咨询与建议

限定检索结果

文献类型

  • 6,718 篇 会议
  • 67 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,830 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,666 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 311 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 14 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,456 篇 英文
  • 271 篇 其他
  • 183 篇 中文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6830 条 记 录,以下是221-230 订阅
排序:
A Secure Data Encryption Mechanism in Cloud Using Elliptic Curve Cryptography  2
A Secure Data Encryption Mechanism in Cloud Using Elliptic C...
收藏 引用
2nd IEEE International conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2024
作者: Sudha, I. Donald, Cecil Navya, S. Nithya, G. Balamurugan, Manivannan Saravanan, S. Saveetha Institute of Medical and Technical Sciences - Simats Department of Computer Science and Engineering Saveetha School of Engineering Chennai India Department of Computer Science Bengaluru India Raghu Engineering College Department of Computer Science Engineering Visakhapatnam India Department of Cse V. S. B College of Engineering Technical Campus Coimbatore India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Mathematics Tamil Nadu Avadi India
Cloud computing is undergoing continuous evolution and is widely regarded as the next generation architecture for computing. Cloud computing technology allows users to store their data and applications on a remote ser... 详细信息
来源: 评论
Smart Surveillance System Using Machine Learning  2
Smart Surveillance System Using Machine Learning
收藏 引用
2nd International conference on Advancements in Smart, Secure and Intelligent Computing, ASSIC 2024
作者: Arshad, Mohammad Dastagiriah, C. Krishna, D. Ramya Vamsinath, J. Rani, K. Pushpa Mishra, Sushruta Deccan College of Engineering and Technology Department of It TS Hyderabad500 001 India Anurag University Department of Cse Hyderabad500088 India and Ai&ds Hyderabad India Vnr Vignana Jyothi Institute of Engineering and Technology Department of Cse Hyderabad India Mlr Institute of Technology Department of Computer Science and Engineering Hyderabad Dundigal500043 India Kalinga Institute of Industrial Technology Deemed to Be University India
Video surveillance plays a significant role in protecting and securing modern communities. Smart cameras with sophisticated video analysis can monitor events and capturing unusual behaviors and events in modern cities... 详细信息
来源: 评论
Overview of Research on Named Data Network Architecture  2
Overview of Research on Named Data Network Architecture
收藏 引用
2nd International conference on Signal Processing and Intelligent Computing, SPIC 2024
作者: Liu, Ying Tan, Xiaobo Liu, Jingyu Shenyang Ligong University Shenyang China Liaoning Co. Ltd China Mobile Communications Group Shenyang China
Due to the revolutionary development of computer network technology, the current internet architecture has also faced varying degrees of challenges. Therefore, Named Data Networking (ndN) emerged as a well-known and e... 详细信息
来源: 评论
A Comprehensive Examination of Biometric ATM Operations Involving Fingerprint and Face Recognition Using Deep Learning  2
A Comprehensive Examination of Biometric ATM Operations Invo...
收藏 引用
2nd IEEE International conference on Advances in Information Technology, ICAIT 2024
作者: Burkul, Trupti S. Patil, Sarita Computer Engineering Department G.H. Raisoni College of Engineering & Management Pune India
India's technological advancements have significantly enhanced convenience and reliability, especially in the banking sector, benefiting consumers with notable progress. Automated Teller Machines (ATMs) have revol... 详细信息
来源: 评论
Profiling and Non-Profiling Key Retrieval Attacks in Programmable Object Interfaces Using Deep Learning Cryptanalytic Techniques: A Survey  2
Profiling and Non-Profiling Key Retrieval Attacks in Program...
收藏 引用
2nd IEEE International conference on Device Intelligence, Computing and Communication Technologies, DICCT 2024
作者: Maheswari, R. Krishnamurthy, M. Kcg College of Technology Department of Electronics and Communication Engineering Tamil Nadu Chennai India Kcg College of Technology Department of Computer Science and Engineering Tamil Nadu Chennai India
Intensive Research in the area of Hardware & Networking involves security. This key concept is bypassed in the initial Design & Development of Hardware devices (IoT), paving way for vulnerable attacks. Attacks... 详细信息
来源: 评论
Enhancing Healthcare Image Record security via CNN-based Tamper Detection, Watermarking, and Digital Signatures  2
Enhancing Healthcare Image Record Security via CNN-based Tam...
收藏 引用
2nd International conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2024
作者: Kumaran, U. Gurupriya, M. Thodathara, Harshitha Reddy Aryagopal Vijjapu, Aditya Harish, Gattamaneni Amrita Vishwa Vidyapeetham Amrita School of Computing Dept. of Computer Science and Engineering Bengaluru India
computers have been seamlessly integrated into every domain including health care where one of its applications is in the storage of health care records such as medical images. Electronic healtheare records contain a ... 详细信息
来源: 评论
Research on the credibility of supply chain big data based on blockchain  2
Research on the credibility of supply chain big data based o...
收藏 引用
2nd International conference on Artificial Intelligence and Autonomous Robot Systems, AIARS 2023
作者: Xie, Jiagui Guo, Jian Li, Jin Zhang, Bo Nie, Fanjie China Academy of Information and Communications Technology Industrial Internet and Iot Research Institute Beijing China
There are some security problems in traditional supply chain trade data, such as trade data being tampered with and forged, which is extremely unfavorable for the protection of supply chain trade data. For this reason... 详细信息
来源: 评论
Research on computer Network Information security Protection System Based on Artificial Intelligence  2
Research on Computer Network Information Security Protection...
收藏 引用
2nd International conference on 3D Immersion, Interaction and Multi-Sensory Experiences, ICDIIME 2023
作者: Bao, Jian Yun, Kai Li, Haosheng Zhang, Qingwang Yang, Hao State Grid Xinjiang Information and Telecommunication Company Urumqi Xinjiang830063 China
With the rapid development of high technology and economy, our country has entered a new era of artificial intelligence in the 21st century. Home appliances of artificial intelligence, auxiliary software of artificial... 详细信息
来源: 评论
Cyber-Physical Vulnerabilities and NIST Mitigation Framework for Power Sector  2
Cyber-Physical Vulnerabilities and NIST Mitigation Framework...
收藏 引用
2nd International conference on Cyber Physical Systems, Power Electronics and Electric Vehicles, ICPEEV 2024
作者: Verma, Dheeraj Agrawal, Praveen Kumar Niazi, K.R. Gupta, Nikhil Pandey, Vipin Chandra Department of Electrical Engineering Malaviya National Institute of Technology Jaipur India Computer Electrical and Mathematical Sciences and Engineering Division KAUST Saudi Arabia
As power systems evolve and increasingly rely on digital technology, they become more vulnerable to both cyber and physical threats. This paper explores the growing challenges faced by modern power grids, particularly... 详细信息
来源: 评论
Information security Management Evaluation at ABC University Using OCTAVE-S and ISO Standards  2
Information Security Management Evaluation at ABC University...
收藏 引用
2nd IEEE International conference on Electrical Engineering, computer and Information Technology, ICEECIT 2024
作者: Ciptaningtyas, Henning Titi Ghozali, Khakim Febriyono, Heaven Happyna Putra Department of Information Technology Institut Teknologi Sepuluh Nopember Surabaya Indonesia
ABC University, recognized as one of the leading educational institutions in Indonesia, bears significant responsibility for safeguarding its information security, mainly due to its reliance on technology to manage cr... 详细信息
来源: 评论