咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是111-120 订阅
排序:
Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks  33
Design of Lightweight Cryptography based Deep Learning Model...
收藏 引用
33rd International Telecommunication Networks and Applications Conference, ITNAC 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Nafi, Nazmus Shaker Aman, Azana Hafizah Islam, Shayla Fadhil, Saif Aamer Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia Department of Computer Techniques Engineering Baghdad10011 Iraq Integrated Work Package KBR SouthbankVIC Australia Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia
Depending on a device's encryption mechanism, a wide variety of tangible details could be exposed. These leaks are used in side-channel analysis, which is used to get keys. Due to deep learning's sensitivity t... 详细信息
来源: 评论
Unveiling the Landscape of Machine Learning and Deep Learning Methodologies in Network security: A Comprehensive Literature Review  2
Unveiling the Landscape of Machine Learning and Deep Learnin...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Saeed, Nouf Majid Sultan Eid Ibrahim, Amer Ali, Liaqat Al-Dmour, Nidal A. Mohammed, Abdul Salam Ghazal, Taher M. American University In The Emirates Dubai United Arab Emirates College Of Engineering And Technology University Of Science And Technology Of Fujairah Fujairah United Arab Emirates College Of Engineering Mutah University Department Of Computer Engineering Jordan Skyline University College University City Sharjah Shariah United Arab Emirates Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
The dynamic nature of cyber threats offers a continual problem in the field of cybersecurity in the context of the expanding internet environment. This study provides an in-depth assessment of the literature on machin... 详细信息
来源: 评论
Optimization Technique for Deep Learning Methodology on Power Side Channel Attacks  33
Optimization Technique for Deep Learning Methodology on Powe...
收藏 引用
33rd International Telecommunication Networks and Applications Conference, ITNAC 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Nafi, Nazmus Shaker Aman, Azana Hafizah Islam, Shayla Nahi, Mohammad Siab Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia Department of Computer Techniques Engineering Baghdad10011 Iraq GS-APAC Kellogg Brown and Root Melbourne Australia Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia
The first non-profiled side-channel attack (SCA) method using deep learning is Timon's Differential Deep Learning Analysis (DDLA). This method is effective in retrieving the secret key with the help of deep learni... 详细信息
来源: 评论
SIFT-based Approach for Dorsal Hand Veins Images Recognition  26
SIFT-based Approach for Dorsal Hand Veins Images Recognition
收藏 引用
26th International Conference on Digital Signal Processing and its Applications, DSPA 2024
作者: Egorov, Dobroslav P. Mizinov, Pavel V. Kravchenko, Oleg V. Konnova, Natalia S. Osipenko, Gavriil V. Kotel'nikov Institute of Radio Engineering and Electronics of Ras Moscow Russia Bauman Moscow State Technical University Department of Information Security Moscow Russia Computer Science and Control of Ras Federal Research Center Moscow Russia Moscow Aviation Institute Moscow Russia
In this paper we present a system for person identification using dorsal hand veins pattern images. A simple approach is developed based on scale-invariant feature transform (SIFT) method for image features extraction... 详细信息
来源: 评论
An Extensive Analysis of Cybersecurity in the Era of Advanced Threats  2
An Extensive Analysis of Cybersecurity in the Era of Advance...
收藏 引用
2nd IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Krishnaveni, S. Geetha, B.T. Rashmitha Duvvada, Sree Sathe, Manoj Amrita Soni, Mukesh Adithya Institute of Technology Department of Management Studies Kovilpalayam Coimbatore India Saveetha School of Engineering Simats Department of Ece Tamil Nadu India University of Wisconsin Madison Department of Cse United States Computer Science Pes Modern Institute of Business Studies Pune India Sharda School of Engineering & Technology Sharda University Center for Cyber Security and Cryptology Computer Science & Engineering Uttar Pradesh Greater Noida India Dr. D. Y. Patil Vidyapeeth Dr. D. Y. Patil School of Science & Technology Tathawade Pune India
The scientific and business communities have taken an interest in the Internet of Things (IoT) because of its tremendous impact on human life. The IoTs have emerged as a state-of-the-art framework for creating intelli... 详细信息
来源: 评论
Medical Diagnoses: Heart Disease Prediction  2
Medical Diagnoses: Heart Disease Prediction
收藏 引用
2nd International Conference on Business Analytics for Technology and security, ICBATS 2023
作者: Mahfuri, Mahmoud Ghazal, Taher M. Mudassar, Muhammad Siddiqui, Shahan Yamin Farooq, Sajid Kanwal, Nayab Ahmad, Munir International University for Science and Technolgy Computer and Information Technolgy Department Faculty of Engineering Syria Center for Cyber Security Faculty of Information Science and Technology Selangor Bangi43600 Malaysia Skyline University College School of Information Technology University City Sharjah 1797 United Arab Emirates The University of Lahore Lahore Pakistan Minhaj University Department of Computer Science Lahore Pakistan School of Computer Science National College of Business Administration & Economics Lahore Pakistan NCBA&E School of Computer Science Lahore Pakistan Applied Science Private University Applied Science Research Center Amman11937 Jordan
The successful and continuously increasing applications of machine learning (ML) and data mining (DM) in the wide range of fields such as e-businesses, public or private sectors, marketing and retails has led the ML a... 详细信息
来源: 评论
Secure Blockchain Integration Approach for Knowledge Discovery in Industrial Internet of Things
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2025年 6卷 4772-4787页
作者: Rohan Tripathi Ritam Rao Vivekananda Bhat K. Abhishek Kumar Pandey Ashok Kumar Das Department of Computer Science and Engineering Manipal Institute of Technology Manipal Academy of Higher Education Manipal India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Department of Computer Science and Engineering College of Informatics Korea University Seoul South Korea
The field of Industrial Internet of Things (IIoT) is now being duly recognized as a revolutionary area in industrial automation. With the budding interest of knowledge discovery that helps the businesses in applying t... 详细信息
来源: 评论
An Automated Platform for Gathering and Managing Open-Source Cyber Threat Intelligence  2
An Automated Platform for Gathering and Managing Open-Source...
收藏 引用
2nd International Conference on Business Analytics for Technology and security, ICBATS 2023
作者: Al-Dmour, Nidal A. Kamrul Hasan, Mohammad Ajmal, Masood Ali, Muhammad Naseer, Iftikhar Ali, Atif Hamadi, Hussam Al Ali, Nasir Mutah University College of Engineering Department of Computer Engineering Jordan Center for Cyber Security Malaysia Riphah International University Islamabad Pakistan University of Central Punjab Pakistan The Superior University Faculty of Computer Science & Information Technology Lahore Pakistan Cyberjaya Malaysia College of Engineering and IT University of Dubai United Arab Emirates School of Computer Science NCBA&E Lahore Pakistan Applied Science Private University Applied Science Research Center Amman11937 Jordan
The community has begun paying more attention to source OSCTI Cyber Threat Intelligence to stay informed about the rapidly changing cyber threat landscape. Numerous reports from the OSCTI frequently provide Informatio... 详细信息
来源: 评论
Cyberbullying Detection in Hinglish Language
Cyberbullying Detection in Hinglish Language
收藏 引用
Electrical Electronics and Computing Technologies (ICEECT), International Conference on
作者: Rajiv Kumar Vipin Rai Shivani Joshi Daksh Raj Amrita Amrita Department of Computer Science & Engineering Galgotias University Greater Noida U.P. India Department of Computer Science and Engineering Galgotias College of Engineering and Technology Greater Noida U.P. India Center for Cyber Security and Cryptology Computer Science & Engineering Sharda School of Engineering & Technology Sharda University Greater Noida India
Cyberbullying represents one of the most recent challenges stemming from the widespread adoption of social media platforms. With the surge in social media usage, the right to express oneself is being misused. Statisti... 详细信息
来源: 评论
Heart Disease Prediction Using Machine Learning  2
Heart Disease Prediction Using Machine Learning
收藏 引用
2nd International Conference on Business Analytics for Technology and security, ICBATS 2023
作者: Ghazal, Taher M. Ibrahim, Amer Akram, Ali Sheraz Qaisar, Zahid Hussain Munir, Sundus Islam, Shanza Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia Skyline University College University City School of Information Technology Sharjah1797 United Arab Emirates American University in the Emirates College of Computer and Information Technology Dubai United Arab Emirates NCBA&E School of Computer Science Lahore Pakistan Applied Science Private University Applied Science Research Center Amman11937 Jordan NFC Institute of Engineering and Technology Department of Computer Science Multan Pakistan Lahore Garrison University Lahore Department of Computer Science Lahore Pakistan Lahore Garrion University Lahore Department of Computer Science Lahore Pakistan
The heart disease cases are rising day by day and it is very Important to predict such diseases before it causes more harm to human lives. The diagnosis of heart disease is such a complex task i.e., it should be perfo... 详细信息
来源: 评论