咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是21-30 订阅
排序:
Improving VANET Localization Performance with Data Verification: Challenges and Solutions
Improving VANET Localization Performance with Data Verificat...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Kadhim, Aqeel Kamil Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisa Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
In VANETs, the important and effective applications of vehicle localization include safety and communication applications. Thus, it is difficult to get very accurate localization in the dynamic and often very fluctuat... 详细信息
来源: 评论
Enhancing Wireless Sensor Network Data Collection through Aerial Unmanned Vehicles
Enhancing Wireless Sensor Network Data Collection through Ae...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Ali Alheeti, Khattab M. Najim, Ali Hamza Satar, Nurhizam Safie Mohd Aliesawi, Salah A. Hashim, Aisha Hassan Abdallah Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq Faculty of Engineering Department of Electrical and Computer Engineering International Islamic University Malaysia Selangor Malaysia
This study addresses the critical aspect of data collection within Wireless Sensor Networks (WSNs), which consist of autonomous, compact sensor devices deployed to monitor environmental conditions. These networks have... 详细信息
来源: 评论
An Innovative Way to Increase the Speed and Efficiency of Reverse Mapping of Elliptic Curve Points  6
An Innovative Way to Increase the Speed and Efficiency of Re...
收藏 引用
6th IEEE International Conference on Emerging Smart Computing and Informatics, ESCI 2024
作者: Ray, Ryan Saptarshi Das, Debendranath Sengupta, Aritro Kumar, Pankaj Sahani, Arun Kumar Govt. College of Engineering and Ceramic Technology Information Technology Kolkata India Indian Statistical Institute Cryptology and Security Research Unit Kolkata India Lingaya's Vidyapeeth Department of Computer Science and Engineering Haryana Faridabad India
Elliptic curve cryptography is a widely recognized method of using a public key cryptosystem for encrypting and decrypting data. The message must be transformed to points on an Elliptic Curve using a mapping algorithm... 详细信息
来源: 评论
A side match oriented data hiding based on absolute moment block truncation encoding mechanism with reversibility
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 18395-18417页
作者: Liu, Jui-Chuan Lin, Yijie Chang, Ching-Chun Chang, Chin‐Chen Department of Information Engineering and Computer Science Feng Chia University NO.100 Wenhwa Rd. Taichung Seatwen40724 Taiwan Information and Communication Security Research Center Feng Chia University NO.100 Wenhwa Rd. Taichung Seatwen40724 Taiwan
Owing to life style changes during COVID, communication channels were forced to change. Online services ramped up to replace traditional services. It became daily practice for most of us that documents, files, photos,... 详细信息
来源: 评论
Performance Analysis of Energy and Secure Efficient Routing for Wireless Sensor Networks
Performance Analysis of Energy and Secure Efficient Routing ...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Hussein, Zainab Mohammed Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Wireless Sensor Networks (WSNs) are essential for various applications, but their architecture makes them vulnerable to attacks. While traditional security methods like authentication and encryption offer some protect... 详细信息
来源: 评论
A Review of Key Elements for Underwater Wireless Sensor Networks
A Review of Key Elements for Underwater Wireless Sensor Netw...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Al-Dulaimi, Aymen Mohammed Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Aliesawi, Salah A. Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq
Underwater Wireless Sensor Networks (UWSNs) are emerging and have huge prospects since they have various applications in oceanography, environmental monitoring, and underwater communication. These networks contain low... 详细信息
来源: 评论
Enhancing the security of the MAVLink with Symmetric Authenticated Encryption for Drones  11
Enhancing the Security of the MAVLink with Symmetric Authent...
收藏 引用
11th International Conference on Internet of Things: Systems, Management and security, IOTSMS 2024
作者: Tufekci, Burak Arslan, Atakan Tunc, Cihan Morozov, Kirill The University of North Texas Department of Computer Science and Engineering DentonTX United States Information Security Center of Research for Advanced Technologies Gebze Turkey
The Micro Air Vehicle Link (MAVLink) protocol plays a crucial role in enabling communication between drones and Ground Control Stations (GCS). With the increasing adoption of drones, the security and integrity of MAVL... 详细信息
来源: 评论
IoMT-Based Healthcare Framework for Ambient Assisted Living Using a Convolutional Neural Network
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6867-6878页
作者: Waleed T.Al-Sit Nidal A.Al-Dmour Taher M.Ghazal Ghassan F.Issa Department of Computer Engineering Mutah UniversityAl-KarakJordanHigher Colleges of TechnologyDubaiUAE Department of Computer Engineering College of EngineeringMutah UniversityJordan School of Information Technology Skyline University CollegeUniversity City SharjahSharjahUAE Center for Cyber Security Faculty of Information Science and TechnologyUKM43600BangiSelangorMalaysia
In the age of universal computing,human life is becoming smarter owing to the recent developments in the Internet of Medical Things(IoMT),wearable sensors,and telecommunication innovations,which provide more effective... 详细信息
来源: 评论
Hiding information in a Reordered Codebook Using Pairwise Adjustments in Codewords  5
Hiding Information in a Reordered Codebook Using Pairwise Ad...
收藏 引用
5th International Conference on computer Vision and Computational Intelligence, CVCI 2024
作者: Chang, Chin-Chen Liu, Jui-Chuan Chang, Ching-Chun Lin, Yijie Department of Information Engineering and Computer Science Feng Chia University Taichung407 Taiwan Information and Communication Security Research Center Feng Chia University Taichung407 Taiwan
The fundamental data structure of our proposed scheme is a pixel pair. The pixel values are adjusted through simple yet well-designed equations depending on different conditions. The computation method provides an eas... 详细信息
来源: 评论
Secure and fast mobility handover scheme for IoMT in 5 G and future 6 G networks
收藏 引用
Alexandria engineering Journal 2025年 128卷 127-143页
作者: Islam, Shayla Topazal, S.M. Hasan, Mohammad Kamrul Kolandaisamy, Raenu AL Abbas, Huda Saleh Vo, Nguyen Thakkar, Rahul Khan, Muhammad Attique Gupta, Deepak AlHammadi, Dina Abdulaziz Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia Center for Cyber Security Faculty of Information Science and Technology the National University of Malaysia Selangor Bangi43600 Malaysia Department of computer science College of Computer Science and Engineering Taibah University Madina Saudi Arabia Victorian Institute of Technology Melbourne Australia Center of AI College of Computer Engineering and Science Prince Mohammad Bin Fahd University Al-Khobar Saudi Arabia Maharaja Agrasen Institute of Technology Delhi India Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O.Box 84428 Riyadh11671 Saudi Arabia
The emergence of 5 G and 6 G networks promises significant advancements in the Internet of Medical Things (IoMT) by enabling real-time medical data transmission and continuous connectivity for mobile healthcare device... 详细信息
来源: 评论