咨询与建议

限定检索结果

文献类型

  • 6,718 篇 会议
  • 67 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,830 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,666 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 311 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 14 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,456 篇 英文
  • 271 篇 其他
  • 183 篇 中文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6830 条 记 录,以下是261-270 订阅
排序:
Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups  24
Rolling in the Shadows: Analyzing the Extraction of MEV Acro...
收藏 引用
31st conference on computer and communications security
作者: Torres, Christof Ferreira Mamuti, Albin Weintraub, Ben Nita-Rotaru, Cristina Shinde, Shweta Swiss Fed Inst Technol Zurich Switzerland Northeastern Univ Boston MA USA
The emergence of decentralized finance has transformed asset trading on the blockchain, making traditional financial instruments more accessible while also introducing a series of exploitative economic practices known... 详细信息
来源: 评论
security Analysis and Improvement of Proxy Signature Scheme with Certificateless and Blind Properties  2
Security Analysis and Improvement of Proxy Signature Scheme ...
收藏 引用
2nd International conference on Big Data, Information and computer Network, BDICN 2023
作者: Hu, Xiaoming Shanghai Polytechnic University School of Computer and Information Engineering Shanghai China
Proxy signature scheme with certificateless and blind properties is called certificateless proxy blind signature (CT-PBS) scheme which holds many security properties such as unforgeability and delegation. This paper m... 详细信息
来源: 评论
Research on Intelligent System of Enterprise Finance and Accounting under the Background of computer Artificial Intelligence  2
Research on Intelligent System of Enterprise Finance and Acc...
收藏 引用
2nd International conference on Data Analytics, Computing and Artificial Intelligence, ICDACAI 2023
作者: Zhu, Yansha Nanning College of Technology Business College Guangxi Guilin China
This paper proposes WS-CAS, a computer audit system model for Web services. Develop the system prototype that supports Web Service in Internet environment. Then this paper builds a service-oriented computer audit plat... 详细信息
来源: 评论
Enhancing Pharmaceutical security: SecureMeds -A Robust Drug Traceability Platform  2
Enhancing Pharmaceutical Security: SecureMeds -A Robust Drug...
收藏 引用
2nd International conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Kulkarni, Aseem Vijayakumar, Vineet Nikam, Dev Patil, Abhishek Siddavatam, Asma Parveen I. Vivekanand Education Society's Institute of Technology Department of Information Technology Mumbai India
This paper presents a blockchain and AI-based methodology to prevent drug counterfeiting within the supply Chain. Incidents of counterfeit medicines, particularly in densely populated developing nations like India, ha... 详细信息
来源: 评论
Enhanced security Framework for Cloud Data Storage and communications: ECC, Access Control, and LDSA  2
Enhanced Security Framework for Cloud Data Storage and Commu...
收藏 引用
2nd IEEE International conference on IoT, Communication and Automation Technology, ICICAT 2024
作者: Habelalmateen, Mohammed I. Al-Hilali, Aqeel Ghobash, Ali Tawfek, E.A. Abdull Retha Abass Algurah, Riad Taaban, Nabaa Kareem Mohsen Abdel Sarhan, Abdel The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq Al-Farahidi University Baghdad Iraq Al-Kunooze University College Computer Engineer Department Basra Iraq The University of Mashreq Baghdad10021 Iraq Mazaya University College Thi-Qar Iraq Kut University College Business Administration Department Wasit Al Kut52001 Iraq Uruk University Baghdad Iraq
In this paper, we offer an upgraded security system to secure cloud users' information interior the cloud environment. This modern security system comprises of computerized marks, mystery get to control, and myste... 详细信息
来源: 评论
Innovations in Agri-Tech: A Review of Artificial Intelligence Applications and Challenges in Modern Agriculture  2
Innovations in Agri-Tech: A Review of Artificial Intelligenc...
收藏 引用
2nd International conference on Advanced Computing and Communication Technologies, ICACCTech 2024
作者: Agarwal, Rupanshi Bhardwaj, Isha Sharma, Ashish Kumar Sanghi, Akash Agarwal, Gaurav Invertis University Department of Computer Science and Engineering Bareilly India Kothiwal Institute of Technology and Professional Studeis Department of Applied Science and Humanities Moradabad India Invertis University Department of Computer Applications Bareilly India
Artificial intelligence (AI) is driving a massive shift in the agriculture industry, which is essential to both global food security and economic stability. This review article explores the use of AI technologies in a... 详细信息
来源: 评论
Impurity explicit optimal Machine learning and statistical perfect construction for air quality prediction  2
Impurity explicit optimal Machine learning and statistical p...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Nareshkumar, R. Shalinikumari, R. Kowsalya, S. Sri Nandhini Vijay Anand, P. Mohamed, Ajmal Gayathri, S. SRM Institute of Science and Technology School of Computing College of Engineering and Technology Department of Networking and Communications Tamilnadu Kattankulathur India Bharath Institute of Higher Education and Research Selaiyur Department of Architecture Tamilnadu Chennai India Veltech Multitech Dr.Rangarajan Dr.Sakunthala Engineering College Department of Information Technology Tamilnadu Chennai India CMR Institute of Technology Department of Artificial Intelligence and Data Science Bengaluru India Saveetha School of Engineering Department of Computer Science and Engineering Chennai India K. Ramakrishnan College of Technology Department of Computer Science and Engineering Tamilnadu Trichy India
The air quality index (AQI) is a metric used to report air quality levels. There has been a substantial rise in the level of air pollution in Indian cities. Multiple methodologies exist for formulating a mathematical ... 详细信息
来源: 评论
Exploring the Challenges and Solutions for Securing Smart Cities  2
Exploring the Challenges and Solutions for Securing Smart Ci...
收藏 引用
2nd International conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Chowdhury, Md Tanvir Rahman, Habibur Islam, Md Safayet Sumon, Monjurul Islam Talha, Abu Roy, Abin Hassan, Md Moinul Rabin, Md Rabiul Hasan East West University Department of Computer Science and Engineering Dhaka Bangladesh Ahsanullah University of Science & Technology Department of Computer Science and Engineering Dhaka Bangladesh
Now a days smart city is not an option or choice. It has embedded with our daily life. The concept of Smart Cities is evolving globally. Smart cities have evolved into a new model as an outcome of the Internet of Thin... 详细信息
来源: 评论
The Application of Cowrie Honeypot to Analyze Attacks on SSH and Telnet Protocols  2
The Application of Cowrie Honeypot to Analyze Attacks on SSH...
收藏 引用
2nd IEEE International conference on Electrical Engineering, computer and Information Technology, ICEECIT 2024
作者: Azzahri, Muhammad Naufal Selian, Restu Alsyafiq Muchallil, Sayed Nurdin, Yudha Afidh, Razief Perucha Fauzie Umam, Khairul Dawood, Rahmad Electrical and Computer Eng. Dept Universitas Syiah Kuala Banda Aceh Indonesia Dep. of Informatics Universitas Syiah Kuala Banda Aceh Indonesia UPT.ICT Universitas Syiah Kuala Banda Aceh Indonesia
The advancement of Internet technologies has led to growing security threats due to vulnerabilities in information systems. Various security solutions have been developed to counter these threats, but they often strug... 详细信息
来源: 评论
Designing A Secure Large Scale E -Voting System Leveraging Sharding Blockchain with Interoperability Protocol and Consensus Mechanism  2
Designing A Secure Large Scale E -Voting System Leveraging S...
收藏 引用
2nd IEEE International conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2024
作者: Maurya, Alka Dwivedi, Rajendra Kumar Madan Mohan Malaviya University of Technology Dept. of Information Technology and Computer Application Gorakhpur India
The advent of electronic voting (e-voting) systems has promised greater accessibility, efficiency, and transparency in the process of electoral. However, by adopting e-voting systems, they bring forth significant chal... 详细信息
来源: 评论