咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是161-170 订阅
排序:
Optimized Fractional-Order PID Controller for Temperature Control of CSTH: A Comparative Study with PID Cascade Controller
Optimized Fractional-Order PID Controller for Temperature Co...
收藏 引用
2025 International Conference on Energy, Power, Environment, Control and Computing, ICEPECC 2025
作者: Alaswadi, Abdulaziz F. Alyazidi, Nezar M. AL-Aswadi, Fatima N. Ahmed, Amjed Abbas Department of Control and Instrumentation Engineering King Fahd University of Petroleum and Minerals Dhahran 31261 Saudi Arabia Interdisciplinary Center of Smart Mobility and Logistics King Fahd University of Petroleum and Minerals Dhahran 31261 Saudi Arabia Institute of Computer Science & Digital Innovation (ICSDI) UCSI University Kuala Lumpur 56000 Malaysia Faculty of Computer Science and Engineering Hodeidah University Al Hudaydah Yemen Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Imam AlKadhum College (IKC) Baghdad Iraq
Controlling the temperature in chemical reactors, heating furnaces, distillation columns, and reboilers for circulating heating fluids is crucial across all industries. This project is a simulation-based study where b... 详细信息
来源: 评论
Machine Learning-Based security Mechanism for Detecting Phishing Attacks
Machine Learning-Based Security Mechanism for Detecting Phis...
收藏 引用
2024 IEEE International Conference on Communications, Computing, Cybersecurity and Informatics, CCCI 2024
作者: Bhatt, Pragya Obaidat, Mohammad S. Dangwal, Gagan Das, Ashok Kumar Wazid, Mohammad Sadoun, Balqies Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun248 002 India University of Science and Technology Beijing Beijing100083 China SRM University Kattankulathur603203 India Amity University Noida201301 India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad500 032 India College of Engineering Al-Balqa' Applied University Al-Salt19117 Jordan
Phishing attacks pose a serious threat to online users by impersonatina trustworthy entities and stealing sensitive data. This can result in reputational damage, financial loss, ransomware, or additional spyware outbr... 详细信息
来源: 评论
POFM: Profit-Oriented Flow Management in SDN-Based Data center Networks
POFM: Profit-Oriented Flow Management in SDN-Based Data Cent...
收藏 引用
IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)
作者: You-Chiun Wang Jhong-Ting Liang Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung Taiwan Information Security Research Center National Sun Yat-sen University Kaohsiung Taiwan
In a data center network (DCN), there are numerous hosts connected by well-organized switches, usually involving a large amount of data transmission to offer cloud services. How to manage flows in a DCN by deciding pa... 详细信息
来源: 评论
A Review of Key Elements for Underwater Wireless Sensor Networks
A Review of Key Elements for Underwater Wireless Sensor Netw...
收藏 引用
Decision Aid sciences and Application (DASA), International Conference on
作者: Amjed Abbas Ahmed Ali Hamza Najim Aymen Mohammed Al-Dulaimi Khattab M. Ali Alheeti Nurhizam Safie Mohd Satar Salah A. Aliesawi Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Imam AlKadhum College (IKC) Baghdad Iraq Department of Computer Technical Engineering Imam Al-Kadhum College (IKC) Al-Diwaniyah Iraq Department of Communication Technical Engineering College of Engineering Techniques Al-Farahidi University Baghdad Iraq Computer Networking Systems Department College of Computer and Information Technology University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Computer Networking Systems College of Computer and Information Technology University of Anbar Anbar Iraq
Underwater Wireless Sensor Networks (UWSNs) are emerging and have huge prospects since they have various applications in oceanography, environmental monitoring, and underwater communication. These networks contain low... 详细信息
来源: 评论
Systematic Review: Predictive Models for the Winning Team of Super Leagues (SL)  2
Systematic Review: Predictive Models for the Winning Team of...
收藏 引用
2nd International Conference on Business Analytics for Technology and security, ICBATS 2023
作者: Muneer, Salman Alvi, Muhammad Bux Al Sakhnani, Mahmoud Raza, Hamamd Ghazal, Taher M. Ahmad, Munir NCBA&E School of Computer Science Lahore Pakistan Applied Science Private University Applied Science Research Center Amman11937 Jordan The Islamia University of Bahawalpur Department of Computer Systems Engineering Bahawalpur Pakistan University City Sharjah School of Business Skyline University College Sharjah1797 United Arab Emirates National College of Business Administration & Economics School of Computer Science Lahore Pakistan Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia School of Information Technology Skyline University College University City Sharjah 1797 United Arab Emirates
The Pakistan Super League (PSL) is one of the most popular cricket leagues in the world, attracting millions of fans and spectators each year. With the 2023 edition of the league just around the corner, the use of pre... 详细信息
来源: 评论
Performance Analysis of Energy and Secure Efficient Routing for Wireless Sensor Networks
Performance Analysis of Energy and Secure Efficient Routing ...
收藏 引用
Decision Aid sciences and Application (DASA), International Conference on
作者: Amjed Abbas Ahmed Zainab Mohammed Hussein Ali Hamza Najim Khattab M. Ali Alheeti Nurhizam Safie Mohd Satar Aisha Hassan Abdallah Hashim Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Imam AlKadhum College (IKC) Baghdad Iraq Department of Computer Science Information System University of Technology Imam AIKadhum College (IKC) Baghdad Iraq Department of Computer Technical Engineering Imam Al-Kadhum College (IKC) Al-Diwaniyah Iraq Computer Networking Systems Department College of Computer and Information Technology University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Electrical and Computer Engineering Faculty of Engineering International Islamic University Malaysia Selangor Malaysia
Wireless Sensor Networks (WSNs) are essential for various applications, but their architecture makes them vulnerable to attacks. While traditional security methods like authentication and encryption offer some protect... 详细信息
来源: 评论
Access Control Based on Self-Sovereign Identity  16
Access Control Based on Self-Sovereign Identity
收藏 引用
16th International Conference on Electronics, computers and Artificial Intelligence, ECAI 2024
作者: Nita, Stefania Loredana Mihailescu, Marius Iulian Marascu, Valentina Rogobete, Marius Faculty of Information Systems and Cyber Security Military Technical Academy 'Ferdinand i' Department of Computers and Cybersecurity Bucharest Romania 'Spiru Haret' University Scientific Research Center in Mathematics and Informatics Faculty of Engineering and Computer Science Bucharest Romania National Institute for Laser Plasma and Radiation Physics Low Temperature Plasma Department Bucharest Romania Telematics Harman International Bucharest Romania
In the rapidly growing interest in digital identity management, there is an important shift toward adopting verifiable credentials, often based on blockchain technology. This transition highlights a growing interest i... 详细信息
来源: 评论
A User-friendly Model for Ransomware Analysis Using Sandboxing
收藏 引用
computers, Materials & Continua 2021年 第6期67卷 3833-3846页
作者: Akhtar Kamal Morched Derbali Sadeeq Jan Javed Iqbal Bangash Fazal Qudus Khan Houssem Jerbi Rabeh Abbassi Gulzar Ahmad Department of Computer Science&Information Technology National Center for Cyber SecurityUniversity of Engineering&TechnologyPeshawar25120Pakistan Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Institute of Computer Sciences and Information Technology(ICS/IT) University of AgriculturePeshawar25130Pakistan Department of Industrial/Electrical Engineering College of EngineeringUniversity of Ha’ilHail1234Saudi Arabia Department of Electrical Engineering University of Engineering&TechnologyPeshawar25120Pakistan
Ransomware is a type of malicious software that blocks access to a computer by encrypting user’s files until a ransom is paid to the *** have been several reported high-profile ransomware attacks including WannaCry,P... 详细信息
来源: 评论
Toward Multimodal Vertical Federated Learning: A Traffic Analysis Case Study
Toward Multimodal Vertical Federated Learning: A Traffic Ana...
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Agnideven Palanisamy Sundar Feng Li Xukai Zou Tianchong Gao Department of Computer and Information Science Indiana University-Purdue University Indianapolis Indianapolis IN USA Department of Computer and Information Technology Indiana University-Purdue University Indianapolis Indianapolis IN USA School of Cyber Science and Engineering Southeast University Nanjing China Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing China
Federated Learning (FL) is an emerging subclass of Artificial Intelligence that decentralizes the learning process. Unlike the well-studied Horizontal Federated Learning (HFL), which requires the feature space of all ... 详细信息
来源: 评论
A Lightweight and Robust Access Control Protocol for IoT-based e-Healthcare Network
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Ghaffar, Zahid Kuo, Wen-Chung Mahmood, Khalid Tariq, Tayyaba Shamshad, Salman Das, Ashok Kumar Alenazi, Mohammed J.F. National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University Department of Computer Science and Engineering College of Informatics 145 Anam-ro Seongbuk-gu Seoul02841 Korea Republic of King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh Saudi Arabia
Internet of Things (IoT) devices are crucial components in e-healthcare networks. It enables remote patient health monitoring and facilitates seamless communication among medical sensors, wearable devices, and healthc... 详细信息
来源: 评论