咨询与建议

限定检索结果

文献类型

  • 6,718 篇 会议
  • 67 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,830 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,666 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 311 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 14 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,456 篇 英文
  • 271 篇 其他
  • 183 篇 中文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6830 条 记 录,以下是4961-4970 订阅
排序:
security of SOA based on TPM
Security of SOA based on TPM
收藏 引用
2010 2nd International conference on computer Engineering and Technology, ICCET 2010
作者: Yu, Chao Jie, Yang Institute of Neusoft Information and Technology Chengdu China School of Software South China University of Technology Guangzhou China
SOA has the characteristic of abstraction, loose coupling and interoperability, but there are some defect related to security and trust. How to specify and verify functional and non-functional requirements for service... 详细信息
来源: 评论
Improving data transmission reliability with network coding in wireless sensor network
Improving data transmission reliability with network coding ...
收藏 引用
International conference on Multimedia Information Networking and security
作者: Hao, Jing Feng, Hailin Wu, Guangxue College of Science Xidian University Xi'an China Computer Department Xidian University Xi'an China
Data transmission reliability is an important issue in the design of wireless sensor networks. This paper proposes a new network coding strategy combing with ARQ to improve data transmission reliability. By using sing... 详细信息
来源: 评论
Research and design of runtime software monitoring and control model
Research and design of runtime software monitoring and contr...
收藏 引用
2010 2nd International conference on Software Technology and Engineering, ICSTE 2010
作者: Wu, Kehe Ma, Gang Zhang, Tong School of Control and Computer Engineering North China Electric Power University Beijing China
Accurate measurement is a foundation upon which accurate controlling for things rests. Based on the real-time monitoring of the statuses and behaviors of running software, we check whether they work normally or not, a... 详细信息
来源: 评论
An online ballistics imaging system for firearm identification
An online ballistics imaging system for firearm identificati...
收藏 引用
2010 2nd International conference on Signal Processing Systems, ICSPS 2010
作者: Huang, Zhihu Leng, Jinsong School of Computer and Security Science Edith Cowan University Australia Chongqing Radio and TV University ChongQing China
Since the traditional ballistics imaging system is dependent upon the expertise and experience of end-user, an intelligent ballistics imaging system is highly demanded to overcome the drawbacks of traditional techniqu... 详细信息
来源: 评论
Simplex optimization localization algorithm for wireless sensor networks
Simplex optimization localization algorithm for wireless sen...
收藏 引用
2nd International conference on Networks security, Wireless communications and Trusted Computing, NSWCTC 2010
作者: Zhang, Shaoping Li, Guohui School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Computer and Information Engineering Jiangxi Agriculture University Nanchang China
Accurate, distributed localization algorithms are needed for large scale dense wireless sensor network applications. The Nelder-Mead Simplex Optimization Method (SOM) is applied to solve nondifferentiable problems and... 详细信息
来源: 评论
Research of key technologies on encrypting vector spatial data in oracle spatial
Research of key technologies on encrypting vector spatial da...
收藏 引用
2nd International conference on Information Engineering and computer Science, ICIECS 2010
作者: Li, Guangshi Computer Center Anshan Normal University Anshan China
This paper expatiates on the research status of encrypting spatial data in recently years, and analyzes the organizational structure of vector spatial data in Oracle Spatial. Aiming at the disadvantage of Oracle data ... 详细信息
来源: 评论
A GSM/UMTS selective jamming system
A GSM/UMTS selective jamming system
收藏 引用
International conference on Multimedia Information Networking and security (MINES)
作者: Song, Yubo Zhou, Kan Yao, Bingxin Chen, Xi School of Information Science and Engineering Southeast University Nanjing China College of Electronics and Information Engineering Nanjing University of Technology Nanjing China School of Management Nanjing University Nanjing China
This paper presents a new GSM/UMTS jamming system which is intended to be placed in a restricted area for security purpose. A pseudo base station was constructed to attempt connecting with mobile terminals. While the ... 详细信息
来源: 评论
The design of multiparty un-disavowal mutual signature arithmetic protocol in Emergency Response System
The design of multiparty un-disavowal mutual signature arith...
收藏 引用
2010 2nd International conference on Future computer and Communication, ICFCC 2010
作者: Peng, Xufu College of Computer Science and Technology Hubei Normal University Huangshi Hubei 435002 China
In the environment of the human working life, all kinds of unexpected events often occurred, to improve the emergency response capabilities and establish fast and efficient electronic incident command system is to be ... 详细信息
来源: 评论
A novel intrusion detection approaches based on data mining
A novel intrusion detection approaches based on data mining
收藏 引用
International conference on computer Engineering and Technology
作者: Yu, Yan Institute of Computer Science and Information Engineering Harbin Normal University Harbin China
Data mining has been gaining popularity in the knowledge discovery field, particularity with the increasing availability of digital documents in various languages from all around the world. Several data mining methods... 详细信息
来源: 评论
The swarm model in open source software developer communities
The swarm model in open source software developer communitie...
收藏 引用
IEEE International conference on Social Computing
作者: Cui, Xiaohui Beaver, Justin Stiles, Everett Pullum, Laura Klump, Brian Treadwell, Jim Potok, Thomas Oak Ridge National Laboratory Oak Ridge TN 37831 United States Electrical Engineering and Computer Science Department University of Tennessee Knoxville TN 37996 United States
Most of the current swarm model studies and applications try to mimic the collective behaviors of social animals, such as birds and ants. The studies seek to solve tasks similar to patterns and behaviors exhibited in ... 详细信息
来源: 评论