咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是11-20 订阅
排序:
Leveraging OpenStack-based Private Cloud for Intrusion Detection Using Deep Learning Techniques  1
Leveraging OpenStack-based Private Cloud for Intrusion Detec...
收藏 引用
1st International Conference for Women in Computing, InCoWoCo 2024
作者: Roshan, Rahul G. Salanke, Vishal S Nagasundari, S. Research Center for Information Security Forensics and Cyber Resilience PES University Department of Computer Science and Engineering Bangalore India
OpenStack is a cloud platform that offers infrastructure services, providing access to computing, storage, and network resources. However, due to its open-source nature, the cloud environment can be vulnerable to secu... 详细信息
来源: 评论
Cyber Threat Intelligence (CTI): An Analysis on the Use of Artificial Intelligence and Machine Learning to Identify Cyber Hazards
Cyber Threat Intelligence (CTI): An Analysis on the Use of A...
收藏 引用
International Conference on Recent Developments in Cyber security, ReDCySec 2023
作者: Kant, Neelima Amrita Department of Computer Science and Engineering School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida201306 India Department of Computer Science and Engineering School of Engineering and Technology Center for Cyber Security and Cryptology Sharda University Uttar Pradesh Greater Noida201306 India
Data transport volume and scope on networks are growing daily due to the quick advancements in network technology. It is challenging for cybersecurity specialists to keep track of every action taking place on the netw... 详细信息
来源: 评论
Intermittent Fault Diagnosis of Split-Star Networks and its Applications
收藏 引用
IEEE Transactions on Parallel and Distributed Systems 2023年 第4期34卷 1253-1264页
作者: Song, Jiankang Lin, Limei Huang, Yanze Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou Fujian350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou Fujian350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid increase of the number of processors in multiprocessor systems and the fast expansion of interconnection networks, the reliability of interconnection network is facing severe challenges, where the fast ... 详细信息
来源: 评论
Log Preservation in Custody Dual Blockchain With Energy Regime and Obfuscation Shuffle
收藏 引用
IEEE Transactions on Network science and engineering 2024年 第4期11卷 3495-3511页
作者: Chew, Chit-Jie Lee, Wei-Bin Chen, Tzu-Hao Lin, Iuon-Chang Lee, Jung-San Feng Chia University Department of Information Engineering and Computer Science Taichung407 Taiwan Hon Hai Research Institute Information Security Research Center Taipei236 Taiwan National Chung Hsing University Department of Management Information Systems Taichung402 Taiwan
The rise of cybercrime has led to an explosion of threats in recent years, resulting in the increasingly important of digital forensics. To achieve successful investigation and prosecution, the log preservation is a c... 详细信息
来源: 评论
A Survey on Image Semantic Segmentation Using Deep Learning Techniques
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1941-1957页
作者: Jieren Cheng Hua Li Dengbo Li Shuai Hua Victor S.Sheng School of Computer Science and Technology Hainan UniversityHaikou570228China School of Cyberspace Security(School of Cryptology) Hainan UniversityHaikou570228China Hainan Blockchain Technology Engineering Research Center Hainan UniversityHaikou570228China Department of Computer Science Texas Tech University TX 79409USA
Image semantic segmentation is an important branch of computer vision of a wide variety of practical applications such as medical image analysis,autonomous driving,virtual or augmented reality,*** recent years,due to ... 详细信息
来源: 评论
LDoS Attacks Detection for ICPS NB-IoTs Environment via SE-Based CNN
收藏 引用
IEEE Systems Journal 2023年 第4期17卷 5280-5291页
作者: Cho, Hsin-Hung Tsai, Min-Yan Zeng, Jiang-Yi Yu, Chia-Mu Chao, Han-Chieh You, Ilsun National Ilan University Department of Computer Science and Information Engineering Yilan26047 Taiwan National Yang Ming Chiao Tung University Department of Information Management and Finance Hsinchu30010 Taiwan National Dong Hwa University Department of Electrical Engineering Hualien97401 Taiwan UCSI University Institute of Computer Science and Innovation Kuala Lumpur56000 Malaysia Kookmin University Department of Information Security Cryptology and Mathematics Seoul02707 Korea Republic of
After Industry 4.0 was proposed, cyber-physical systems (CPS) were also introduced into the industrial environment called the industrial CPS. Internet-of-Things (IoT) services in the industry make intelligent decision... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 657-671页
作者: Hao WANG Jinwei WANG Xuelong HU Bingtao HU Qilin YIN Xiangyang LUO Bin MA Jinsheng SUN Department of Automation Nanjing University of Science and Technology Engineering Research Center of Digital Forensics Ministry of Education Department of Computer and Software Nanjing University of Information Science and Technology School of Management Nanjing University of Posts and Telecommunications Department of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University State Key Laboratory of Mathematical Engineering and Advanced Computing Qilu University of Technology
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compressio... 详细信息
来源: 评论
Cyberbullying Detection in Hinglish Language
Cyberbullying Detection in Hinglish Language
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Kumar, Rajiv Rai, Vipin Joshi, Shivani Raj, Daksh Amrita Galgotias University Department of Computer Science & Engineering U.P. Greater Noida India Galgotias College of Engineering and Technology Department of Computer Science and Engineering U.P. Greater Noida India Sharda University Center for Cyber Security and Cryptology Computer Science & Engineering Sharda School of Engineering & Technology Greater Noida India
Cyberbullying represents one of the most recent challenges stemming from the widespread adoption of social media platforms. With the surge in social media usage, the right to express oneself is being misused. Statisti... 详细信息
来源: 评论
Smart Water-Powered Renewable Energy System with IoT Integration
Smart Water-Powered Renewable Energy System with IoT Integra...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Ibraheem, Ahmed Salman Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq Department of Computer Technical Engineering Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
An advanced hybrid renewable energy collecting and storage system prototype that utilizes water flow as its primary power source. Additionally, the system incorporates an energy monitoring system based on the Internet... 详细信息
来源: 评论