咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是171-180 订阅
排序:
Recent Advances of Chimp Optimization Algorithm:Variants and Applications
收藏 引用
Journal of Bionic engineering 2023年 第6期20卷 2840-2862页
作者: Mohammad Sh.Daoud Mohammad Shehab Laith Abualigah Mohammad Alshinwan Mohamed Abd Elaziz Mohd Khaled Yousef Shambour Diego Oliva Mohammad AAlia Raed Abu Zitar College of Engineering Al Ain University112612Abu DhabiUnited Arab Emirates College of Computer Sciences and Informatics Amman Arab UniversityAmman11953Jordan Computer Science Department Prince Hussein Bin Abdullah Faculty for Information TechnologyAl Al-Bayt UniversityMafraq25113Jordan Hourani Center for Applied Scientific Research Al-Ahliyya Amman UniversityAmman19328Jordan MEU Research Unit Middle East UniversityAmman11831Jordan Applied Science Research Center Applied Science Private UniversityAmman11931Jordan School of Computer Sciences Universiti Sains Malaysia11800Pulau PinangMalaysia Faculty of Information Technology Applied Science Private UniversityAmman 11931Jordan Department of Mathematics Faculty of ScienceZagazig UniversityZagazig 7120001Egypt The Custodian of the Two Holy Mosques Institute for Haj and Umrah Research Umm Al-Qura UniversityMakkah 24382Saudi Arabia Depto.de Innovacio'n Basada en la Informacio'n y el Conocimiento Universidad de GuadalajaraCUCEI45129 GuadalajaraMexico Cyber Security Department Faculty of Science and Information TechnologyAl Zaytoonah University of JordanAmman 11733Jordan Sorbonne Center of Artificial Intelligence Sorbonne University-Abu Dhabi38044 Abu DhabiUnited Arab Emirates School of Engineering and Technology Sunway University Malaysia27500Petaling JayaMalaysia
Chimp Optimization Algorithm(ChOA)is one of the recent metaheuristics swarm intelligence *** has been widely tailored for a wide variety of optimization problems due to its impressive characteristics over other swarm ... 详细信息
来源: 评论
Federated Learning-Based Intelligent Indoor Smoke and Fire Detection System for Smart Buildings
Federated Learning-Based Intelligent Indoor Smoke and Fire D...
收藏 引用
2024 International Conference on Telecommunications and Intelligent Systems, ICTIS 2024
作者: Aymene Berkani, Mohamed Rafik Chouchane, Ammar Himeur, Yassine Abdennebi, Anes Sagiroglu, Seref Amira, Abbes Medea Algeria University Biskra University Center of Barika Laboratory of LI3C Amdoukal Road Barika05001 Algeria University of Dubai College of Engineering and Information Technology Dubai United Arab Emirates École de Technologie Supérieure Software and Information Technology Engineering Montréal Canada Analytics Security R&D Center Gazi University Artificial Intelligence and Big Data Ankara Turkey University of Sharjah Department of Computer Science Sharjah United Arab Emirates
Ensuring safety in smart buildings is crucial due to the increasing prevalence of smoke and fire hazards in modern environments. This paper introduces a novel privacy-preserving FL approach based on a CNN1D for smoke ... 详细信息
来源: 评论
Data Exchange for the Metaverse with Accountable Decentralized TTPs and Incentive Mechanisms
收藏 引用
IEEE Transactions on Big Data 2025年
作者: Zhang, Liang Wu, Xingyu Ma, Yuhang Kan, Haibin Hainan University School of Cyberspace Security School of Cryptology Haikou570228 China Hong Kong University of Science and Technology Department of Industrial Engineering and Decision Analytics China Fudan University School of Computer Science Shanghai200433 China Shanghai Engineering Research Center of Blockchain Shanghai200433 China Yiwu Research Institute of Fudan University Yiwu City322000 China
As a global virtual environment, the metaverse poses various challenges regarding data storage, sharing, interoperability, and privacy preservation. Typically, a trusted third party (TTP) is considered necessary in th... 详细信息
来源: 评论
A Survey of DDoS Attacks Detection Schemes in SDN Environment
A Survey of DDoS Attacks Detection Schemes in SDN Environmen...
收藏 引用
2023 IEEE International Conference on computer, information, and Telecommunication Systems, CITS 2023
作者: Rawat, Surabhi Gusain Obaidat, Mohammad S. Pundir, Sumit Wazid, Mohammad Kumar Das, Ashok Singh, Devesh Pratap Hsiao, Kuei-Fang Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun248002 India King Abdullah Ii School of Information Technology The University of Jordan Amman11942 Jordan University of Science and Technology Beijing Beijing100083 China Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad500 032 India Computer Science Department University of Texas-Permian Basin 4901 E. University Blvd. OdessaTX79762 United States
Denial-of-service (DoS) attacks are a major concern in the field of Internet technology, and they pose a difficult security challenge. Among the different types of DoS attacks, distributed denial-of-service (DDoS) att... 详细信息
来源: 评论
Intelligent Energy Consumption For Smart Homes Using Fused Machine-Learning Technique
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 2261-2278页
作者: Hanadi AlZaabi Khaled Shaalan Taher M.Ghazal Muhammad A.Khan Sagheer Abbas Beenu Mago Mohsen A.A.Tomh Munir Ahmad Faculty of Engineering and IT The British University in DubaiUnited Arab Emirates Center for Cyber Security Faculty of Information Science and TechnologyUniversity Kebangsaan Malaysia(UKM)Bangi43600SelangorMalaysia School of Information Technology Skyline University CollegeUniversity City SharjahSharjah1797United Arab Emirates Riphah School of Computing&Innovation Faculty of ComputingRiphah International University Lahore CampusLahore54000Pakistan Pattern Recognition and Machine Learning Lab. Department of SoftwareGachon UniversitySeongnamGyeonggido13120Korea Faculty of Computer Science NCBA&ELahore54660Pakistan
Energy is essential to practically all exercises and is imperative for the development of personal ***,valuable energy has been in great demand for many years,especially for using smart homes and structures,as individ... 详细信息
来源: 评论
Smart Water-Powered Renewable Energy System with IoT Integration
Smart Water-Powered Renewable Energy System with IoT Integra...
收藏 引用
Decision Aid sciences and Application (DASA), International Conference on
作者: Amjed Abbas Ahmed Ali Hamza Najim Ahmed Salman Ibraheem Khattab M. Ali Alheeti Nurhizam Safie Mohd Satar Aisha Hassan Abdallah Hashim Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Imam AlKadhum College (IKC) Baghdad Iraq Department of Computer Technical Engineering Imam Al-Kadhum College (IKC) Al-Diwaniyah Iraq Department of Computer Technical Engineering Imam Al-Kadhum College (IKC) Baghdad Iraq Computer Networking Systems Department College of Computer and Information Technology University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Electrical and Computer Engineering Faculty of Engineering International Islamic University Malaysia Selangor Malaysia
An advanced hybrid renewable energy collecting and storage system prototype that utilizes water flow as its primary power source. Additionally, the system incorporates an energy monitoring system based on the Internet... 详细信息
来源: 评论
Improving VANET Localization Performance with Data Verification: Challenges and Solutions
Improving VANET Localization Performance with Data Verificat...
收藏 引用
Decision Aid sciences and Application (DASA), International Conference on
作者: Amjed Abbas Ahmed Aqeel Kamil Kadhim Ali Hamza Najim Khattab M. Ali Alheeti Nurhizam Safie Mohd Satar Aisa Hassan Abdallah Hashim Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Imam AlKadhum College (IKC) Baghdad Iraq Department of Computer Technical Engineering Imam Al-Kadhum College (IKC) Baghdad Iraq Department of Computer Technical Engineering Imam Al-Kadhum College (IKC) Al-Diwaniyah Iraq Computer Networking Systems Department College of Computer and Information Technology University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Electrical and Computer Engineering Faculty of Engineering International Islamic University Malaysia Selangor Malaysia
In VANETs, the important and effective applications of vehicle localization include safety and communication applications. Thus, it is difficult to get very accurate localization in the dynamic and often very fluctuat... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
A Novel Approach of Securing Medical Cyber Physical Systems (MCPS) from DDoS Attacks
A Novel Approach of Securing Medical Cyber Physical Systems...
收藏 引用
International Conference on Big Data Intelligence and Computing, DataCom 2022
作者: Gupta, Brij. B. Chui, Kwok Tai Arya, Varsha Gaurav, Akshat International Center for AI and Cyber Security Research and Innovation and Department of Computer Science and Information Engineering Asia University Taichung413 Taiwan Lebanese American University Beirut1102 Lebanon Kowloon Hong Kong Department of Business Administration Asia University Taichung Taiwan Ronin Institute MontclairNJ07043 United States
The term "Cyber-Physical Systems" (CPS) often refers to systems that are both designed and physical, as well as biological. In regard to a CPS, the evolution of physical quantities and distinct software and ... 详细信息
来源: 评论
Efficient UAV Routing Strategies for Wireless Sensor Network Data Retrieval
Efficient UAV Routing Strategies for Wireless Sensor Network...
收藏 引用
Decision Aid sciences and Application (DASA), International Conference on
作者: Amjed Abbas Ahmed Kareem Ali Malalah Al-sharhanee Ali Hamza Najim Khattab M. Ali Alheeti Nurhizam Safie Mohd Satar Aisha Hassan Abdallah Hashim Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Imam AlKadhum College (IKC) Baghdad Iraq Department of Communication Technical Engineering College of Engineering Techniques Al-Farahidi University Baghdad Iraq Department of Computer Technical Engineering Imam Al-Kadhum College (IKC) Al-Diwaniyah Iraq Computer Networking Systems Department College of Computer and Information Technology University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Electrical and Computer Engineering Faculty of Engineering International Islamic University Malaysia Selangor Malaysia
WSNs are applied in many disciplines where certain conditions require the ability to adapt to network sink mobility and changes in the dynamics of the area coverage. To meet these needs, it is necessary to develop int... 详细信息
来源: 评论