咨询与建议

限定检索结果

文献类型

  • 1 篇 会议

馆藏范围

  • 1 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 工学
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 计算机科学与技术...
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 1 篇 reliability
  • 1 篇 cross-layer tech...
  • 1 篇 big data

机构

  • 1 篇 sharda universit...
  • 1 篇 galgotias univer...
  • 1 篇 integral and inn...

作者

  • 1 篇 sharma priya
  • 1 篇 dwivedi shweta
  • 1 篇 kumar santosh
  • 1 篇 bhati nitesh sin...

语言

  • 1 篇 其他
检索条件"主题词=Cross-Layer Techniques Security Algorithm and Big Database"
1 条 记 录,以下是1-10 订阅
排序:
Computation of big Data security through cross-layer techniques  5
Computation of Big Data Security through Cross-Layer Techniq...
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Sharma, Priya Dwivedi, Shweta Bhati, Nitesh Singh Kumar, Santosh Sharda University Dept. of Computer Science Greater Noida India Integral and Innovative of Sustainable Education College Dept. of Information Technology Lucknow India Galgotias University School of Computing Science and Engineering Greater Noida India
Because smart devices are so common and have generated enormous volumes of data, a new strategy is required to handle the kinds of data known as big data in the modern world. Many people are quite concerned about secu... 详细信息
来源: 评论