咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是61-70 订阅
排序:
Automatic APT Attack Reconstruction Supporting Lateral Movement  2nd
Automatic APT Attack Reconstruction Supporting Lateral Movem...
收藏 引用
2nd International Conference on security and information Technologies with AI, Internet Computing and Big-data Applications, SITAIBA 2023
作者: Fan, Chun-I Wu, Wei-Chen Shie, Cheng-Han Kuo, Hsin-Nan Lee, Bo-Yi Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung Taiwan National Center for High-Performance Computing Hsinchu Taiwan Information Security Research Center National Sun Yat-sen University Kaohsiung Taiwan
This work proposes a framework for generating datasets that allows users to adjust the APT attack techniques within it. The framework utilizes the MITRE ATT&CK framework to label the attack traffic based on the Ta... 详细信息
来源: 评论
InvMetrics: Measuring Privacy Risks for Split Model-Based Customer Behavior Analysis
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 4168-4177页
作者: Deng, Ruijun Hu, Shijing Lin, Junxiong Yang, Jirui Lu, Zhihui Wu, Jie Huang, Shih-Chia Duan, Qiang Fudan University Sch. of Comp. Science and the Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education Shanghai200433 China Fudan University School of Computer Science Shanghai200433 China Shanghai Blockchain Engineering Research Center Shanghai200433 China National Taipei University of Technology Department of Electronic Engineering Taipei City10608 Taiwan Pennsylvania State University Information Sciences and Technology Department AbingtonPA19001 United States
Mobile Edge Computing (MEC) has great potential to facilitate cheap and fast customer behavior analysis (CBA). Model splitting, widely adopted in collaborative learning of MEC, partitions the CBA models between the cu... 详细信息
来源: 评论
Face Detection in Video Live Stream Using Deep Learning  2
Face Detection in Video Live Stream Using Deep Learning
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Amrita Kumar, Rajiv Joshi, Shivani Raj, Daksh Centre for Cyber Security and Cryptology Computer Science & Engineering Sharda School of Engineering & Technology Sharda University U.P. Greater Noida India G L Bajaj Institute of Technology and Management Department of Applied Computational Science and Engineering Nvidia Ai Learning & Research Center U.P. Greater Noida India G L Bajaj Institute of Technology and Management Department of Computer Science and Engineering U.P. Greater Noida India Galgotias College of Engineering and Technology Department of Computer Science and Engineering U.P. Greater Noida India
With the increasing popularity of live streaming platforms, there is an imperative need for robust methods for identifying individuals in real-time. The proposed system utilizes Convolutional Neural Networks (CNN) com... 详细信息
来源: 评论
POFM: Profit-Oriented Flow Management in SDN-Based Data center Networks
POFM: Profit-Oriented Flow Management in SDN-Based Data Cent...
收藏 引用
2024 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology, IAICT 2024
作者: Wang, You-Chiun Liang, Jhong-Ting Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung Taiwan Information Security Research Center National Sun Yat-sen University Kaohsiung Taiwan
In a data center network (DCN), there are numerous hosts connected by well-organized switches, usually involving a large amount of data transmission to offer cloud services. How to manage flows in a DCN by deciding pa... 详细信息
来源: 评论
Efficient Convolutional Neural Network Based Side Channel Attacks Based on AES Cryptography  21
Efficient Convolutional Neural Network Based Side Channel At...
收藏 引用
21st IEEE Student Conference on Research and Development, SCOReD 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Aman, Azana Hafizah Abdulkadir, Rabiu Aliyu Islam, Shayla Farhan, Basim Abdulkareem Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia Department of Computer Techniques Engineering Baghdad10011 Iraq Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia
In recent years, profiled side-channel attacks have emerged as a particularly potent kind of side-channel attack that can circumvent cryptographic equipment's security. Convolutional neural networks (CNNs) have be... 详细信息
来源: 评论
Weather Satellite Tracking with RTL-SDR: NOAA 15 Image Reception and Signal Decoding  2
Weather Satellite Tracking with RTL-SDR: NOAA 15 Image Recep...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Waseem, Ahsan Kamil, Mohd Azhan Umar Bhardwaj, Abhisehek Razim, Abdul Qadeer, Mohammed Abdul Ghazal, Taher M. Aligarh Muslim University Department Of Electrical Engineering Aligarh India Aligarh Muslim University Department Of Computer Engineering Aligarh India Stony Brook University Department Of Electrical And Computer Engineering New York United States Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
This study examines the growing number of satellites, this paper explores the importance of satellite tracking and highlights NOAA-15 for information transmission and weather monitoring. It offers a low-cost configura... 详细信息
来源: 评论
Speed-Aware Flow Management with Packet Classification to Mitigate Congestion in VANETs
Speed-Aware Flow Management with Packet Classification to Mi...
收藏 引用
2023 VTS Asia Pacific Wireless Communications Symposium, APWCS 2023
作者: Wang, You-Chiun Ho, Cheng-En National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung Taiwan National Sun Yat-sen University Information Security Research Center Kaohsiung Taiwan
Due to service diversity, there may be many packet flows with different urgency and importance in a vehicular ad hoc network (VANET). In a traffic jam, numerous vehicles vie to send packets, which leads to network con... 详细信息
来源: 评论
Adaptive Countermeasure by Credibility to Defend SDN Controllers Against BlackNurse-SC Attacks  12
Adaptive Countermeasure by Credibility to Defend SDN Control...
收藏 引用
12th IEEE International Conference on Communication, Networks and Satellite, COMNETSAT 2023
作者: Wang, You-Chiun Wang, Pin-Yuan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung Taiwan National Sun Yat-sen University Information Security Research Center Kaohsiung Taiwan
Software-defined networking (SDN) facilitates network management by using a controller to monitor the network status and regulate switches. Owing to its central control nature, the controller often becomes the target ... 详细信息
来源: 评论
MSIsensor-RNA:Microsatellite Instability Detection for Bulk and Single-cell Gene Expression Data
收藏 引用
Genomics, Proteomics & Bioinformatics 2024年 第3期22卷 85-90页
作者: Peng Jia Xuanhao Yang Xiaofei Yang Tingjie Wang Yu Xu Kai Ye Department of Gynecology and Obstetrics Center for Mathematical MedicalThe First Affiliated Hospital of Xi’an Jiaotong UniversityXi’an 710061China MOE Key Lab for Intelligent Networks&Networks Security Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China School of Automation Science and Engineering Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China School of Computer Science and Technology Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China Genome Institute The First Affiliated Hospital of Xi’an Jiaotong UniversityXi’an 710061China School of Life Science and Technology Xi’an Jiaotong UniversityXi’an 710049China
Microsatellite instability(MSI)is an indispensable biomarker in cancer ***,MSI scoring methods by high-throughput omics methods have gained popularity and demonstrated better performance than the gold standard method ... 详细信息
来源: 评论
Efficient survivable mapping algorithm for logical topology in IP-over-WDM optical networks against node failure
收藏 引用
Journal of Supercomputing 2023年 第5期79卷 5037-5063页
作者: Cheng, Dun-Wei Chang, Jo-Yi Lin, Chen-Yen Lin, Limei Huang, Yanze Thulasiraman, Krishnaiyan Hsieh, Sun-Yuan Department of Computer Science and Information Engineering National Yunlin University of Science and Technology 123 University Road Yunlin64002 Taiwan Department of Computer Science and Information Engineering National Cheng Kung University No. 1 University Road Tainan701 Taiwan College of Mathematics and Informatics and the Key Laboratory of Network Security and Cryptology Fujian Normal University Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Mathematics and Physics Fujian University of Technology Fujian Fuzhou350118 China Department of Computer Science University of Oklahoma 660 Parrington Oval NormanOK73019 United States Department of Computer Science and Information Engineering National Chi Nan University No. 1 Daxue Rd Nantou County Puli Township54561 Taiwan
The survivable mapping problem in an IP-over-WDM network with a logical graph and physical graph is the problem of finding a mapping of a logical network in a physical layer so that any failure in physical topology do... 详细信息
来源: 评论