咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是31-40 订阅
排序:
Blockchain-Based Cognitive Computing Model for Data security on a Cloud Platform
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3305-3323页
作者: Xiangmin Guo Guangjun Liang Jiayin Liu Xianyi Chen Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjing210031China Jiangsu Electronic Data Forensics and Analysis Engineering Research Center Jiangsu Police InstituteNanjing210031China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China
Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and ***,information shoplifting poses significant threats,potentially leading to poor perf... 详细信息
来源: 评论
Efficient UAV Routing Strategies for Wireless Sensor Network Data Retrieval
Efficient UAV Routing Strategies for Wireless Sensor Network...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Al-Sharhanee, Kareem Ali Malalah Najim, Ali Hamza Alheeti, Khattab M. Ali Satar, Nurhizam Safie Mohd Hashim, Aisha Hassan Abdallah Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad10011 Iraq Department of Computer Technical Al-Diwaniyah Iraq College of Computer and Information Technology University of Anbar Computer Networking Systems Department Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
WSNs are applied in many disciplines where certain conditions require the ability to adapt to network sink mobility and changes in the dynamics of the area coverage. To meet these needs, it is necessary to develop int... 详细信息
来源: 评论
Ensuring End-to-End security With Fine-Grained Access Control for Connected and Autonomous Vehicles
收藏 引用
IEEE Transactions on information Forensics and security 2024年 19卷 6962-6977页
作者: Yu, Donghyun Lee, Sungho Hsu, Ruei-Hau Lee, Jemin the School of Electrical and Electronic Engineering Yonsei University Seoul03722 Korea Republic of Gumi39253 Korea Republic of the Department of Computer Science and Engineering the Information Security Center National Sun Yat-sen University Kaohsiung80424 Taiwan
— As advanced V2X applications emerge in the connected and autonomous vehicle (CAV), the data communications between in-vehicle end-devices and outside nodes increase, which make the end-to-end (E2E) security to in-v... 详细信息
来源: 评论
Automated AI System for Online Phishing Detection and Mitigation
Automated AI System for Online Phishing Detection and Mitiga...
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Raj, Daksh Kumar, Rajiv Joshi, Shivani Amrita Galgotias College of Engineering and Technology Department of Computer Science and Engineering U.P. Greater Noida India Galgotias University Department of Computer Scienceand Engineering U.P. Greater Noida India Sharda University Center for Cyber Security and Cryptology Computer Scienceand Engineering Sharda School of Engineeringand Technology Greater Noida India
This paper presents the critical challenge of phishing attacks by using advanced machine learning (ML) approaches to efficiently identify and mitigate malicious websites. Phishing websites betray users by impersonatin... 详细信息
来源: 评论
LEGF-DST:LLMs-Enhanced Graph-Fusion Dual-Stream Transformer for Fine-Grained Chinese Malicious SMS Detection
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1901-1924页
作者: Xin Tong Jingya Wang Ying Yang Tian Peng Hanming Zhai Guangming Ling School of Information and Cybersecurity People’s Public Security University of ChinaBeijing100038China Cyber Investigation Technology Research and Development Center The Third Research Institute of the Ministry of Public SecurityShanghai201204China Department of Cybersecurity Defense Beijing Police CollegeBeijing102202China School of Computer Science Henan Institute of EngineeringZhengzhou451191China
With the widespread use of SMS(Short Message Service),the proliferation of malicious SMS has emerged as a pressing societal *** deep learning-based text classifiers offer promise,they often exhibit suboptimal performa... 详细信息
来源: 评论
Multi-Layer Perceptrons and Convolutional Neural Networks Based Side-Channel Attacks on AES Encryption
Multi-Layer Perceptrons and Convolutional Neural Networks Ba...
收藏 引用
2023 International Conference on engineering Technology and Technopreneurship, ICE2T 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Center for Cyber Security Faculty of Information Science and Technology Bangi 43600 Malaysia Department of Computer Techniques Engineering Baghdad Iraq
Side - channel attacks (SCA) exploit vulnerabilities introduced by insecure implementations in order to get information about the data that is being processed or the data itself via device leakages. The majority of mo... 详细信息
来源: 评论
Confident information Coverage Reliability Evaluation for Sensor Networks of Openly Deployed ICP Systems
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2024年 2卷 565-574页
作者: Chen, Suning Yi, Yuanyuan Yi, Lingzhi Liu, Shenghao Deng, Xianjun Xia, Yunzhi Fan, Xiaoxuan Yang, Laurence T. Park, Jong Hyuk Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security The School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology School of Journalism and Information Communication Wuhan430074 China Zhongnan University of Economics and Law School of Information and Safety Engineering Wuhan430073 China Seoul National University of Technology Department of Computer Science and Engineering Seoul01811 Korea Republic of
Industrial Cyber-Physical (ICP) systems are integration of computation and physical processes to help achieve operational excellence. As sensors and actuators compose the openly deployed ICP systems and are often susc... 详细信息
来源: 评论
Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 801-815页
作者: Yongjie Yang Shanshan Tu Raja Hashim Ali Hisham Alasmary Muhammad Waqas Muhammad Nouman Amjad Engineering Research Center of Intelligent Perception and Autonomous Control Faculty of Information TechnologyBeijing University of TechnologyBeijing100124China Faculty of Computer Science and Engineering GIK Institute of Engineering Sciences and TechnologyTopi23460Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Information Security and Cybersecurity Unit King Khalid UniversityAbhaSaudi Arabia Computer Engineering Department College of Information TechnologyUniversity of Bahrain32038Bahrain School of Engineering Edith Cowan UniversityJoondalup PerthWA6027Australia School of Engineering University of Management and TechnologyLahorePakistan
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** comp... 详细信息
来源: 评论
Enhancing Skin Cancer Diagnosis with Deep Learning:A Hybrid CNN-RNN Approach
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1497-1519页
作者: Syeda Shamaila Zareen Guangmin Sun Mahwish Kundi Syed Furqan Qadri Salman Qadri Faculty of Information Technology Beijing University of TechnologyBeijing100124China Computer Science International Engineering Collage Maynooth UniversityKildareW23 F2H6Irland Research Center for Data Hub and Security Zhejiang LabHangzhou311121China Computer Science Department MNS University of AgricultureMultan59220Pakistan
Skin cancer diagnosis is difficult due to lesion presentation variability. Conventionalmethods struggle to manuallyextract features and capture lesions spatial and temporal variations. This study introduces a deep lea... 详细信息
来源: 评论
Orbit Weighting Scheme in the Context of Vector Space information Retrieval
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 1347-1379页
作者: Ahmad Ababneh Yousef Sanjalawe Salam Fraihat Salam Al-E’mari Hamzah Alqudah Department of Computer Science Faculty of Information TechnologyAmerican University of MadabaAmman11821Jordan Department of Cybersecurity Faculty of Information TechnologyAmerican University of MadabaAmman11821Jordan Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityP.O.Box 346Ajman13306United Arab Emirates Information Security Department Faculty of Information TechnologyUniversity of PetraAmman11196Jordan Department of Data Science and Artificial Intelligence Faculty of Information TechnologyAmerican University of MadabaAmman11821Jordan
This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schem... 详细信息
来源: 评论