咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 9 篇 期刊文献

馆藏范围

  • 23 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 12 篇 计算机科学与技术...
    • 8 篇 信息与通信工程
    • 7 篇 电气工程
    • 4 篇 软件工程
    • 2 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 交通运输工程
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 公共管理
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 系统科学
  • 1 篇 医学
    • 1 篇 公共卫生与预防医...

主题

  • 23 篇 distributed secu...
  • 3 篇 authentication
  • 2 篇 proxy
  • 2 篇 open access
  • 2 篇 grid computing e...
  • 2 篇 iot
  • 2 篇 wireless sensor ...
  • 2 篇 internet
  • 2 篇 software-defined...
  • 2 篇 distributed proc...
  • 2 篇 machine learning
  • 2 篇 security
  • 2 篇 edge computing
  • 2 篇 authorization
  • 2 篇 low latency
  • 2 篇 cpri over ethern...
  • 1 篇 threats
  • 1 篇 smart homes
  • 1 篇 jamming
  • 1 篇 data security

机构

  • 1 篇 fraunhofer heinr...
  • 1 篇 the icfai univer...
  • 1 篇 portugal telecom...
  • 1 篇 fraunhofer heinr...
  • 1 篇 ruhr univ bochum...
  • 1 篇 univ london impe...
  • 1 篇 kings coll londo...
  • 1 篇 portugal telecom...
  • 1 篇 univ manitoba de...
  • 1 篇 georgia state un...
  • 1 篇 department of ma...
  • 1 篇 fundacio i2cat c...
  • 1 篇 school of comput...
  • 1 篇 king fahd univ p...
  • 1 篇 kings coll londo...
  • 1 篇 stockholm univ d...
  • 1 篇 univ novi sad fa...
  • 1 篇 university of es...
  • 1 篇 research center ...
  • 1 篇 jahangirnagar un...

作者

  • 1 篇 wijesekera dumin...
  • 1 篇 vijay somers
  • 1 篇 vidya m. s.
  • 1 篇 saxena himali
  • 1 篇 simoes paulo
  • 1 篇 carlos bock
  • 1 篇 parker michael
  • 1 篇 harn l.
  • 1 篇 patil mala c.
  • 1 篇 bock carlos
  • 1 篇 srinivasan anand
  • 1 篇 mahoney william
  • 1 篇 he dk
  • 1 篇 ivanovic mirjana
  • 1 篇 fiore ugo
  • 1 篇 kumbhare ashish
  • 1 篇 mccarthy john
  • 1 篇 cruz tiago
  • 1 篇 droste t
  • 1 篇 he dake

语言

  • 22 篇 英文
  • 1 篇 其他
检索条件"主题词=distributed security"
23 条 记 录,以下是1-10 订阅
排序:
A Formal Model of distributed security for Electronic Commerce Transactions Systems
收藏 引用
INTERNATIONAL JOURNAL OF NETWORKED AND distributed COMPUTING 2019年 第2期7卷 68-84页
作者: Ehikioya, Sylvanus A. Olukunle, Adepele A. Baze Univ Dept Comp Sci Abuja Nigeria Univ Manitoba Dept Comp Sci Winnipeg MB R3T 2N2 Canada
Every distributed system requires a secure environment for its users. security becomes even more important if users exchange sensitive information and value, across the network. An e-commerce environment is an example... 详细信息
来源: 评论
Resource Consumption Analysis of distributed Machine Learning for the security of Future Networks
收藏 引用
Procedia Computer Science 2024年 251卷 66-74页
作者: Md Muzammal Hoque Ijaz Ahmad Mohammad Tahir VTT Technical Research Centre of Finland Tekniikantie 21 Espoo 02150 Finland Department of Computing University of Turku Turku FI-20014 Finland
As the network continues to become more complex due to the increased number of devices and ubiquitous connectivity, the trend is shifting from a centralized implementation to decentralization. Similarly, strategies to... 详细信息
来源: 评论
QoS-Aware distributed security Architecture for 4G Multihop Wireless Networks
收藏 引用
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 2014年 第6期63卷 2886-2900页
作者: Rengaraju, Perumalraja Lung, Chung-Horng Srinivasan, Anand Velammal Coll Engn & Technol Dept Informat Technol Madurai 625009 Tamil Nadu India Carleton Univ Dept Syst & Comp Engn Ottawa ON K1S 5B6 Canada EION Wireless Inc Ottawa ON K2K 2E3 Canada
Vehicular communications have received a great deal of attention in recent years due to the demand for multimedia applications during travel and for improvements in safety. Safety applications often require fast messa... 详细信息
来源: 评论
CAAVI-RICS model for observing the security of distributed IoT and edge computing systems
收藏 引用
SIMULATION MODELLING PRACTICE AND THEORY 2020年 105卷 102125-102125页
作者: Pesic, Sasa Ivanovic, Mirjana Radovanovic, Milos Badica, Costin Univ Novi Sad Fac Sci Trg Dositeja Obradovica 4 Novi Sad Serbia Univ Craiova Craiova Romania
The pervasive integration of 'things' in the Internet of Things together with state-of-the-art computer systems provide a stimulating environment for creativity and business opportunities, but also a large ran... 详细信息
来源: 评论
6G Enabled Smart IoT in Healthcare System: Prospect, Issues and Study Areas  1
6G Enabled Smart IoT in Healthcare System: Prospect, Issues ...
收藏 引用
1st International Conference on Artificial Intelligence for Innovations in Healthcare Industries, ICAIIHI 2023
作者: Matre, Priti Vivek Kumbhare, Ashish Gedam, Ravi Sharma, Animesh Vaishnav, Naveen Kumar Naidu, Dileep Yashwantrao Chavan College of Engineering Dept. of Information Technology Maharashtra Nagpur India The Icfai University Faculty of Science and Technology Chhattisgarh Raipur India G H Raisoni University Department of Computer Science and Engineering Madhya Pradesh Saikheda India
The Internet of Medical Things, (IoMT) requires extensive and intelligent connection, enormous bandwidth, minimal latency, extremely high data rates, and enhanced healthcare experiences. In contrast to the current 5G ... 详细信息
来源: 评论
SEVA: A Smart Electronic Voting Application Using Blockchain Technology  4
SEVA: A Smart Electronic Voting Application Using Blockchain...
收藏 引用
4th IEEE International Conference on Blockchain (Blockchain)
作者: Abegunde, Jacob Spring, Joseph Xiao, Hannan Univ Hertfordshire Hatfield Herts England Kings Coll London London England
The development of electronic voting applications remains an active area of research and this has led to the proposal and implementation of many models based on blockchains. However, most of the proposed models are pa... 详细信息
来源: 评论
Towards SDN and Blockchain based IoT Countermeasures: A Survey  2
Towards SDN and Blockchain based IoT Countermeasures: A Surv...
收藏 引用
2nd International Conference on Sustainable Technologies for Industry 4.0 (STI)
作者: Zaman, Shakila Kaiser, M. Shamim Khan, Risala Tasin Mahmud, Mufti Brac Univ Dept CSE Dhaka Bangladesh Jahangirnagar Univ Inst Informat Technol Dhaka Bangladesh Nottingham Trent Univ Dept Comp Sci Nottingham England
security vulnerabilities have become significant concerns due to growing demand of Internet of Things (IoT) not only for home automation systems, but also for various industrial applications. Central security technolo... 详细信息
来源: 评论
Qualitative Study of security Resiliency Towards Threats in Future Internet Architecture  2nd
Qualitative Study of Security Resiliency Towards Threats in ...
收藏 引用
2nd Conference on Computational Methods in Systems and Software (CoMeSySo)
作者: Vidya, M. S. Patil, Mala C. BMSIT & M Dept Comp Sci & Engn Bengaluru India Univ Hort Sci COHB Dept Comp Sci Bagalkot India
With the consistent evolution of distributed networks and cloud computing, the communication process of existing Internet architecture are not at par to offer comprehensive security;thereby fails to cater up the dynam... 详细信息
来源: 评论
A Framework for Improved Home Network security  18
A Framework for Improved Home Network Security
收藏 引用
18th European Conference on Cyber Warfare and security (ECCWS)
作者: Craveiro, Antonio Oliveira, Ana Proenca, Jorge Cruz, Tiago Simoes, Paulo Univ Coimbra Dept Informat Engn Coimbra Portugal
modern home networks constitute a diverse ecosystem of devices and services, whose management is mostly handled by means of specific service or device provider mechanisms, with only a minority of customers possessing ... 详细信息
来源: 评论
Trust in Internet of Things: An architecture for the future IoT network
Trust in Internet of Things: An architecture for the future ...
收藏 引用
International Conference on Innovation in Engineering and Technology (ICIET)
作者: Sadique, Kazi Masum Rahmani, Rahim Johannesson, Paul Stockholm Univ Dept Comp & Syst Sci Stockholm Sweden
Current technology driven world is moving forward with massive implementation of smart objects. These smart objects or Internet of Things (IoT) nodes are involved in sensing of real time critical data from surrounding... 详细信息
来源: 评论