咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是51-60 订阅
排序:
Hardware Implementation of High-Throughput S-Box in AES for information security
收藏 引用
IEEE Access 2023年 11卷 59049-59058页
作者: Lin, Shih-Hsiang Lee, Jun-Yi Chuang, Chia-Chou Lee, Narn-Yih Chen, Pei-Yin Chin, Wen-Long National Cheng Kung University Department of Computer Science and Information Engineering Tainan70101 Taiwan National Cheng Kung University Department of Electrical Engineering Tainan70101 Taiwan National Cheng Kung University Network and Information Security Division Computer and Network Center Tainan70101 Taiwan National Cheng Kung University Department of Engineering Science Tainan70101 Taiwan
The Advanced Encryption Standard (AES) is used for achieving quantum-resistant cryptography when a 256-bit key is applied. This paper presents a high-throughput, seven-stage hardware pipeline architecture for SubByte ... 详细信息
来源: 评论
Distributed Timestamp Mechanism Based on Verifiable Delay Functions
收藏 引用
computer Systems science & engineering 2023年 第2期44卷 1633-1646页
作者: Qiang Wu Zhaoyang Han Ghulam Mohiuddin Yongjun Ren Engineering Research Center of Digital Forensics of Ministry of Education School of Computer ScienceNanjing University of Information Science and TechnologyNanjing210044China Nanjing University of Aeronautics and Astronautics Nanjing210008China Department of Cyber Security at VaporVM Abu Dhabi999041United Arab Emirates
In the data communication system,the real-time information interaction of communication device increases the risk of privacy sensitive data being tam-pered ***,maintaining data security is one of the most important is... 详细信息
来源: 评论
Adversarial learning for Mirai botnet detection based on long short-term memory and XGBoost
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 153-160页
作者: Vajrobol, Vajratiya Gupta, Brij B. Gaurav, Akshat Chuang, Huan-Ming Institute of Informatics and Communication University of Delhi India International Center for AI and Cyber Security Research and Innovations. Asia University Taiwan Department of Computer Science and Information Engineering Asia University Taichung413 Taiwan Ronin Institute MontclairNJ United States Department of Information Management National Yunlin University of Science and Technology Yunlin Taiwan Symbiosis International University Pune India Department of Electrical and Computer Engineering Lebanese American University Beirut1102 Lebanon Dehradun India
In today's world, where digital threats are on the rise, one particularly concerning threat is the Mirai botnet. This malware is designed to infect and command a collection of Internet of Things (IoT) devices. The... 详细信息
来源: 评论
A deep learning fusion model for accurate classification of brain tumours in Magnetic Resonance images
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第4期9卷 790-804页
作者: Nechirvan Asaad Zebari Chira Nadheef Mohammed Dilovan Asaad Zebari Mazin Abed Mohammed Diyar Qader Zeebaree Haydar Abdulameer Marhoon Karrar Hameed Abdulkareem Seifedine Kadry Wattana Viriyasitavat Jan Nedoma Radek Martinek Department of Information Technology Lebanese French UniversityErbilIraq Department of Computer Science University of ZakhoZakhoKurdistan RegionIraq Department of Computer Science College of ScienceNawroz UniversityDuhokKurdistan RegionIraq Department of Artificial Intelligence College of Computer Science and Information TechnologyUniversity of AnbarRamadiIraq Department of Telecommunications VSB‐Technical University of OstravaOstravaCzech Republic Department of Cybernetics and Biomedical Engineering VSB‐Technical University of OstravaOstravaCzech Republic Department of Computer Network and Information Security Technical College of Informatics-AkreDuhok Polytechnic UniversityDuhokIraq Information and Communication Technology Research Group Scientific Research CenterAl‐Ayen UniversityThi‐QarIraq College of Computer Sciences and Information Technology University of KerbalaKarbalaIraq College of Agriculture Al‐Muthanna UniversitySamawahIraq Department of Applied Data Science Noroff University CollegeKristiansandNorway Faculty of Commerce and Accountancy Chulalongkorn Business SchoolChulalongkorn UniversityBangkokThailand
Detecting brain tumours is complex due to the natural variation in their location, shape, and intensity in images. While having accurate detection and segmentation of brain tumours would be beneficial, current methods... 详细信息
来源: 评论
Assessing the Effects of Blackhole Attacks on MANET Reliability and security
Assessing the Effects of Blackhole Attacks on MANET Reliabil...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Fadhil, Saif Aamer Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Baghdad10011 Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Mobile Ad Hoc Networks (MANETs) are characterized by some important attributes, including infrastructure, mobile, and dynamic nature, which makes them have vast applications in different areas of computer networks. Th... 详细信息
来源: 评论
Implementing Three Factors Authentication System (3FA) to Maintain Employee Attendance Record to Enhance security
Implementing Three Factors Authentication System (3FA) to Ma...
收藏 引用
Intelligent Technologies (CONIT), International Conference on
作者: Plezzant Columbus Johnson Shri Kant Sandeep Kumar Department of Computer Science Engineering Sharda University Center for Cyber Security and Cryptology Sharda University
Today as we all know that maintaining of employee credential have been some major issues around the world. Finding it more difficult to keep track of employees. With this, the company, institution, or government entit...
来源: 评论
Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第9期25卷 12528-12537页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Tariq, Tayyaba Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Sichuan University Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Yunlin Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
Vehicular network technology has made substantial advancements in recent years in the field of Intelligent Transportation Systems. Vehicular Cloud Computing (VCC) has emerged as a novel paradigm with a substantial inc... 详细信息
来源: 评论
Joint Optimization of Compression, Transmission and Computation for Cooperative Perception Aided Intelligent Vehicular Networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8201-8214页
作者: Lu, Binbin Huang, Xumin Wu, Yuan Qian, Liping Zhou, Sheng Niyato, Dusit University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science 999078 China Guangdong University of Technology School of Automation Guangzhou510006 China University of Macau State Key Lab of Internet of Things for Smart City 999078 China University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer Information Science 999078 China Zhuhai UM Science and Technology AQ2 Research Institute Zhuhai519301 China Zhejiang University of Technology Institute of Cyberspace Security Hangzhou310023 China Tsinghua University Beijing National Research Center for Information Science and Technology Department of Electronic Engineering Beijing100084 China Nanyang Technological University School of Computer Science and Engineering 639815 Singapore
Cooperative perception is a promising paradigm to tackle the perception limitations of a single intelligent vehicle (IV) to enhance the driving safety and efficiency in intelligent vehicular networks. However, the rea... 详细信息
来源: 评论
MAD-ANET:Malware Detection Using Attention-Based Deep Neural Networks
收藏 引用
computer Modeling in engineering & sciences 2025年 第4期143卷 1009-1027页
作者: Waleed Khalid Al-Ghanem Emad Ul Haq Qazi Tanveer Zia Muhammad Hamza Faheem Muhammad Imran Iftikhar Ahmad Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11362Saudi Arabia Centre of Artificial Intelligence Naif Arab University for Security SciencesRiyadh14812Saudi Arabia School of Arts and Sciences The University of Notre DameSydneyNSW 2007Australia Center for Smart Analytics Institute of InnovationScience and SustainabilityFederation University AustraliaBerwickVIC 3806Australia Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia
In the current digital era,new technologies are becoming an essential part of our ***,the number ofmalicious software ormalware attacks is rapidly *** is no doubt,themajority ofmalware attacks can be detected by most ... 详细信息
来源: 评论
information spreading in mobile social networks: Identifying the influential nodes using FPSO algorithm  10
Information spreading in mobile social networks: Identifying...
收藏 引用
10th International Conference on information Technology: IoT and Smart City, ICIT 2022
作者: Zhang, Xinxin Xu, Li Xu, Zhenyu Sun, Hung-Min Lee, Chia-Wei College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China The Department of Computer Science National Tsing Hua University Hsinchu Taiwan Department of Computer Science and Information Engineering National Taitung University Taiwan
The most influential nodes are capable of generating maximum influence and widest information spread to their connected nodes in mobile social networks. Hence identifying high influential users plays an important role... 详细信息
来源: 评论