咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是1-10 订阅
排序:
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Endogenous security of FQn Networks: Adaptive System-Level Fault Self-Diagnosis
收藏 引用
IEEE Transactions on Reliability 2024年 第3期73卷 1659-1668页
作者: Lin, Yuhang Lin, Limei Huang, Yanze Xu, Li Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
Endogenous security has the ability to discover, eliminate, and solve internal security problems and hidden dangers within the network, and is a superior technology to ensure future network security. The t/k-diagnosis... 详细信息
来源: 评论
Credit Card Fraud Detection Using ML Techniques  1
收藏 引用
International Conference on Recent Developments in Cyber security, ReDCySec 2023
作者: Bonkoungou, Samiratou Roy, Nihar Ranjan Ako, Nomel Haymes Axel-Elie Junior Mishra, Alpna Department of Computer Science and Engineering Sharda University Noida India Center of Cyber Security and Cryptology Sharda University Noida India
With the increasing use of Internet, online banking transactions have also increased. Everyday more and more users are being added to the cyberspace, which has also attracted cybercriminals. These scammers use stolen ... 详细信息
来源: 评论
Forward Legal Anonymous Group Pairing-Onion Routing for Mobile Opportunistic Networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6595-6612页
作者: Zhu, Xiuzhen Lin, Limei Huang, Yanze Wang, Xiaoding Hsieh, Sun-Yuan Wu, Jie Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan Temple University Department of Computer and Information Science 1925 N. 12th St PhiladelphiaPA19122 United States
Mobile Opportunistic Networks (MONs) often experience frequent interruptions in end-to-end connections, which increases the likelihood of message loss during delivery and makes users more susceptible to various cyber ... 详细信息
来源: 评论
A Review of Lightweight security and Privacy for Resource-Constrained IoT Devices
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 31-63页
作者: Sunil Kumar Dilip Kumar Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You Department of Computer Science and Engineering National Institute of Technology JamshedpurJamshedpurIndia School of Computing Science and Engineering VIT University BhopalBhopal466114India Center for Industrial Software The Maersk Mc-Kinney Moller InstituteUniversity of Southern DenmarkSonderborgOdenseDenmark Department of Applied Mathematics and Computer Science Technical University of DenmarkLyngby2800Denmark Department of Information Security Cryptologyand MathematicsKookmin UniversitySeoulSouth Korea
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ... 详细信息
来源: 评论
Implementing Three Factors Authentication System (3FA) to Maintain Employee Attendance Record to Enhance security  3
Implementing Three Factors Authentication System (3FA) to Ma...
收藏 引用
3rd IEEE International Conference on Intelligent Technologies, CONIT 2023
作者: Johnson, Plezzant Columbus Kant, Shri Kumar, Sandeep Sharda University Department of Computer Science Engineering India Sharda University Center for Cyber Security and Cryptology India
Today as we all know that maintaining of employee credential have been some major issues around the world. Finding it more difficult to keep track of employees. With this, the company, institution, or government entit... 详细信息
来源: 评论
A Privacy-Aware Provably Secure Smart Card Authentication Protocol Based on Physically Unclonable Functions
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 第4期21卷 2766-2778页
作者: Fan, Chun-I Karati, Arijit Wu, Shou-Li National Sun Yat-sen University Department of Computer Science and Engineering Information Security Research Center The Intelligent Electronic Commerce Research Center Kaohsiung804 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804 Taiwan
For many industrial applications, the smart card is a necessary safety component in user authentication. Smart cards provided to the users are used in open and public places, making them susceptible to physical and cl... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph Networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
rafPS:A shapley-based visual analytics approach to interpret traffic
收藏 引用
Computational Visual Media 2024年 第6期10卷 1101-1119页
作者: Zezheng Feng Yifan Jiang Hongjun Wang Zipei Fan Yuxin Ma Shuang-Hua Yang Huamin Qu Xuan Song Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 18055China Department of Computer Science and Engineering Hong Kong University of Science and TechnologyHong KongChina Department of Computer Science University of ReadingBerkshire RG66AHUK Center for Spatial Information Science the University of TokyoTokyo 113-00331Japan Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Southern University of Science and TechnologyShenzhen 518055China
Recent achievements in deep learning(DL)have demonstrated its potential in predicting traffic *** predictions are beneficial for understanding the situation and making traffic control ***,most state-of-the-art DL mode... 详细信息
来源: 评论
IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2245-2267页
作者: Ashraf S.Mashaleh Noor Farizah Binti Ibrahim Mohammad Alauthman Mohammad Almseidin Amjad Gawanmeh School of Computer Sciences Universiti Sains MalaysiaPenangMalaysia Department Computer Center Al-Balqa Applied UniversitySaltJordan Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan Department of Computer Science Tafila Technical UniversityTafilaJordan College of Engineering and IT University of DubaiDubaiUnited Arab Emirates
Increasing Internet of Things(IoT)device connectivity makes botnet attacks more dangerous,carrying catastrophic *** IoT botnets evolve,their dynamic and multifaceted nature hampers conventional detection *** paper pro... 详细信息
来源: 评论