咨询与建议

限定检索结果

文献类型

  • 6,717 篇 会议
  • 65 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,827 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 503 篇 控制科学与工程
    • 362 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 217 篇 机械工程
    • 200 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,665 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 310 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,139 篇 管理学
    • 678 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 13 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,557 篇 英文
  • 180 篇 中文
  • 167 篇 其他
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6827 条 记 录,以下是41-50 订阅
排序:
Design of Lora Communication System Based on Speech Recognition in Emergency Rescue Environment  2
Design of Lora Communication System Based on Speech Recognit...
收藏 引用
2nd International conference on Signal Processing, computer Networks and communications, SPCNC 2023
作者: Jia, Li Chengdu University of Information Technology School of Network and Space Security CD China
In order to provide a more timely communication environment and achieve long-distance, low-cost voice information transmission in emergency rescue tasks after disasters, this article describes an intelligent voice pro... 详细信息
来源: 评论
Enhancing Real-time Facial Sentiment Recognition Systems through Deep Learning Architectures  2
Enhancing Real-time Facial Sentiment Recognition Systems thr...
收藏 引用
2nd International conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2024
作者: Geetha Rani, K. Selvaraj, Rajkumar Swaminathan, Aravind Surendran, R. Department of Computer Science and Engineering Bangalore560069 India Dubai United Arab Emirates Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Chennai India
Facial Emotion Recognition (FER) has emerged as a pivotal domain within computer vision, with applications spanning diverse fields such as human-computer interaction, mental health monitoring, and security systems. Wh... 详细信息
来源: 评论
Secure Data-Binding in FPGA-based Hardware Architectures utilizing PUFs  19
Secure Data-Binding in FPGA-based Hardware Architectures uti...
收藏 引用
19th acm Asia conference on computer and communications security (acm AsiaCCS)
作者: Frank, Florian Schmid, Martin Klement, Felix Palani, Purushothaman Weber, Andreas Kavun, Elif Bilge Xiong, Wenjie Arul, Tolga Katzenbeisser, Stefan Univ Passau Passau Germany Virginia Tech Blacksburg VA USA
In this work, a novel FPGA-based data-binding architecture incorporating PUFs and a user-specific encryption key to protect the confidentiality of data on external non-volatile memories is presented. By utilizing an i... 详细信息
来源: 评论
Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication  19
Nomadic: Normalising Maliciously-Secure Distance with Cosine...
收藏 引用
19th acm Asia conference on computer and communications security (acm AsiaCCS)
作者: Cheng, Nan Onen, Melek Mitrokotsa, Aikaterini Chouchane, Oubaida Todisco, Massimiliano Ibarrondo, Alberto Univ St Gallen St Gallen Switzerland EURECOM Biot France Copper Co Paris France
Computing the distance between two non-normalized vectors.. and.., represented by Delta(x,y) and comparing it to a predefined public threshold tau is an essential functionality used in privacy-sensitive applications s... 详细信息
来源: 评论
5G security Issues Challenges and Solutions Against DDoS Attacks:A Survey  2
5G Security Issues Challenges and Solutions Against DDoS Att...
收藏 引用
2nd International conference on Disruptive Technologies, ICDT 2024
作者: Ji, Sharma Kumar Mishra, Abhishek Iftm University Computer Science and Engineering Moradabad India
The Fifth Generation of communications Networks (5G) is projected to greatly develop wireless cellular networks by delivering quicker speed, higher capacity, and lower latency. It is expected to significantly alter bo... 详细信息
来源: 评论
Research on Situational Awareness of Network security Based on Machine Learning  2
Research on Situational Awareness of Network Security Based ...
收藏 引用
2nd International conference on Mechatronics, IoT and Industrial Informatics, ICMIII 2024
作者: Duan, Hui Hubei University School of Computer and Information Engineering Hubei Province Wuhan China
The existing information security situation awareness technology mostly uses RBF (RBF) radiation basis functions to extract information, which is susceptible to changes in the time domain threshold of attacks, resulti... 详细信息
来源: 评论
ICEECIT 2024 - proceedings: 2nd International conference on Electrical Engineering, computer and Information Technology 2024
ICEECIT 2024 - Proceedings: 2nd International Conference on ...
收藏 引用
2nd IEEE International conference on Electrical Engineering, computer and Information Technology, ICEECIT 2024
The proceedings contain 75 papers. The topics discussed include: blockchain technology model to increase transparency in the distribution of aid to disaster victims;design of a 1000 W boost inverter using the sine pul...
来源: 评论
Unraveling IoT Network security with Snort for Robust Intrusion Detection and Prevention  2
Unraveling IoT Network Security with Snort for Robust Intrus...
收藏 引用
2nd IEEE International conference on Contemporary Computing and communications, InC4 2024
作者: Geetha, K. Sreedevi, A.G. Chadha, Angela Raj Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Chennai India
The Internet of Things (IoT) has brought unprecedented connectivity, transforming technology across industries. This interconnected landscape, however, presents unprecedented network security challenges. This paper ex... 详细信息
来源: 评论
Vulnerability Assessment and Penetration Testing of University Network  2nd
Vulnerability Assessment and Penetration Testing of Universi...
收藏 引用
2nd International conference on Information Technologies and Their Applications
作者: Khurshudov, Dursun Imanov, Akif Nuraliyev, Jamalladdin Nagiyeva, Malahat Aliyeva, Samira Azerbaijan Univ Architecture & Construct Dept Informat Technol & Syst Baku Azerbaijan
Recent research in network management and the enhancement of network security efficiency has seen a widespread use of traffic classification and clustering The increasing use of the Internet and the development of pro... 详细信息
来源: 评论
AI Based Gym Management System with Body Performance Index measurement and Tips  2
AI Based Gym Management System with Body Performance Index m...
收藏 引用
2nd IEEE International conference on Networking and communications, ICNWC 2024
作者: Srivastava, Aman Diya Ajith, K. Annamalai, Suresh SRM Institute of Science and Technology School of Computing College of E&T Department of Networking and Communications Tamil Nadu Kattankulathur Chennai603203 India
The GMS-BPI Gym System is like a super cool computer program for gyms! It helps gym owners and people who go to the gym. For the owners, it makes things easier like signing up new members, planning classes, fixing gym... 详细信息
来源: 评论