咨询与建议

限定检索结果

文献类型

  • 6,718 篇 会议
  • 67 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,830 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,666 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 311 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 14 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,456 篇 英文
  • 271 篇 其他
  • 183 篇 中文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6830 条 记 录,以下是231-240 订阅
排序:
Time and Accuracy based impact analysis of Poisoning Attack on Support Vector Machine algorithm  2
Time and Accuracy based impact analysis of Poisoning Attack ...
收藏 引用
2nd IEEE International conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2024
作者: Ponsuresh, M. Rajkumar, T.Dhiliphan Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Virudhunagar Krishnankoil India
The security concerns in the digital world are rapidly evolving. Artificial intelligence and Machine Learning (AI&ML) techniques are not an exception from this concern. None of us wants to stay away from the comfo... 详细信息
来源: 评论
proceedings - 2023 2nd International conference on Artificial Intelligence and Autonomous Robot Systems, AIARS 2023
Proceedings - 2023 2nd International Conference on Artificia...
收藏 引用
2nd International conference on Artificial Intelligence and Autonomous Robot Systems, AIARS 2023
The proceedings contain 114 papers. The topics discussed include: application of machine learning and artificial intelligence in credit risk assessment;application of artificial intelligence in computer network techno...
来源: 评论
A Review on Digital Video Watermarking security: Significance and Persistent Challenges  2
A Review on Digital Video Watermarking Security: Significanc...
收藏 引用
2nd IEEE International conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Saini, Anuradha Bhardwaj, Sushil Rimt University Department of Computer Applications Punjab Mandi Gobindgarh India
Given the rapid strides in technology, the need for authentication and security in long-distance communications has taken center stage. Particularly in the film industry, the pirated distribution of digital videos pos... 详细信息
来源: 评论
2nd International conference on Data security and Privacy Protection, DSPP 2024
2nd International Conference on Data Security and Privacy Pr...
收藏 引用
2nd International conference on Data security and Privacy Protection, DSPP 2024
The proceedings contain 34 papers. The special focus in this conference is on Data security and Privacy Protection. The topics include: Enhancing Data Utility in Personalized Differential Privacy: A Fine-Grained ...
来源: 评论
AI Virtual Mouse Using Hand Geatures  2
AI Virtual Mouse Using Hand Geatures
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Jeevan, Y. Kevin, S. Sheeba, Adlin Subasini, C.A. St. Joseph's Institute of Techonology Computer Science and Engineering Chennai India
The mouse is an indispensable input device that is used in the computer system. The concept of system control using hand gesture recognition. The major advantage of this concept is it reduces the direct interaction be... 详细信息
来源: 评论
2nd International conference on Data security and Privacy Protection, DSPP 2024
2nd International Conference on Data Security and Privacy Pr...
收藏 引用
2nd International conference on Data security and Privacy Protection, DSPP 2024
The proceedings contain 34 papers. The special focus in this conference is on Data security and Privacy Protection. The topics include: Enhancing Data Utility in Personalized Differential Privacy: A Fine-Grained ...
来源: 评论
Blockchain-Powered Smart Agriculture: Harnessing Cyber-Physical Systems to Enhance Farmer Profits  2nd
Blockchain-Powered Smart Agriculture: Harnessing Cyber-Physi...
收藏 引用
2nd International conference on Agriculture-Centric Computation
作者: Sheoran, Shreya Khandelwal, Raghav Jain, Abhishek BML Munjal Univ Gurgaon India
The paper proposes a blockchain-based management system, a solution to tackle the most substantial problems in food supply chains. The problem of transparency, and traceability is the platform's advantage. It uses... 详细信息
来源: 评论
Assessment of Teaching, Learning and Student Progress in computer Science Courses  2
Assessment of Teaching, Learning and Student Progress in Com...
收藏 引用
2nd IEEE International conference on Contemporary Computing and communications, InC4 2024
作者: Aung, Zu Zu Shinha, G.R. International Institute of Information Technology Indian Knowledge System Lab Bangalore India
The computer University of Myanmar conducted a comprehensive assessment of its computer science courses to maintain its reputation for academic excellence. The study focused on gathering genuine feedback from students... 详细信息
来源: 评论
GRandLine: Adaptively Secure DKG and Randomness Beacon with (Log-)Quadratic Communication Complexity  24
GRandLine: Adaptively Secure DKG and Randomness Beacon with ...
收藏 引用
31st conference on computer and communications security
作者: Bacho, Renas Lenzen, Christoph Loss, Julian Ochsenreither, Simon Papachristoudis, Dimitrios CISPA Helmholtz Ctr Informat Secur Saarbrucken Germany Saarland Univ Saarbrucken Germany Vector Informat GmbH Stuttgart Germany
A randomness beacon is a source of continuous and publicly verifiable randomness which is of crucial importance for many applications. Existing works on randomness beacons suffer from at least one of the following dra... 详细信息
来源: 评论
Balancing security and Privacy with Data Usefulness and Efficiency in Wireless Sensor Networks  2
Balancing Security and Privacy with Data Usefulness and Effi...
收藏 引用
2nd International conference on Advanced Computing and Communication Technologies, ICACCTech 2024
作者: Yadav, Er. Narinder Sharma, Aditya Bharti, Kushagra Jaiswal, Krish Jhalani, Ayush Kumar, Santosh Chandigarh University Punjab Mohali India Computer Science & Engineering Chandigarh University Punjab Mohali India
Wireless Body Area Networks (WBANs) are a subcategory of WSNs that have been developed to support health care solutions such as blood pressure, heart rate, and endoscopic capsules. Such technologies have their benefit... 详细信息
来源: 评论