咨询与建议

限定检索结果

文献类型

  • 6,718 篇 会议
  • 67 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,830 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,666 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 311 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 14 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,456 篇 英文
  • 271 篇 其他
  • 183 篇 中文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6830 条 记 录,以下是4921-4930 订阅
排序:
A risk and cost-benefit assessment of information security measures in lubricating oils company
A risk and cost-benefit assessment of information security m...
收藏 引用
2nd IASTED International conference on Advances in Management Science and Risk Assessment, AMSRA 2010
作者: Dejdumrong, Natasha Anannavee, Nares Uttranadhi, Takolchai Department of Computer Engineering King Mongkut's University of Technology Thonburi 126 Pracha-Utid Rd. Tungkru Bangkok Thailand School of Information Technology Phetchaburi Rajabhat University Phetchaburi Thailand
In the current situation of world economic and political uncertainty, risk assessment and management of a company is inevitably required as an obligation not just an option. Information security assessment is an impor... 详细信息
来源: 评论
A survey of broadband frequency invariant beamformer
A survey of broadband frequency invariant beamformer
收藏 引用
2010 2nd International conference on Future computer and Communication, ICFCC 2010
作者: Liu, Hongwei Xie, Ning Wang, Hui College of Information Engineer Shenzhen University Shenzhen Guangdong 518060 China National Mobile Communications Research Laboratory Southeast University Nanjing Jiangsu 210096 China
In the broadband signal processing, in order to receiving broadband signals without distortion resulting from the different relative aperture, it is valuable to study the Frequency-invariant beam patterns (FIBPs). Bas... 详细信息
来源: 评论
Study on key distribution scheme for wireless sensor networks
Study on key distribution scheme for wireless sensor network...
收藏 引用
2010 2nd International conference on computer Engineering and Technology, ICCET 2010
作者: You, Xuemei Network Information Security Institute Shandong Vocational School of Judicial Police Shandong Justice Police Vocational College Jinan China
For solving the issue of key distribution in the clustered sensor networks, proposed a key distribution scheme based on layers, in which base station sends the secret knowledge of member nodes to the cluster-header, a... 详细信息
来源: 评论
An intrusion detection approach based on data mining
An intrusion detection approach based on data mining
收藏 引用
International conference on Future computer and Communication
作者: Ye, Qing Wu, Xiaoping Huang, Gaofeng Depart. of Information Security Naval University of Engineering Wuhan China
An intrusion is defined as any set of actions that compromise the integrity, confidentiality or availability of a resource. Data mining is to identify valid, novel, potentially useful, and ultimately understandable pa... 详细信息
来源: 评论
Inner edge detection of PET bottle opening based on the Balloon Snake
Inner edge detection of PET bottle opening based on the Ball...
收藏 引用
International conference on Advanced computer Control
作者: Wang, Xiao Mi, Hong Wang, Wei Department of Automation Xiamen University Xia Men China Center for Non-Traditional Security and Peaceful Development Studies Zhejiang University Zhe Jiang China
Edge detection of bottle opening is a primary section to the machine vision based bottle opening detection system. This paper, taking advantage of the Balloon Snake, on the PET (Polyethylene Terephthalate) images samp... 详细信息
来源: 评论
Automated inference of socio-cultural information from natural language conversations
Automated inference of socio-cultural information from natur...
收藏 引用
IEEE International conference on Social Computing
作者: Scherl, Richard Inclezan, Daniela Gelfond, Michael Department of Computer Science and Software Engineering Monmouth University West Long Branch NJ 07764 United States Department of Computer Science Texas Tech. University Lubbock TX 79409 United States
We discuss a methodology for extracting socio-cultural information from transcripts of natural language conversations. The methodology is applicable to a wide variety of languages. We use Russian and Tamil for illustr... 详细信息
来源: 评论
2010 2nd International conference on computer Engineering and Applications, ICCEA 2010
2010 2nd International Conference on Computer Engineering an...
收藏 引用
2nd International conference on computer Engineering and Applications, ICCEA 2010
The proceedings contain 270 papers. The topics discussed include: neuro-symbolic performance comparison;intelligent data mining in autonomous heterogeneous distributed bio databases;managing communications in critical...
来源: 评论
2010 2nd International conference on computer Engineering and Applications, ICCEA 2010
2010 2nd International Conference on Computer Engineering an...
收藏 引用
2nd International conference on computer Engineering and Applications, ICCEA 2010
The proceedings contain 270 papers. The topics discussed include: neuro-symbolic performance comparison;intelligent data mining in autonomous heterogeneous distributed bio databases;managing communications in critical...
来源: 评论
The study of TOPMD statistical properties and design of TOPMDE
The study of TOPMD statistical properties and design of TOPM...
收藏 引用
International conference on Future computer and Communication
作者: Niu, Huijuan Bai, Chenglin Zhang, Xia Xu, Hengying Han, Jiguang Physics Science and Information Engineering College Liao Cheng University Liao Cheng China Key Laboratory of Optical Communications Science and Technology in Shan Dong Province Liao Cheng China
Because it is hard to calculate the TOPMD statistical properties by analytic method, in this paper the modulator method is adopted. So based on polarization-maintaining fiber model, the vector's property and its c... 详细信息
来源: 评论
Dependence Cluster Visualization
Dependence Cluster Visualization
收藏 引用
5th acm Symposium on Software Visualization (SOFTVIS)
作者: Islam, Syed Krinke, Jens Binkley, David Kings Coll London CREST London WC2R 2LS England
Large clusters of mutual dependence have long been regarded as a problem impeding comprehension, testing, maintenance, and reverse engineering. An effective visualization can aid an engineer in addressing the presence... 详细信息
来源: 评论