咨询与建议

限定检索结果

文献类型

  • 6,718 篇 会议
  • 67 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,830 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,666 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 311 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 14 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,456 篇 英文
  • 271 篇 其他
  • 183 篇 中文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6830 条 记 录,以下是251-260 订阅
排序:
Unifying Sky and Chain: A Perspective on Blockchain's Role in UAV Swarms  2
Unifying Sky and Chain: A Perspective on Blockchain's Role i...
收藏 引用
2nd International conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Phadke, Abhishek Sekharan, Chandra N Vasudeva, Karthik Kumar Kar, Dulal Christopher Newport University Department of Physics Computer Science and Engineering Newport NewsVA United States Texas A&m University-Corpus Christi Department of Computer Science Corpus ChristiTX United States Texas Tech University Department of Mathematics and Statistics LubbockTX United States
UAV (Unoccupied Aerial Vehicle) swarms are coordinated agents working towards accomplishing a common goal in a dynamic environment. The nature of the environment is such that these swarms can always benefit from upgra... 详细信息
来源: 评论
Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks  24
Untangling the Knot: Breaking Access Control in Home Wireles...
收藏 引用
31st conference on computer and communications security
作者: Zhou, Xin'an Deng, Qing Pu, Juefei Man, Keyu Qian, Zhiyun Krishnamurthy, Srikanth V. Univ Calif Riverside Riverside CA 92521 USA
Home wireless mesh networks (WMNs) are increasingly gaining popularity for their superior extensibility and signal coverage compared to traditional single-AP wireless networks. In particular, there is a single gateway... 详细信息
来源: 评论
Vulnerability Analysis and Exploitation Attacks on Smart Wearable Devices  2
Vulnerability Analysis and Exploitation Attacks on Smart Wea...
收藏 引用
2nd International conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Khan, Shujahat Ali Bajwa, Hasan Raza Sundaram, Jawahar Pritika Shanmugam, Bharanidharan Energy and Resources Institute Faculty of Science and Technology Charles Darwin University Darwin Australia Christ Academy Institute for Advanced Studies Department of Computer Science and Applications Bengluru India
Wearable devices are becoming more popular these days due to its unique features and its effectiveness. The evolution of Internet of Things (IoT) that combined health care devices and sensors has entirely changed the ... 详细信息
来源: 评论
Decentralized Network for Cloud Storage  2
Decentralized Network for Cloud Storage
收藏 引用
2nd Edition of IEEE Delhi Section Owned conference, DELCON 2023
作者: Chirag, N. Kshitij, K. Gupta, Gaurav Sir M Visvesvaraya Institute of Technology Dept. of Information Science Engineering Bangalore India Shoolini University Yogananda School of Artificial Intelligence Computer and Data Sciences H.P Solan India
The amount of data loss on corporate servers in cloud environments has increased significantly. In the cloud, there are many security compromises and account hijackings, resulting in severe vulnerabilities for the ser... 详细信息
来源: 评论
Smart Emergency Alerting System: A Machine Learning Approach  24
Smart Emergency Alerting System: A Machine Learning Approach
收藏 引用
2nd International conference on communications, Computing and Artificial Intelligence, CCCAI 2024
作者: Alrowaily, Majed Abdullah Department of Computer Science College of Computer and Information Sciences Jouf University Sakaka72341 Saudi Arabia
Recently, Saudi Arabia has hosted significant sports and technology events. Saudi Arabia has also successfully secured the bid to host Expo 2030 and declared its intention to host the FIFA World Cup in 2034. These cro... 详细信息
来源: 评论
Research on inconsistent consecutive DNS responses from DNS resolvers  2
Research on inconsistent consecutive DNS responses from DNS ...
收藏 引用
2nd Asia-Pacific conference on communications Technology and computer Science, ACCTCS 2022
作者: Li, Lengwenting Liu, Yang Lu, Keyu Li, Chao Zhang, Zhaoxin Harbin Institute of Technology Faculty of Computing Harbin China
As the core infrastructure of the Domain Name System (DNS), DNS resolvers play a vital role on the Internet. DNS responses are used for message transmission between DNS resolvers and clients. Their correctness and nor... 详细信息
来源: 评论
Anomaly-Based Intrusion Detection in Network Traffic using Machine Learning: A Comparative Study of Decision Trees and Random Forests  2
Anomaly-Based Intrusion Detection in Network Traffic using M...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Sah, Anil Kumar Venkatesh, K. SRM Institute of Science and Technology Department of Networking and Communications Chennai India
With advancements in information and virtualization technologies, the volume and growth of security threats from cyber attacks targeting networked systems are increasing. Protecting these networked systems is crucial ... 详细信息
来源: 评论
On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation Through the Lens of Academic Writing  24
On the Detectability of ChatGPT Content: Benchmarking, Metho...
收藏 引用
31st conference on computer and communications security
作者: Liu, Zeyan Yao, Zijun Li, Fengjun Luo, Bo Univ Kansas EECS I2S Lawrence KS 66045 USA
With ChatGPT under the spotlight, utilizing large language models (LLMs) to assist academic writing has drawn a significant amount of debate in the community. In this paper, we aim to present a comprehensive study of ... 详细信息
来源: 评论
Telehealth Data security and Privacy Solutions for Sensitive Health Records using Cloud Computing and Isolation Forest Algorithm  2
Telehealth Data Security and Privacy Solutions for Sensitive...
收藏 引用
2nd International conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2024
作者: Prathik, A. Banu, S. Parveen Sagar, B.S. Prakash, A. John Felix Thamizhamuthu, R. Velmurugan, S. Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Saveetha College of Liberal Arts and Sciences Department of Commerce Tamil Nadu Chennai India Reva University Department of Electrical and Electronics Engineering Karnataka Bengaluru India Chennai Institute of Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Srm Institute of Science and Technology Department of Computing Technologies Kattankulathur Campus-Chengalpattu Tamil Nadu Chennai India T.J.S. Engineering College Department of Electronics and Communication Engineering Tamil Nadu Chennai India
Protecting the confidentiality of patient's personal health information as it is sent and kept in the cloud is of the utmost importance due to the increasing number of telehealth services. This research provides a... 详细信息
来源: 评论
2nd International conference on Algorithms, Network and computer Technology
2nd International Conference on Algorithms, Network and Comp...
收藏 引用
2nd International conference on Algorithms, Network and computer Technology, ICANCT 2023
The proceedings contain 16 papers. The topics discussed include: a design pattern of IAPVS platform based on distributed edge computing;side-channel attack security risk assessment model based on mutual information ga...
来源: 评论