth domain of human interaction ... 详细信息
来源: 评论
Drone Regulation: Decentralized Registration Framework with Blockchain Technology  2
Drone Regulation: Decentralized Registration Framework with ...
收藏 引用
2nd International conference on Advanced Computing and Communication Technologies, ICACCTech 2024
作者: Thapa, Sashank Kholiya, Gaurav Sharma, Vikrant Vats, Satvik Computer Science & Engineering Graphic Era Hill University Dehradun India Computer Science & Engineering Graphic Era Hill University Graphic Era Deemed to be University Dehradun India
This paper presents a set of protocols, a decentralized application (dApp), and a robust smart contract built in Solidity to simplify drone registration and automate ownership transfer using blockchain networks. Unman... 详细信息
来源: 评论
Election Method of Notary Group Based on Block-out Memory  2
Election Method of Notary Group Based on Block-out Memory
收藏 引用
2nd International conference on Mechatronics, IoT and Industrial Informatics, ICMIII 2024
作者: Huang, Xiaoyu Tan, Minsheng University of South China School of Computer Hengyang China
In the cross-chain notary mechanism, a notary is usually an an independent node, institution or organization, and verifies, signs and confirms cross-chain transactions through technical means such as cryptography algo... 详细信息
来源: 评论
What Did Come Out of It? Analysis and Improvements of DIDComm Messaging  24
What Did Come Out of It? Analysis and Improvements of DIDCom...
收藏 引用
31st conference on computer and communications security
作者: Badertscher, Christian Banfi, Fabio Diaz, Jesus IOG Zurich Switzerland Zurich Univ Appl Sci Winterthur Switzerland Zuhlke Engn AG Schlieren Switzerland IOG Madrid Spain
Self-Sovereign Identity (SSI) empowers individuals and organizations with full control over their data. Decentralized identifiers (DIDs) are at its center, where a DID contains a collection of public keys associated w... 详细信息
来源: 评论
Blockchain Technology for Medical Records security Using Fit Viability Approach  2
Blockchain Technology for Medical Records Security Using Fit...
收藏 引用
2nd International conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Agrawal, Rashi Patil, Kanchan Pranay Symbiosis Centre for Information Technology Pune India
For patients, accurate and comprehensive medical records are an incredible asset. During medical services, privacy protection and the integrity of sensitive medical information are critical concerns. Blockchain techno... 详细信息
来源: 评论
Machine Learning: Image Authentication Based using 3-Level security System  2
Machine Learning: Image Authentication Based using 3-Level S...
收藏 引用
2nd International conference on Advancements in Smart, Secure and Intelligent Computing, ASSIC 2024
作者: Kiran, Ajmeera Naik, S.K. Lokesh Kamesh, D.B.K. Rathula, Srinivas Mohanty, Jnyana Ranjan Mlr Institute of Technology Department of Computer Science and Engineering Hyderabad Dundigal India Malla Reddy Engineering College for Women Department of Cse India B.V. Raju Institute of Technology Department of Information Technology Narsapur India Kalinga Institute of Industrial Technology University India
Users using computers need passwords in order to be authenticated. There are many unsuccessful ways of identification. Voice recognition makes use of both physical and behavioural characteristics, in contrast to writt... 详细信息
来源: 评论
AI-Driven security Enhancements in Wireless Sensor Networks  2
AI-Driven Security Enhancements in Wireless Sensor Networks
收藏 引用
2nd IEEE International conference on Contemporary Computing and communications, InC4 2024
作者: Singh, Kamred Udham Kumar, Ankit Varshney, Neeraj Raja, Linesh Singh, Teekam Dewangan, Amit Kumar School of Computing Graphic Era Hill University Dehradun India Guru Ghasidas Vishwavidyalaya Department of Information Technology Bilaspur India GLA University Department of Computer Engineering & Applications UP Mathura India Manipal University Jaipur Department of Computer Applications Jaipur India Graphic Era Deemed to be University Department of Computer Science and Engineering Dehradun India
Wireless sensor networks have garnered significant adoption as a technology for collecting and analyzing data from the environment. Their versatility and wide-ranging applications, encompassing critical military opera... 详细信息
来源: 评论