咨询与建议

限定检索结果

文献类型

  • 6,718 篇 会议
  • 67 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,830 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,666 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 311 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 14 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,456 篇 英文
  • 271 篇 其他
  • 183 篇 中文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6830 条 记 录,以下是311-320 订阅
排序:
A Framework for Big Data security Using MapReduce in IoT Enabled Computing  2
A Framework for Big Data Security Using MapReduce in IoT Ena...
收藏 引用
2nd IEEE International conference on Device Intelligence, Computing and Communication Technologies, DICCT 2024
作者: Kala, Kartikay Makhloga, Kartik Khan, Anayat Pandey, Aishwarya Mittal, Saksham Computer Science & Engineering Graphic Era Hill University Dehradun India
With the increase in number of IoT devices day by day, a large amount of unstructured, structured and semi-structured data is being generated, collectively termed as big data. The amount of data stored and processed i... 详细信息
来源: 评论
proceedings - 2023 2nd Asia conference on Electrical, Power and computer Engineering, EPCE 2023
Proceedings - 2023 2nd Asia Conference on Electrical, Power ...
收藏 引用
2nd Asia conference on Electrical, Power and computer Engineering, EPCE 2023
The proceedings contain 40 papers. The topics discussed include: black start scheme of wind-storage combined system based on virtual synchronous generator control;a left ventricle segmentation based on boundary weight...
来源: 评论
Cybersecurity in Digital Transformation: Challenges and Solutions  2
Cybersecurity in Digital Transformation: Challenges and Solu...
收藏 引用
2nd International conference on Advanced Computing and Communication Technologies, ICACCTech 2024
作者: Saini, Kapil Sehrawat, Parul Neeraj School of Computer Science and Engineering Geeta University Haryana Panipat India School of Commerce and Business Management Geeta University Haryana Panipat India
In the age of digital transformation, cybersecurity becomes a crucial concern, forcing organisations to implement strong security measures to protect sensitive data and ensure operational integrity. This study examine... 详细信息
来源: 评论
DERD: Data-free Adversarial Robustness Distillation through Self-adversarial Teacher Group  24
DERD: Data-free Adversarial Robustness Distillation through ...
收藏 引用
32nd acm International conference on Multimedia, MM 2024
作者: Zhou, Yuhang Zhang, Yushu Zhang, Leo Yu Hua, Zhongyun Harbin Institute of Technology Shenzhen China Nanjing University of Aeronautics and Astronautics Nanjing China Griffith University Brisbane Australia Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies China
computer vision models based on deep neural networks are proven to be vulnerable to adversarial attacks. Robustness distillation, as a countermeasure, takes both robustness challenges and efficiency challenges of edge... 详细信息
来源: 评论
Performance Evaluation of Quantum-Resistant IKEv2 Protocol for Satellite Networking Environments  2
Performance Evaluation of Quantum-Resistant IKEv2 Protocol f...
收藏 引用
2nd IEEE Virtual conference on communications, VCC 2024
作者: Mutlugun, Ahmet Hanna, Yacoub Akkaya, Kemal San Jose State University Department of Computer Science San Jose United States Lab Miami United States
With the introduction of post-quantum cryptography (PQC) algorithms, there are ongoing efforts to not only standardize the proposed solutions but also consider integrating them into existing network applications and e... 详细信息
来源: 评论
Biometric Aided Intelligent security System Built using Internet of Things  2
Biometric Aided Intelligent Security System Built using Inte...
收藏 引用
2nd International conference on Electronics and Renewable Systems, ICEARS 2023
作者: Josphineleela, R. Lekha, D. Natrayan, L. Purohit, Kamlesh Chandra Panimalar Engineering College Department of Computer Science Engineering Poonamallee600123 India R.M.K College of Engineering and Technology Department of Computer Science and Engineering Puduvoyal601206 India Saveetha School of Engineering Simats Department of Mechanical Engineering 602107 India Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun248002 India
Protection is critical for information, property, and even living beings. The usage of IoT and biometrics for security is becoming increasingly common as technology progresses. Facial recognition is widely accepted as... 详细信息
来源: 评论
AuthSaber: Automated Safety Verification of OpenID Connect Programs  24
AuthSaber: Automated Safety Verification of OpenID Connect P...
收藏 引用
31st conference on computer and communications security
作者: Al Rahat, Tamjid Feng, Yu Tian, Yuan Univ Calif Los Angeles Los Angeles CA 90095 USA Univ Calif Santa Barbara Santa Barbara CA USA
Single Sign-On (SSO)-based authentication protocols, like OpenID Connect (OIDC), play a crucial role in enhancing security and privacy in today's interconnected digital world, gaining widespread adoption among the... 详细信息
来源: 评论
Post Quantum Fuzzy Stealth Signatures and Applications  23
Post Quantum Fuzzy Stealth Signatures and Applications
收藏 引用
30th acm SIGSAC conference on computer and communications security (acm CCS)
作者: Pu, Sihang Thyagarajan, Sri AravindaKrishnan Doettling, Nico Hanzlik, Lucjan CISPA Helmholtz Ctr Informat Secur Saarbrucken Germany NTT Res Palo Alto CA USA
Private payments in blockchain-based cryptocurrencies have been a topic of research, both academic and industrial, ever since the advent of Bitcoin. Stealth address payments were proposed as a solution to improve paym... 详细信息
来源: 评论
Secure Data Transmission in Wireless Body Area Networks: An Energy-Efficient and Route Prediction Methodology  2
Secure Data Transmission in Wireless Body Area Networks: An ...
收藏 引用
2nd IEEE International conference on Device Intelligence, Computing and Communication Technologies, DICCT 2024
作者: Sharma, Rajeev Kang, Sandeep Singh Computer Science and Engineering Chandigarh University GharuanPunjab Mohali India
Today, Wireless medium-based communication carries lots of benefits to human life with various aspects like telecommunication, medical facilities, military, and many more. If communication is secure, then the impact o... 详细信息
来源: 评论
The Optimization of IPSec VPN in 5G Mobile Communication Network  23
The Optimization of IPSec VPN in 5G Mobile Communication Net...
收藏 引用
2nd International conference on Networks, communications and Information Technology, CNCIT 2023
作者: Wang, Qianran Wang, Jinhua Huang, Chengbin China Telecom Research Institute China National Engineering Research Center of Cloud and Network Infrastructure Security China
IPSec protocol has been used to protect user plane transmission in the network layer of 5G mobile communication network. Compared to protocols in the transport layer or higher, IPSec must deal with issues of reliabili... 详细信息
来源: 评论