咨询与建议

限定检索结果

文献类型

  • 6,718 篇 会议
  • 67 册 图书
  • 44 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 6,830 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 5,598 篇 工学
    • 5,011 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,720 篇 信息与通信工程
    • 538 篇 电气工程
    • 502 篇 控制科学与工程
    • 361 篇 安全科学与工程
    • 357 篇 生物工程
    • 325 篇 电子科学与技术(可...
    • 267 篇 生物医学工程(可授...
    • 229 篇 网络空间安全
    • 216 篇 机械工程
    • 199 篇 仪器科学与技术
    • 183 篇 动力工程及工程热...
    • 155 篇 光学工程
    • 145 篇 建筑学
    • 137 篇 交通运输工程
  • 1,666 篇 理学
    • 927 篇 数学
    • 393 篇 生物学
    • 311 篇 物理学
    • 290 篇 统计学(可授理学、...
    • 200 篇 系统科学
    • 132 篇 化学
  • 1,138 篇 管理学
    • 677 篇 管理科学与工程(可...
    • 526 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 422 篇 法学
    • 241 篇 社会学
    • 194 篇 法学
  • 191 篇 医学
    • 167 篇 临床医学
    • 154 篇 基础医学(可授医学...
  • 142 篇 经济学
    • 142 篇 应用经济学
  • 97 篇 教育学
  • 78 篇 农学
  • 46 篇 军事学
  • 24 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 265 篇 security
  • 262 篇 network security
  • 190 篇 authentication
  • 166 篇 cryptography
  • 133 篇 internet of thin...
  • 95 篇 blockchain
  • 82 篇 security of data
  • 74 篇 computer network...
  • 73 篇 access control
  • 64 篇 cloud computing
  • 63 篇 privacy
  • 61 篇 machine learning
  • 59 篇 intrusion detect...
  • 56 篇 information secu...
  • 55 篇 wireless sensor ...
  • 53 篇 cybersecurity
  • 51 篇 artificial intel...
  • 50 篇 big data
  • 48 篇 computer science
  • 45 篇 computer archite...

机构

  • 16 篇 graphic era deem...
  • 15 篇 department of co...
  • 15 篇 electrical and c...
  • 15 篇 department compu...
  • 14 篇 chitkara univers...
  • 12 篇 chitkara univers...
  • 12 篇 school of comput...
  • 11 篇 school of comput...
  • 11 篇 graphic era deem...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 school of comput...
  • 10 篇 vishwakarma inst...
  • 10 篇 institute of inf...
  • 10 篇 karpagam academy...
  • 9 篇 computer school ...
  • 9 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 institute of com...
  • 8 篇 college of compu...

作者

  • 11 篇 gallegos luis en...
  • 11 篇 krestinskaya olg...
  • 10 篇 safavi-naini rei...
  • 9 篇 zhang lei
  • 9 篇 kukreja vinay
  • 9 篇 wang xiaofeng
  • 9 篇 li wei
  • 8 篇 segundo moisés t...
  • 8 篇 toapanta segundo...
  • 8 篇 fouda mostafa m.
  • 8 篇 luis enrique maf...
  • 7 篇 wang jing
  • 7 篇 singh kamred udh...
  • 7 篇 yang yang
  • 7 篇 liu feng
  • 7 篇 singh teekam
  • 7 篇 ning peng
  • 7 篇 han weihong
  • 7 篇 chen kai
  • 7 篇 james alex pappa...

语言

  • 6,456 篇 英文
  • 271 篇 其他
  • 183 篇 中文
  • 2 篇 法文
  • 1 篇 西班牙文
检索条件"任意字段=Proceedings of the 2nd ACM Conference on Computer and Communications Security"
6830 条 记 录,以下是4991-5000 订阅
排序:
Chaos-based estimation method for software reliability
Chaos-based estimation method for software reliability
收藏 引用
2nd International conference on Networks security, Wireless communications and Trusted Computing, NSWCTC 2010
作者: Shao, Chenxi Huang, Chao MOE-Microsoft Key Laboratory of Multimedia Computing and Communication University of Science and Technology of China Hefei Anhui China Computer Science Department University of Science and Technology of China Hefei Anhui China Anhui Province Key Laboratory of Software in Computing and Communication Hefei Anhui China
Reliability is one of the essential attributes of the dependable software, and an important factor for quantitatively characterizing software quality. Conventional methodology is Software Reliability Growth Model (SRG... 详细信息
来源: 评论
Hierarchical access control for scalable video coding
Hierarchical access control for scalable video coding
收藏 引用
International conference on Multimedia Information Networking and security
作者: Zhang, Gui Yuan, Chun Dept. of Computer Science and Technology Tsinghua University Shenzhen China
Scalable Video Coding(SVC) provides flexible adaptation to bandwidth fluctuations and device capabilities. Thus to preserve such adaptation capabilities many layered access control emerge. In this paper, through analy... 详细信息
来源: 评论
Analysis and research on network trust models based on multi-CA
Analysis and research on network trust models based on multi...
收藏 引用
International conference on Information Technology and computer Science, ITCS
作者: Su, Bing Lv, Fang-Fang You, Jing Wang, Hong-Yuan Department of Information Science and Engineering Jiangsu Polytechnic University Changzhou City Jiangsu Province China
Trust model is the basis of the entire network security system. It determines the form of trust used in the network and the risk caused by the form. Furthermore, it provides the framework for establishing and managing... 详细信息
来源: 评论
AHP implemented security assessment and security weight verification
AHP implemented security assessment and security weight veri...
收藏 引用
IEEE International conference on Social Computing
作者: Ji, Xuhua Pattinson, Colin Leeds Metropolitan University Beckett Park Campus United Kingdom Leeds Metropolitan University Leeds LS6 3QS United Kingdom
The media often reports shocking stories regarding attacks to the networks of well-known companies and organisations with headlines announcing either millions of pounds worth of financial loss or exposing public secur... 详细信息
来源: 评论
Vector-based low-delay forwarding protocol for underwater wireless sensor networks
Vector-based low-delay forwarding protocol for underwater wi...
收藏 引用
International conference on Multimedia Information Networking and security
作者: Su, Chang Liu, Xiaoming Shang, Fengjun Institute of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing 400065 China
underwater wireless sensor networks are new arising research hotspot. The paper first analyses the related vector-based forwarding protocols for underwater wireless sensor networks, and puts forward a novel data forwa... 详细信息
来源: 评论
Caching policy for reliable multicast in Ad Hoc networks
Caching policy for reliable multicast in Ad Hoc networks
收藏 引用
2010 2nd International conference on Future computer and Communication, ICFCC 2010
作者: Chen, Lixia Feng, Gang Zhang, Yide National Key Laboratory of Science and Technology on Communications University of Electronic Science and Technology of China Chengdu China
Providing reliable multicast (RM) service in Ad Hoc networks is very challenging due to the significant packet losses. To improve the reliability, data packets can be cached at designated nodes for future possible ret... 详细信息
来源: 评论
Toward linking information assurance and air and missile defense mission metrics
Toward linking information assurance and air and missile def...
收藏 引用
IEEE International conference on Social Computing
作者: Castner, A.K. Henry, M.H. Jailall, R.R.J. Nguyen, V.H. Paulhamus, B.L. Reilly, E.P. Johns Hopkins University Applied Physics Laboratory Laurel MD United States
With the growing reliance on net-centric warfare, understanding the effect of information operations (IO) on the overall mission becomes increasingly important. Our research seeks to develop metrics that provide insig... 详细信息
来源: 评论
The design of combined random number generator
The design of combined random number generator
收藏 引用
International conference on Multimedia Information Networking and security
作者: Guan, Xiaohui Qian, Yaguan Department of Computer Science Zhejiang Water Conservancy and Hydropoeer College Hangzhou 310018 Hangzhou China Department of Information and Computing Science Zhangjiang University of Science and Technology Hangzhou 310023 Hangzhou China
We know that the statistical properties of random number generator with single chaos mapping have some shortcomings of unsatisfactory statistical performances. In this paper we propose a combined random number generat... 详细信息
来源: 评论
A fast biological data mining algorithm based on embedded frequent subtree
A fast biological data mining algorithm based on embedded fr...
收藏 引用
International conference on Multimedia Information Networking and security
作者: Yang, Zhong-Xue Department of Information Technology Nanjing Xiaozhuang College Nanjing China Department of Computer Science Nanjing University of Aeronautics and Astronautics Nanjing China
In this paper, we present a fast biological data mining algorithm named IRTM based on embedded frequent subtree. We also advance a string encoding method for representing the trees, a scope-list for extending all subs... 详细信息
来源: 评论
The design of PROFIBUS-DP and CAN bus communications unit in drilling rig control system
The design of PROFIBUS-DP and CAN bus communications unit in...
收藏 引用
International conference on computer Engineering and Technology
作者: Zhang, Qi-Zhi He, Yu-Yao Li, Lin Shen, Xiao-Hui College of Marine Northwestern Polytechnical University Xi'an China Key Laboratory of Drilling Rigs Controlling Technique Xi'an Shiyou University Xi'an China
The paper presents that PROFIBUS-DP and CAN bus communication unit is developed. For drilling rig electric control system the communication unit achieves communication function between PLC and diesel generator control... 详细信息
来源: 评论