咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是551-560 订阅
排序:
Literature Survey on Technologies for Developing Privacy-Aware Software
Literature Survey on Technologies for Developing Privacy-Awa...
收藏 引用
IEEE International Requirements engineering Conference Workshops (REW)
作者: Atsuo Hazeyama Hironori Washizaki Nobukazu Yoshioka Haruhiko Kaiya Takao Okubo Department of Information Science Tokyo Gakugei University Tokyo Japan Department of Computer Science and Engineering Waseda University Tokyo Japan GRACE Center National Institute of Informatics Tokyo Japan Faculty of Science Kanagawa University Hiratsuka Japan Institute of Information SECurity (IISEC) Yokohama Japan
Software development requires the protection of privacy. However, a body of knowledge does not exist for the development of privacy-aware software. Based on a literature survey, this paper introduces various studies t... 详细信息
来源: 评论
Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment
收藏 引用
Multimedia Tools and Applications 2017年 第21期76卷 22785-22785页
作者: Shen, Jian Tan, Haowen Zhang, Yan Sun, Xingming Xiang, Yang Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology School of Computer & Software Nanjing University of Information Science and Technology Nanjing China School of Computer & Software Nanjing University of Information Science & Technology Nanjing China Simula Research Laboratory of Norway and the Department of Informatics University of Oslo Oslo Norway Center for Cyber Security Research Deakin University Deakin Australia
来源: 评论
Author Correction: The FLUXNET2015 dataset and the ONEFlux processing pipeline for eddy covariance data
收藏 引用
Scientific data 2021年 第1期8卷 72页
作者: Gilberto Pastorello Carlo Trotta Eleonora Canfora Housen Chu Danielle Christianson You-Wei Cheah Cristina Poindexter Jiquan Chen Abdelrahman Elbashandy Marty Humphrey Peter Isaac Diego Polidori Markus Reichstein Alessio Ribeca Catharine van Ingen Nicolas Vuichard Leiming Zhang Brian Amiro Christof Ammann M Altaf Arain Jonas Ardö Timothy Arkebauer Stefan K Arndt Nicola Arriga Marc Aubinet Mika Aurela Dennis Baldocchi Alan Barr Eric Beamesderfer Luca Belelli Marchesini Onil Bergeron Jason Beringer Christian Bernhofer Daniel Berveiller Dave Billesbach Thomas Andrew Black Peter D Blanken Gil Bohrer Julia Boike Paul V Bolstad Damien Bonal Jean-Marc Bonnefond David R Bowling Rosvel Bracho Jason Brodeur Christian Brümmer Nina Buchmann Benoit Burban Sean P Burns Pauline Buysse Peter Cale Mauro Cavagna Pierre Cellier Shiping Chen Isaac Chini Torben R Christensen James Cleverly Alessio Collalti Claudia Consalvo Bruce D Cook David Cook Carole Coursolle Edoardo Cremonese Peter S Curtis Ettore D'Andrea Humberto da Rocha Xiaoqin Dai Kenneth J Davis Bruno De Cinti Agnes de Grandcourt Anne De Ligne Raimundo C De Oliveira Nicolas Delpierre Ankur R Desai Carlos Marcelo Di Bella Paul di Tommasi Han Dolman Francisco Domingo Gang Dong Sabina Dore Pierpaolo Duce Eric Dufrêne Allison Dunn Jiří Dušek Derek Eamus Uwe Eichelmann Hatim Abdalla M ElKhidir Werner Eugster Cacilia M Ewenz Brent Ewers Daniela Famulari Silvano Fares Iris Feigenwinter Andrew Feitz Rasmus Fensholt Gianluca Filippa Marc Fischer John Frank Marta Galvagno Mana Gharun Damiano Gianelle Bert Gielen Beniamino Gioli Anatoly Gitelson Ignacio Goded Mathias Goeckede Allen H Goldstein Christopher M Gough Michael L Goulden Alexander Graf Anne Griebel Carsten Gruening Thomas Grünwald Albin Hammerle Shijie Han Xingguo Han Birger Ulf Hansen Chad Hanson Juha Hatakka Yongtao He Markus Hehn Bernard Heinesch Nina Hinko-Najera Lukas Hörtnagl Lindsay Hutley Andreas Ibrom Hiroki Ikawa Marcin Jackowicz-Korczynski Dalibor Janouš Wilma Jans Rachhpal Jassal Shicheng Jiang Tomomichi Kato Myr Computational Research Division Lawrence Berkeley National Laboratory Berkeley CA 94720 USA. gzpastorello@lbl.gov. DIBAF University of Tuscia Viterbo 01100 Italy. Euro-Mediterranean Centre on Climate Change Foundation (CMCC) Lecce 73100 Italy. Climate & Ecosystem Sciences Division Lawrence Berkeley National Laboratory Berkeley CA 94720 USA. Computational Research Division Lawrence Berkeley National Laboratory Berkeley CA 94720 USA. Department of Civil Engineering California State University Sacramento CA 95819 USA. Department of Geography Environment and Spatial Sciences Michigan State University East Lansing MI 48823 USA. Department of Computer Science University of Virginia Charlottesville VA 22904 USA. TERN Ecosystem Processes Menzies Creek VIC3159 Australia. Max Planck Institute for Biogeochemistry Jena 07701 Germany. Laboratoire des Sciences du Climat et de l'Environnement (LSCE) CEA CNRS UVSQ UPSACLAY Gif sur Yvette 91190 France. Key Laboratory of Ecosystem Network Observation and Modeling Institute of Geographic Sciences and Natural Resources Research Chinese Academy of Sciences Beijing 100101 China. Department of Soil Science University of Manitoba Winnipeg MB R3T2N2 Canada. Department of Agroecology and Environment Agroscope Research Institute Zürich 8046 Switzerland. School of Geography and Earth Sciences McMaster University L8S4K1 Hamilton ON Canada. Department of Physical Geography and Ecosystem Science Lund University Lund 22362 Sweden. Department of Agronomy and Horticulture University of Nebraska-Lincoln Lincoln NE 68583 USA. School of Ecosystem and Forest Sciences The University of Melbourne Richmond VIC3121 Australia. Department of Biology Research Group PLECO University of Antwerp Antwerp 2610 Belgium. Joint Research Centre European Commission Ispra 21027 Italy. TERRA Teaching and Research Center University of Liege Gembloux B-5030 Belgium. Finnish Meteorological Institute Helsinki 00560 Finland. ES
来源: 评论
Thwart eavesdropping attacks on network communication based on moving target defense
Thwart eavesdropping attacks on network communication based ...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Duohe Ma Liming Wang Cheng Lei Zhen Xu Hongqi Zhang Meng Li CAS Institute of Information Engineering Beijing China China National Digital Switching System Engineering & Technological Research Center Zhengzhou Henan China Henan Key Laboratory of Information Security Zhengzhou Henan China Department of Computer Science Hong Kong Baptist University Hong Kong SAR China
This paper addresses mainly the problem of private data protection in network communication against eavesdropping attacks. As this kind of attacks is stealthy and untraceable, it is barely detectable for those feature... 详细信息
来源: 评论
Glaucoma detection from retinal images  2
Glaucoma detection from retinal images
收藏 引用
2nd International Conference on Electronics and Communication Systems, ICECS 2015
作者: Devi, T. M. Gayathri Sudha, S. Suraj, P. Department of Computer Science and Engineering Thiagarajar College of Engineering Madurai India Cyber Forensics and Information Security Electronics Research and Development Center of India Thiruvananthapuram India
Glaucoma disease detection from retinal images using classifiers like least square-Support Vector Machine classifier, random forest, dual Sequential Minimal Optimization classifier, naive bayes classifier and artifici... 详细信息
来源: 评论
Artificial neural networks in retinal image analysis  3
Artificial neural networks in retinal image analysis
收藏 引用
3rd International Conference on Signal Processing, Communication and Networking, ICSCN 2015
作者: Gayathri Devi, T.M. Sudha, S. Suraj, P. Department of Computer Science and Engineering Thiagarajar College of Engineering Madurai India Cyber Forensics and Information Security Electronics Research and Development Center of India Thiruvananthapuram India
Glaucoma disease detection from retinal images using classifiers like Least Square-Support Vector Machine classifier, Random forest, Dual Sequential Minimal Optimization classifier, Naive bayes classifier and Artifici... 详细信息
来源: 评论
Collecting all data continuously in wireless sensor networks with a mobile base station
Collecting all data continuously in wireless sensor networks...
收藏 引用
作者: Li, Jie Ye, Xiucai Xu, Li Liu, Huaibei Faculty of Engineering Information and Systems University of Tsukuba Tsukuba Science City Ibaraki3058573 Japan Department of Computer Science University of Tsukuba Tsukuba Science City Ibaraki3058573 Japan Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou Fujian350007 China Provincial Key Laboratory of Information Network Engineering Fuzhou Fujian350003 China Institute of Scientific and Technological Information Fuzhou Fujian350003 China
In this paper, we present a novel coding scheme called separate coding (SC) for collecting all data continuously in wireless sensor networks with a mobile base station (mBS). By separately encoding a certain number of... 详细信息
来源: 评论
The Mobile Terminal security Access System Based on IPSec VPN
The Mobile Terminal Security Access System Based on IPSec VP...
收藏 引用
2015 3rd International Conference on Machinery,Materials and information Technology Applications(ICMMITA 2015)
作者: Di Zhao Xin He Yunjun Li Department of Computer Science Yanbian University Shanghai Information Security Engineering Technology Research Center
. Based on IPSec VPN technology, we propose a scheme for realization of mobile terminal security access system. The scheme, which combines with SM2, SM3 and the IPSec, realizes the establishment of the IPSec VPN clien... 详细信息
来源: 评论
MobiPluto: File system friendly deniable storage for mobile devices  15
MobiPluto: File system friendly deniable storage for mobile ...
收藏 引用
31st Annual computer security Applications Conference, ACSAC 2015
作者: Chang, Bing Wang, Zhan Chen, Bo Zhang, Fengwei State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China Data Assurance and Communication Security Research Center Chinese Academy of Sciences China University of Chinese Academy of Sciences China College of Information Sciences and Technology Pennsylvania State University United States Department of Computer Science Wayne State University United States
Mobile devices are prevalently used for processing personal private data and sometimes collecting evidence of social injustice or political oppression. The device owners may always feel reluctant to expose this type o... 详细信息
来源: 评论
Ciphertext-auditable identity-based encryption
收藏 引用
International Journal of Network security 2015年 第1期17卷 23-28页
作者: Lin, Changlu Li, Yong Lv, Kewei Chang, Chin-Chen Fujian Province Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou350007 China Beijing Municipal Commission of Education Beijing100044 China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing100049 China Department of Information Engineering and Computer Science Feng Chia University Taichung40724 Taiwan Department of Computer Science and Information Engineering Asia University Taichung41354 Taiwan
Ciphertext-auditability of public key encryption scheme means that the ciphertext should been verified by any-one whether it was actually created by the public key. It also should satisfy two additional requirements: ... 详细信息
来源: 评论