咨询与建议

限定检索结果

文献类型

  • 6,718 篇 会议
  • 67 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,830 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,666 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 311 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 14 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,456 篇 英文
  • 271 篇 其他
  • 183 篇 中文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6830 条 记 录,以下是4981-4990 订阅
排序:
Text's source trustworthiness detection based on cognitive hash
Text's source trustworthiness detection based on cognitive h...
收藏 引用
International conference on Multimedia Information Networking and security
作者: Hu, Donghui Zhang, Juan Hu, Xuegang Wang, Lian Miao, Wenjie Hou, Zhengfeng School of Computer Science and Information Engineering Hefei University of Technology Hefei 230009 China School of Computer Science Wuhan University Wuhan Hubei 430072 China Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education Wuhan Hubei 430072 China
It is important to do research on the source trustworthiness of the massive data under network environment. A detection method of source trustworthiness in text is proposed and designed based on cognitive hash. Based ... 详细信息
来源: 评论
Capability-centric attack model for network security analysis
Capability-centric attack model for network security analysi...
收藏 引用
2010 2nd International conference on Signal Processing Systems, ICSPS 2010
作者: Song, Shunhong Lu, Yuliang Cheng, Weiwei Yuan, Huan Department of Network Engineering Electronic Engineering Institute Hefei 230037 China Department of Computer Research JiangNan Institute of Computing Technology Wuxi 214083 China
Most network attack models have the problem of lacking ablility to describe all types of attack patterns in deltail, with no consideration of attacker's skill and policy. To address the problem, this paper propose... 详细信息
来源: 评论
The design and enforcement of a rule-based constraint policy language for service composition
The design and enforcement of a rule-based constraint policy...
收藏 引用
作者: Wei, Wei Yu, Ting Department of Computer Science North Carolina State University Raleigh NC United States
Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organization or among multiple domains, one... 详细信息
来源: 评论
Analysis and an improvement proposal for the authentication system of SNMPv3
Analysis and an improvement proposal for the authentication ...
收藏 引用
International conference on Information Science and Engineering
作者: Li, Mingming Su, Houqin School of Computer Science and Technology Donghua University Shanghai 200051 China
The weak security of the digital digest algorithm used in the authentication system of SNMPv3 has been analyzed, an improved suggest taking SHA-2 to replace SHA-1 and MD5 used originally in SNMPv3 has been presented, ... 详细信息
来源: 评论
Encryption scheme based on invertible watermarking
Encryption scheme based on invertible watermarking
收藏 引用
International conference on Multimedia Information Networking and security
作者: Wang, Jinwei Shi, Yufeng Lian, Shiguo College of Computer and Software Nanjing University of Information Science and Technology Nanjing China 28th Research Institute CETC Nanjing China France Telecom R and D Beijing Beijing China
This paper proposes a novel encryption scheme based on invertible watermarking. In the past encryption algorithms, diffusion and confusion algorithms are used to increase the effect of the encryption, however, these a... 详细信息
来源: 评论
Can we certify systems for freedom from malware  10
Can we certify systems for freedom from malware
收藏 引用
32nd acm/IEEE International conference on Software Engineering, ICSE 2010
作者: Kumar, N. V. Narendra Shah, Harshit Shyamasundar, R.K. School of Technology and Computer Science Tata Institute of Fundamental Research Mumbai India
Malicious code is any code that has been modified with the intention of harming its usage or the user. Typical categories of malicious code include Trojan Horses, viruses, worms etc. With the growth in complexity of c... 详细信息
来源: 评论
Application of the improved BP neural network model to deformation analysis of an earth-stone dam
Application of the improved BP neural network model to defor...
收藏 引用
International conference on Future computer and Communication
作者: Jang, Ruibo Pan, Jiechen Yang, Mingdong Xu, Liang Civil Engineering Department Henan Institute of Engineering Zhengzhou China Institute of Engineering China Communications Construction Company Ltd. Qingdao China
In recent years, the artificial neural networks theory and the application obtained the swift development. Especially the artificial neural networks BP model reflected the functional relations which need not to use th... 详细信息
来源: 评论
Network availability index and its flow-based quantitative calculation method
Network availability index and its flow-based quantitative c...
收藏 引用
2010 2nd International conference on computer Engineering and Technology, ICCET 2010
作者: He, Yanhong Zhang, Yongzheng Institute of Computing Technology Chinese Academy of Sciences Graduate University of Chinese Academy of Sciences Beijing China
Due to the lack of objectively reflecting the macro situation of large-scale complex network availability, this paper proposes a new definition of availability index for macro situation and its flow-based quantitative... 详细信息
来源: 评论
An approach to analyze covert channel based on finite state machine
An approach to analyze covert channel based on finite state ...
收藏 引用
International conference on Multimedia Information Networking and security
作者: Liu, Xiong Hao, Jian-Guo Dai, Yi-Qi Department of Computer Science and Technology Tsinghua University Beijing China
Most researches in the field of covert channel concerned a specific channel, and few works resolved the general situations. This paper focuses on the system that can be modeled as a finite state machine, introduces an... 详细信息
来源: 评论
Application of web data mining and data warehouse in E-commerce
Application of web data mining and data warehouse in E-comme...
收藏 引用
2010 2nd International conference on Software Technology and Engineering, ICSTE 2010
作者: Li, Xiaofeng Li, Dong Tang, Yuanxin Department of Computer Applied Technology HuaDe School of Applied Technology of Harbin Institute of Technology Harbin China Department of Computer Science and Technology Harbin Institute of Technology Harbin China School of Computer Science and Technology Harbin University of Science and Technology Harbin China
The emergence of electronic commerce has changed the traditional business model, it has changed vendors and customers. Expanded customer choice makes them pay more attention to the value of goods, rather than before t... 详细信息
来源: 评论