咨询与建议

限定检索结果

文献类型

  • 380 篇 会议
  • 313 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 437 篇 工学
    • 351 篇 计算机科学与技术...
    • 288 篇 软件工程
    • 106 篇 信息与通信工程
    • 94 篇 电气工程
    • 65 篇 控制科学与工程
    • 62 篇 生物工程
    • 38 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 18 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
  • 163 篇 理学
    • 82 篇 数学
    • 64 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 24 篇 物理学
    • 21 篇 系统科学
    • 18 篇 化学
  • 106 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 40 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 36 篇 法学
    • 19 篇 法学
    • 17 篇 社会学
  • 33 篇 医学
    • 27 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
    • 15 篇 公共卫生与预防医...
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 10 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 30 篇 machine learning
  • 29 篇 security
  • 28 篇 feature extracti...
  • 27 篇 deep learning
  • 23 篇 privacy
  • 20 篇 blockchain
  • 18 篇 cloud computing
  • 16 篇 internet of thin...
  • 14 篇 scalability
  • 14 篇 accuracy
  • 14 篇 training
  • 13 篇 deep neural netw...
  • 13 篇 computational mo...
  • 12 篇 support vector m...
  • 12 篇 data privacy
  • 12 篇 authentication
  • 12 篇 cryptography
  • 11 篇 wireless sensor ...
  • 11 篇 semantics
  • 11 篇 protocols

机构

  • 46 篇 school of comput...
  • 46 篇 school of cyber ...
  • 41 篇 school of cyber ...
  • 29 篇 school of comput...
  • 25 篇 national enginee...
  • 25 篇 institute of inf...
  • 24 篇 hubei engineerin...
  • 23 篇 hubei key labora...
  • 23 篇 services computi...
  • 23 篇 engineering rese...
  • 23 篇 cluster and grid...
  • 18 篇 school of softwa...
  • 16 篇 school of cyber ...
  • 16 篇 hubei key labora...
  • 16 篇 hubei engineerin...
  • 16 篇 school of inform...
  • 15 篇 center for cyber...
  • 15 篇 school of cyber ...
  • 14 篇 purple mountain ...
  • 14 篇 state key labora...

作者

  • 35 篇 zhou pan
  • 32 篇 jin hai
  • 29 篇 hai jin
  • 21 篇 taher m. ghazal
  • 18 篇 hu shengshan
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 15 篇 deqing zou
  • 15 篇 ahmed amjed abba...
  • 13 篇 liu daizong
  • 13 篇 zhang leo yu
  • 13 篇 hasan mohammad k...
  • 13 篇 amrita
  • 12 篇 zou deqing
  • 12 篇 gupta brij b.
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 xu zichuan
  • 9 篇 nurhizam safie m...

语言

  • 654 篇 英文
  • 38 篇 其他
  • 4 篇 中文
检索条件"机构=Center for Cyber Security and Cryptology Computer Science and Engineering"
696 条 记 录,以下是1-10 订阅
排序:
Credit Card Fraud Detection Using ML Techniques  1
收藏 引用
International Conference on Recent Developments in cyber security, ReDCySec 2023
作者: Bonkoungou, Samiratou Roy, Nihar Ranjan Ako, Nomel Haymes Axel-Elie Junior Mishra, Alpna Department of Computer Science and Engineering Sharda University Noida India Center of Cyber Security and Cryptology Sharda University Noida India
With the increasing use of Internet, online banking transactions have also increased. Everyday more and more users are being added to the cyberspace, which has also attracted cybercriminals. These scammers use stolen ... 详细信息
来源: 评论
Implementing Three Factors Authentication System (3FA) to Maintain Employee Attendance Record to Enhance security  3
Implementing Three Factors Authentication System (3FA) to Ma...
收藏 引用
3rd IEEE International Conference on Intelligent Technologies, CONIT 2023
作者: Johnson, Plezzant Columbus Kant, Shri Kumar, Sandeep Sharda University Department of Computer Science Engineering India Sharda University Center for Cyber Security and Cryptology India
Today as we all know that maintaining of employee credential have been some major issues around the world. Finding it more difficult to keep track of employees. With this, the company, institution, or government entit... 详细信息
来源: 评论
High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 183-211页
作者: Murad Njoum Rossilawati Sulaiman Zarina Shukur Faizan Qamar Center of Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangiSelangor43600Malaysia Computer Science and Cyber Security Faculty of Engineering and Information TechnologyBirZeit UniversityBirZeitRamallahP.O.Box 14Palestine
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden *** property makes it difficult for steganalysts’powerful data extraction t... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Endogenous security of FQn Networks: Adaptive System-Level Fault Self-Diagnosis
收藏 引用
IEEE Transactions on Reliability 2024年 第3期73卷 1659-1668页
作者: Lin, Yuhang Lin, Limei Huang, Yanze Xu, Li Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
Endogenous security has the ability to discover, eliminate, and solve internal security problems and hidden dangers within the network, and is a superior technology to ensure future network security. The t/k-diagnosis... 详细信息
来源: 评论
A Review of Intrusion Detection for Internet of Things Using Machine Learning
A Review of Intrusion Detection for Internet of Things Using...
收藏 引用
2024 International Conference on cybernation and Computation, cyberCOM 2024
作者: Paul, Ekwueme Chika Amrita Sharda School of Engineering & Technology Sharda University Computer Science & Engineering UP Greater Noida India Center for Cyber Security and Cryptology Computer Science & Engineering Sharda School of Engineering & Technology Sharda University UP Greater Noida India
As Internet of Things (IoT) networks proliferate across consumer and industrial sectors, safeguarding these interconnected cyber-physical systems is imperative. IoT ecosystems present abundant targets for malicious in... 详细信息
来源: 评论
Detecting cross-site scripting attacks using machine learning: A systematic review
Detecting cross-site scripting attacks using machine learnin...
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and security, ICABCS 2023
作者: Baniya, D. Amrita Chaudhary, A. Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India Center for Cyber Security and Cryptology Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India
In today s age, many daily tasks are performed through the Internet using various web applications. While using the web application, the information and data are stored in the database of the network which can easily ... 详细信息
来源: 评论
Review of permission-based malware detection in Android
Review of permission-based malware detection in Android
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and security, ICABCS 2023
作者: Rawat, Nishant Amrita Singh, Avjeet Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India Center for Cyber Security and Cryptology Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India
A market study showed that an average of 70% of smartphone users use an android-based smartphone. The Android operating system draws numerous malware threats as a result of its popularity. The statistic reveals that 9... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph Networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
cyber Threat Intelligence (CTI): An Analysis on the Use of Artificial Intelligence and Machine Learning to Identify cyber Hazards
Cyber Threat Intelligence (CTI): An Analysis on the Use of A...
收藏 引用
International Conference on Recent Developments in cyber security, ReDCySec 2023
作者: Kant, Neelima Amrita Department of Computer Science and Engineering School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida201306 India Department of Computer Science and Engineering School of Engineering and Technology Center for Cyber Security and Cryptology Sharda University Uttar Pradesh Greater Noida201306 India
Data transport volume and scope on networks are growing daily due to the quick advancements in network technology. It is challenging for cybersecurity specialists to keep track of every action taking place on the netw... 详细信息
来源: 评论