咨询与建议

限定检索结果

文献类型

  • 6,718 篇 会议
  • 67 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,830 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,666 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 311 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 14 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,456 篇 英文
  • 271 篇 其他
  • 183 篇 中文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6830 条 记 录,以下是321-330 订阅
排序:
Integrated Automated Attendance System with RFID, Wi-Fi, and Visual Recognition Technology for Enhanced Classroom security and Precise Monitoring  2
Integrated Automated Attendance System with RFID, Wi-Fi, and...
收藏 引用
2nd IEEE International conference on Contemporary Computing and communications, InC4 2024
作者: Thaleeparambil, Noeal Biju, Abiya Prathap, Boppuru Department of Computer Science and Engineering Bengaluru India
The integrated automated smart attendance system utilizes RFID, Wi-Fi, and visual recognition technologies to elevate classroom security and ensure precise monitoring of attendance records. It consolidates cutting-edg... 详细信息
来源: 评论
Experimental Design of Interoperable Smart Lighting for Elderly Care  2
Experimental Design of Interoperable Smart Lighting for Elde...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Sadasivam, Boobalakrishnan Rajamohan, Kavitha Department of Computer Science Bangalore India
Smart Home attains an active role in elderly care. Vision impairments caused by aging makes elders more dependent and affects the circadian rhythm or body clock. Some vision impairments can be improved by providing ad... 详细信息
来源: 评论
Using the possibilities of digitalization tools in building a dynamic model of competition in conditions of economic security  2
Using the possibilities of digitalization tools in building ...
收藏 引用
2nd International conference on computer Applications for Management and Sustainable Development of Production and Industry, CMSD 2022
作者: Korolev, M.I. Lapshina, M.L. Khorev, A.I. Lukina, O.O. Regional branch Association of employers of the Moscow region in the field of safety and security "Global-security" Moscow Russia Voronezh State Forestry Engineering University named after G.F. Morozov Voronezh Russia Voronezh State University of Engineering Technologies Voronezh Russia
This paper provides an overview of the economic state of the market, taking into account objective risks affecting economic security. The possibility of constructing simulation models using systems of nonlinear equati... 详细信息
来源: 评论
Medibot: Personal Medical Assistant  2
Medibot: Personal Medical Assistant
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Kumar, K. Antony Rajan, Jerlin Francy Appala, Charan Balurgi, Shreya Balaiahgari, Praveen Royal Vel Tech Rangarajan Dr Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering Chennai India Apollo College of Nursing Department of Medical Surgical Nursing Chennai India
In many parts of the world, there is a lack of access to healthcare professionals, Medical consultations can be expensive. Using cutting-edge Artificial Intelligence (AI) technology, Medibot, a smart healthcare conver... 详细信息
来源: 评论
Early Forest Fire Prediction System Using Wireless Sensor Network  2
Early Forest Fire Prediction System Using Wireless Sensor Ne...
收藏 引用
2nd IEEE International conference on Device Intelligence, Computing and Communication Technologies, DICCT 2024
作者: Thangam, S. Sri Sai Samhitha, J. Adarsh Sagar, K. Yaswanth, Julakanti Sai Haritha, Kundula Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham Dept. of Computer Science and Engineering India
Wireless sensor network (WSN), is a collection of sensors that is used for monitoring the activities in a given environment. They are used in the forests for fire detection wherea large number of sensor nodes are plac... 详细信息
来源: 评论
Implementing FlowFlexDP for Advancing Passenger Demand Prediction using Cellular Footprints  2
Implementing FlowFlexDP for Advancing Passenger Demand Predi...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Azhagusakthi, N. Anuradha, K. Karpagam College of Engineering School of Computer Application Coimbatore32 India
Accurate prediction of citywide passenger demand is essential for optimizing driver scheduling in online car-hailing services. However, existing approaches often overlook deep dependencies or restrict the analysis to ... 详细信息
来源: 评论
HVSNA: An Advanced Hybrid Attack on RPL-Based Low-Power Wireless Networks  2
HVSNA: An Advanced Hybrid Attack on RPL-Based Low-Power Wire...
收藏 引用
2nd IEEE North Karnataka Subsection Flagship International conference, NKCon 2023
作者: Hrishikesh, B.H. Mandalam, Ankita Venkata Giri, Animesh Pes University Computer Science & Engineering Department Bangalore India
Network systems are strongly connected to our daily lives and guaranteeing their security becomes more and more critical. The growth in the use of Internet of Things (IoT) devices has led to exceptional levels of inte... 详细信息
来源: 评论
A Secured Framework for Blockchain Technology Adoption in IoT  2
A Secured Framework for Blockchain Technology Adoption in Io...
收藏 引用
2nd International conference on Edge Computing and Applications, ICECAA 2023
作者: Maruthi, R. Piriadarshani, D. Padmanabhan, Sankar Shanthi, M. Hindustan Institute of Technology and Science Department of Computer Applications Tamil Nadu Chennai India Hindustan Institute of Technology and Science Department of Mathematics Tamil Nadu Chennai India Hindustan Institute of Technology and Science Department of Electronics and Communication Tamil Nadu Chennai India Sri Balaji Arts and Science College Department of Computer Science Tamil Nadu Chennai India
In networking applications, security and privacy is an important concern and it is an ongoing problem in Internet of Things (IoT) applications. Many security mechanisms like biometrics, two factor authentications etc,... 详细信息
来源: 评论
Enhance Energy Efficiency based Automobile Wheels by using Piezoelectric Energy Harvesting Technology and Sustainable Power Generation  2
Enhance Energy Efficiency based Automobile Wheels by using P...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Dadi, Pradeep Surya Meera, R. Rajkumar, K. Surendran, R. Chennai Institute of Technology Department of Mechanical Engineering Chennai India St. Joseph's College of Engineering and Technology Department of Electronics and Communication Engineering Thanjavur India Guru Nanak Institute of Technology Department of Emerging Technologies Hyderabad India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering New Delhi India Department of Computer Science and Engineering Chennai India
This paper investigates the feasibility of integrating piezoelectric energy harvesting technology into automobile wheels to improve energy efficiency and promote sustainable power generation. By strategically placing ... 详细信息
来源: 评论
Adversarial Attack on 3D Fused Sensory Data in Drone Surveillance  2
Adversarial Attack on 3D Fused Sensory Data in Drone Surveil...
收藏 引用
2nd International conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Bhanushali, Amisha Parab, Mithun Pavan Kumar, B.N. Ingle, Palash Sejong University Computer and Information Security Seoul Korea Republic of R.J. College Department of Computer Science Mumbai India Indian institute of information technology CSE Group Sri city India
Lately, unmanned aerial vehicles (UAVs) have not only been used for surveillance but also, they are used in safety-critical applications. Today's UAVs are enabled with state-of-the-art sensors (i.e., LiDAR and 2D ... 详细信息
来源: 评论