咨询与建议

限定检索结果

文献类型

  • 2,020 篇 会议
  • 445 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 2,466 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 647 篇 工学
    • 416 篇 电气工程
    • 370 篇 计算机科学与技术...
    • 169 篇 软件工程
    • 131 篇 信息与通信工程
    • 39 篇 控制科学与工程
    • 24 篇 网络空间安全
    • 22 篇 电子科学与技术(可...
    • 20 篇 仪器科学与技术
    • 8 篇 机械工程
    • 7 篇 交通运输工程
    • 7 篇 航空宇航科学与技...
    • 6 篇 土木工程
    • 5 篇 材料科学与工程(可...
    • 4 篇 生物医学工程(可授...
  • 69 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 16 篇 公共管理
    • 6 篇 工商管理
  • 58 篇 理学
    • 14 篇 系统科学
    • 13 篇 物理学
    • 10 篇 科学技术史(分学科...
    • 8 篇 数学
    • 4 篇 生物学
  • 24 篇 法学
    • 9 篇 法学
    • 8 篇 政治学
    • 7 篇 社会学
  • 15 篇 教育学
    • 13 篇 教育学
    • 5 篇 心理学(可授教育学...
  • 6 篇 文学
    • 3 篇 外国语言文学
  • 6 篇 医学
    • 5 篇 临床医学
  • 5 篇 历史学
    • 5 篇 世界史
  • 3 篇 军事学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 经济学

主题

  • 2,466 篇 computer hacking
  • 383 篇 computer crime
  • 287 篇 internet
  • 273 篇 information secu...
  • 254 篇 computer securit...
  • 220 篇 intrusion detect...
  • 217 篇 protection
  • 183 篇 data security
  • 183 篇 security
  • 170 篇 cryptography
  • 165 篇 computer network...
  • 140 篇 protocols
  • 134 篇 authentication
  • 132 篇 computer science
  • 132 篇 privacy
  • 126 篇 databases
  • 123 篇 ip networks
  • 115 篇 servers
  • 113 篇 malware
  • 105 篇 monitoring

机构

  • 8 篇 department of ma...
  • 8 篇 michigan state u...
  • 7 篇 chitkara univers...
  • 6 篇 division of engi...
  • 5 篇 ibm thomas j. wa...
  • 5 篇 ibm almaden rese...
  • 5 篇 xerox palo alto ...
  • 5 篇 department of in...
  • 4 篇 tima laboratory ...
  • 4 篇 dept. of electri...
  • 4 篇 purdue universit...
  • 4 篇 rochester instit...
  • 4 篇 school of cyber ...
  • 4 篇 univ n carolina ...
  • 4 篇 electronics and ...
  • 4 篇 department of in...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 arizona state un...
  • 3 篇 cisuc department...

作者

  • 16 篇 hsinchun chen
  • 8 篇 m. hack
  • 7 篇 holt thomas j.
  • 7 篇 voas jeffrey
  • 6 篇 kshetri nir
  • 6 篇 weifeng li
  • 6 篇 paulo shakarian
  • 6 篇 j.b. hacker
  • 6 篇 fang-yie leu
  • 5 篇 chia-mei chen
  • 5 篇 t.j. hacker
  • 5 篇 sagar samtani
  • 5 篇 marco vieira
  • 5 篇 r. leveugle
  • 5 篇 paulson ld
  • 5 篇 victor benjamin
  • 5 篇 d.b. rutledge
  • 5 篇 ericsson marin
  • 4 篇 issa traore
  • 4 篇 m. kim

语言

  • 2,457 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"主题词=Computer hacking"
2466 条 记 录,以下是1-10 订阅
排序:
Moral Beliefs, Self-Control, and Sports: Effective Antidotes to the Youth computer hacking Epidemic
Moral Beliefs, Self-Control, and Sports: Effective Antidotes...
收藏 引用
Annual Hawaii International Conference on System Sciences (HICSS)
作者: Qing Hu Chenghong Zhang Zhengchuan Xu Iowa State University USA Fudan University China
While research on computer hackers has a long history, most of the studies in the past three decades have been qualitative and anecdotal in nature. The question why young computer talents become computer hackers remai... 详细信息
来源: 评论
Consecutive Load Redistribution Attack Without Line Admittance Information
收藏 引用
IEEE TRANSACTIONS ON SMART GRID 2025年 第2期16卷 1762-1774页
作者: Liu, Zelin Liu, Tao Song, Yue Hill, David J. Univ Hong Kong Dept Elect & Elect Engn Hong Kong Peoples R China Univ Hong Kong Shenzhen HKU Shenzhen Inst Res & Innovat Shenzhen 518057 Peoples R China Tongji Univ Dept Control Sci & Engn Natl Key Lab Autonomous Intelligent Unmanned Syst Shanghai 201804 Peoples R China Tongji Univ Shanghai Inst Intelligent Sci & Technol Shanghai 201804 Peoples R China Monash Univ Dept Elect & Comp Syst Engn Clayton Vic 3800 Australia
This paper develops a novel method for launching a stealthy Load Redistribution Attack (LRA) without requiring knowledge of the power network's admittance matrix. Initially, equations involving the admittance matr... 详细信息
来源: 评论
ABDM: Anonymity-Based Big Data Management for Protecting Healthcare Data from Privacy Breach
收藏 引用
IEEE NETWORK 2025年 第1期39卷 298-305页
作者: Kim, Jinyong Jeong, Jaehoon Kim, Jeonghyeon Kim, Joomin Sungkyunkwan Univ Dept Comp Sci & Engn Suwon 16419 Gyeonggi Do South Korea Huinno Co Ltd Seoul 06011 South Korea
As the healthcare industry has continued to develop and the medical data becomes digitized, the risk of data leakage from attacks grows. All medical data is encrypted and stored to prevent data leakage, but from big d... 详细信息
来源: 评论
Robust Intrusion Detection With Combinatorial Fusion and Generative Artificial Intelligence
收藏 引用
computer 2025年 第4期58卷 46-57页
作者: Owusu, Evans Mapkar, Mariyam Rahouti, Mohamed Verma, Dinesh C. Fordham Univ Dept Comp & Informat Sci New York NY 10458 USA IBM Thomas J Watson Res Ctr Yorktown Hts NY 10598 USA
This article proposes an advanced intrusion detection system that combines combinatorial fusion analysis with generative artificial intelligence to improve anomaly detection in intelligent systems. It addresses challe... 详细信息
来源: 评论
Event-Triggered Resilient Control for Interconnected Servo Systems Under Malicious Attacks
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2025年 第6期12卷 7590-7598页
作者: Miao, Zhenhai Li, Meng Chen, Yong Zhang, Meng Univ Elect Sci & Technol China Sch Automat Engn Chengdu 611731 Peoples R China Jiaotong Univ Sch Cyber Sci & Engn Xian 710049 Peoples R China
This article investigates the tracking control of interconnected servo systems, where Denial-of-Service attacks and false-data-injection attacks are considered. In order to ensure the control performance and security,... 详细信息
来源: 评论
MAD-CTI: Cyber Threat Intelligence Analysis of the Dark Web Using a Multi-Agent Framework
收藏 引用
IEEE ACCESS 2025年 13卷 40158-40168页
作者: Shah, Sayuj Madisetti, Vijay K. Georgia Inst Technol Coll Comp Atlanta GA 30332 USA Georgia Inst Technol Sch Cybersecur & Privacy Atlanta GA 30332 USA
The dark web is a host to illicit activities where hacker forums, blogs, and articles provide significant insights into Cyber Threat Intelligence (CTI) that are frequently unavailable on the surface web. The increasin... 详细信息
来源: 评论
Enhancing Networked Control System Resilience to TCP/IP Protocol DoS Attacks: Performance Analysis and Intelligent Controller Design
收藏 引用
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING 2025年 22卷 6608-6618页
作者: Cai, Xiao Sun, Yanbin Shi, Kaibo Xie, Xiangpeng Soh, Yeng Chai Qiao, Cheng Tian, Zhihong Guangzhou Univ Cyberspace Inst Adv Technol Guangzhou 510006 Peoples R China Lion Rock Labs Cyberspace Secur Hong Kong Peoples R China Chengdu Univ Sch Informat Sci & Engn Chengdu 610106 Sichuan Peoples R China Nanjing Univ Posts & Telecommun Sch Internet Things Nanjing 210023 Peoples R China Nanyang Technol Univ Sch Elect & Elect Engn Singapore 639798 Singapore
This study examines denial-of-service (DoS) attacks on networked control systems (NCSs) caused by TCP/IP protocol vulnerabilities. It conducts a comprehensive analysis of hacker tactics to uncover vulnerability exploi... 详细信息
来源: 评论
Security Vulnerability (Backdoor Trojan) During Machine Learning Accelerator Design Phases
收藏 引用
IT PROFESSIONAL 2025年 第1期27卷 65-72页
作者: Sengupta, Anirban Anshul, Aditya Chourasia, Vishal Bhui, Nabendu Indian Inst Technol Indore Comp Sci & Engn Indore 453552 India Indian Inst Technol Indore Comp Sci & Engn CSE Indore 453552 India Indian Inst Technol Indore Indore 453552 India
This article provides a broad perspective for readers on how security vulnerabilities can be exploited by hackers during the design of machine learning (ML) accelerators such as convolutional neural networks. The arti... 详细信息
来源: 评论
A Decentralized Reputation Management Model for Enhanced IoV Networks With 5G Broadcast Services
收藏 引用
IEEE TRANSACTIONS ON BROADCASTING 2025年 第1期71卷 63-73页
作者: Zuo, Jinxin Wang, Ziping Guo, Chenqing Xie, Weixuan Wu, Hao Yu, Peng Lu, Yueming Beijing Univ Posts & Telecommun Sch Cyberspace Secur Minist Educ Beijing 100876 Peoples R China Beijing Univ Posts & Telecommun Key Lab Trustworthy Distributed Comp & Serv Beijing 100876 Peoples R China CNCERT CC Beijing 100094 Peoples R China Beijing Univ Posts & Telecommun Sch Informat & Commun Engn Beijing 100876 Peoples R China Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
This paper investigates the challenges of data trust sharing faced by Internet of Vehicles (IoV) network with 5G broadcast services. Particularly we develop a decentralized IoV reputation management model with spatiot... 详细信息
来源: 评论
Differential Privacy, Firm-Level Data, and the Binomial Pathology
收藏 引用
IEEE SECURITY & PRIVACY 2025年 第1期23卷 8-16页
作者: Clark, David D. Garfinkel, Simson Claffy, K. C. MIT Comp Sci & Artificial Intelligence Lab Cambridge MA 02139 USA BasisTech Technol Accelerator Somerville MA 02144 USA Ctr Appl Internet Data Anal La Jolla CA 92093 USA
Differential privacy (DP) is a privacy-enhancing technology that is increasingly being used by policy makers in the United States and Europe, but it is not well suited to protect corporate proprietary information that... 详细信息
来源: 评论