咨询与建议

限定检索结果

文献类型

  • 30 篇 会议
  • 20 篇 期刊文献

馆藏范围

  • 50 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25 篇 工学
    • 20 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 5 篇 信息与通信工程
    • 4 篇 土木工程
    • 3 篇 控制科学与工程
    • 3 篇 生物工程
    • 2 篇 光学工程
    • 2 篇 建筑学
    • 2 篇 船舶与海洋工程
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 交通运输工程
  • 11 篇 理学
    • 3 篇 物理学
    • 3 篇 生物学
    • 2 篇 数学
    • 2 篇 海洋科学
    • 1 篇 化学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 1 篇 药学(可授医学、理...
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 军事学
  • 1 篇 经济学

主题

  • 12 篇 computational mo...
  • 9 篇 computer simulat...
  • 9 篇 humans
  • 6 篇 animation
  • 4 篇 application soft...
  • 4 篇 biological syste...
  • 3 篇 avatars
  • 3 篇 information scie...
  • 2 篇 computer science
  • 2 篇 wireless communi...
  • 2 篇 autonomous agent...
  • 2 篇 authentication
  • 2 篇 computer graphic...
  • 2 篇 speech synthesis
  • 2 篇 kinematics
  • 2 篇 shape
  • 1 篇 internet of thin...
  • 1 篇 surveys
  • 1 篇 smart dumpster
  • 1 篇 performance gain

机构

  • 5 篇 center for secur...
  • 3 篇 department of co...
  • 3 篇 center for human...
  • 2 篇 department of ps...
  • 2 篇 school of mathem...
  • 2 篇 bioengineering d...
  • 2 篇 department of bi...
  • 2 篇 neuroinformatics...
  • 2 篇 department of ps...
  • 2 篇 scienze cliniche...
  • 2 篇 department of ne...
  • 2 篇 department of co...
  • 2 篇 norment institut...
  • 2 篇 national yunlin ...
  • 2 篇 supercomputing c...
  • 2 篇 centre of physic...
  • 2 篇 computer graphic...
  • 2 篇 computer science...
  • 2 篇 machine learning...
  • 2 篇 the mitre corpor...

作者

  • 5 篇 n.i. badler
  • 5 篇 sachin shetty
  • 4 篇 das ashok kumar
  • 4 篇 ashok kumar das
  • 4 篇 badler norman i.
  • 4 篇 mahmood khalid
  • 3 篇 t.i. oren
  • 3 篇 mohammad wazid
  • 3 篇 andreas tolk
  • 3 篇 shetty sachin
  • 3 篇 amit kumar mishr...
  • 3 篇 shamshad salman
  • 3 篇 tolk andreas
  • 2 篇 levent yilmaz
  • 2 篇 ghaith rabadi
  • 2 篇 william t. scher...
  • 2 篇 zhang lei
  • 2 篇 zhou li
  • 2 篇 saksham mittal
  • 2 篇 rabadi ghaith

语言

  • 47 篇 英文
  • 3 篇 其他
检索条件"机构=Center for Human Modeling and Simulation Department of Computer and Information Science"
50 条 记 录,以下是1-10 订阅
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
收藏 引用
IEEE Access 2023年 11卷 74000-74020页
作者: Javed, Safdar Hussain Ahmad, Maaz Bin Asif, Muhammad Akram, Waseem Mahmood, Khalid Das, Ashok Kumar Shetty, Sachin College of Computing and Information Sciences Karachi75190 Pakistan Lahore Garrison University Department of Computer Science Lahore54810 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan International Institute of Information Technology at Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Old Dominion University Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center Department of Modeling SuffolkVA23435 United States Old Dominion University Center for Cybersecurity Education and Research SuffolkVA23435 United States
The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. Machine learning (ML) t... 详细信息
来源: 评论
Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture
收藏 引用
Journal of Advanced Research 2024年 62卷 155-163页
作者: Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Kharel, Rupak Das, Ashok Kumar Shetty, Sachin Rodrigues, Joel J.P.C. School of Psychology and Computer Science University of Central Lancashire Preston United Kingdom Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Yunlin 64002 Taiwan Department of Software Engineering The University of Lahore Lahore 54590 Pakistan Department of Computer Science University of Sahiwal Punjab Sahiwal 57000 Pakistan Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad 500 032 India Department of Modeling Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center and Center for Cybersecurity Education and Research Old Dominion University Suffolk 23435 VA United States COPELABS Lusófona University Campo Grande 376 Lisbon 1749-024 Portugal
Introduction: The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and conduct in-depth analysis to provide value-added services to industries. The integration of the physical... 详细信息
来源: 评论
A Provably Secure and Lightweight Access Control Protocol for EI-Based Vehicle to Grid Environment
收藏 引用
IEEE Internet of Things Journal 2023年 第18期10卷 16650-16657页
作者: Shamshad, Salman Mahmood, Khalid Shamshad, Usman Hussain, Ibrar Hussain, Shafiq Das, Ashok Kumar The University of Lahore Department of Software Engineering Lahore54590 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan Riphah International University Riphah School of Computing and Innovation Lahore54000 Pakistan University of Sahiwal Department of Computer Science Sahiwal57000 Pakistan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Old Dominion University Virginia Modeling Analysis and Simulation Center SuffolkVA23435 United States
The energy Internet (EI) presents a novel paradigm for renewable energy distribution that utilizes communication and computing technologies to revolutionize the conventional intelligent transportation systems (ITSs) a... 详细信息
来源: 评论
Multiclass Classification Approaches for Intrusion Detection in IoT-Driven Aerial Computing Environment
Multiclass Classification Approaches for Intrusion Detection...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Saksham Mittal Amit Kumar Mishra Mohammad Wazid D. P. Singh Ashok Kumar Das Sachin Shetty Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Department of Modeling Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center Center for Cybersecurity Education and Research Old Dominion University Suffolk VA USA
Aerial Computing is one of the applications of Internet of Things (IoT) which makes use of autonomous aerial devices, such as drones and unmanned aerial vehicles (UAVs). The ubiquitous nature of IoT and aerial computi...
来源: 评论
Secure Location-based Authenticated Key Establishment Scheme for Maritime Communication
Secure Location-based Authenticated Key Establishment Scheme...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Saurabh Agrawal Anusha Vangala Ashok Kumar Das Neeraj Kumar Sachin Shetty Sajal K. Das Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Department of Computer Science Missouri University of Science and Technology Rolla Missouri USA Department of Computer Science and Engineering Thapar University Patiala India Department of Computational Modeling and Simulation Engineering Old Dominion University Suffolk Virginia USA
Maritime communication helps vessels and ports plan their movements, exchange environmental information, and communicate among themselves. The vessels' movement and changing location are critical to keep them secu... 详细信息
来源: 评论
EM-PAD: An Effective Mechanism for Phishing Attack Detection
EM-PAD: An Effective Mechanism for Phishing Attack Detection
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Aakash Saksham Mittal Mohammad Wazid Amit Kumar Mishra Ashok Kumar Das Sachin Shetty Mohsen Guizani Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India Department of Computer Science and Engineering Graphic Era Hill University Dehradun India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Department of Computational Modeling and Simulation Engineering Virginia Modeling Analysis and Simulation Center Old Dominion University Suffolk VA USA Machine Learning Department Mohamed bin Zayed University of Artificial Intelligence (MBZUAI) Abu Dhabi UAE
In the present era, the increasing number of network devices and ubiquitous computing leads to the flow of enormous amounts of data traffic, including sensitive and confidential information, on the internet and carryi... 详细信息
来源: 评论
AKM-FCCI: Secure Authentication and Key Management Mechanism for Fog Computing-Based IoT-Driven Critical Infrastructure
AKM-FCCI: Secure Authentication and Key Management Mechanism...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Vijay Karnatak Neha Tripathi Amit Kumar Mishra Mohammad Wazid Ashok Kumar Das Mohsen Guizani Sachin Shetty Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India Department of Computer Science and Engineering Graphic Era Hill University Dehradun India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Machine Learning Department Mohamed bin Zayed University of Artificial Intelligence (MBZUAI) Abu Dhabi UAE Department of Computational Modeling and Simulation Engineering Virginia Modeling Analysis and Simulation Center Old Dominion University Suffolk VA USA
Critical infrastructure refers to the key systems, assets, and facilities, whether they are physical or virtual, that are necessary for the overall functioning of a country. As our reliance on technology and networked... 详细信息
来源: 评论
Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers
收藏 引用
International Journal of information and computer Security 2021年 第1-2期16卷 63-83页
作者: Liang, Xueping Shetty, Sachin Tosh, Deepak K. Foytik, Peter Zhang, Lingchen Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Virginia Modeling Analysis and Simulation Center Old Dominion University NorfolkVA United States Department of Computer Science University of Texas at EL Paso El PasoTX United States
Distributed ledger technology (DLT) provides decentralised services by removing the need of trust among distributed nodes in the distributed system. Transactions across the network are visible to all participants. How... 详细信息
来源: 评论
A Novel Smartphone-Based human Activity Recognition Approach using Convolutional Autoencoder Long Short-Term Memory Network
A Novel Smartphone-Based Human Activity Recognition Approach...
收藏 引用
IEEE International Conference on information Reuse and Integration (IRI)
作者: Dipanwita Thakur Sandip Roy Suparna Biswas Edmond S. L. Ho Samiran Chattopadhyay Sachin Shetty Department of Computer Science Banasthali Vidyapith Jaipur Rajasthan India Virginia Modeling Analysis and Simulation Center Old Dominion University Suffolk VA USA Department of Computer Science and Engineering Maulana Abul Kalam Azad University of Technology Kolkata India School of Computing Science University of Glasgow Scotland United Kingdom Department of Information Technology Jadavpur University Kolkata India
In smart and intelligent health care, smartphone sensor-based automatic recognition of human activities has evolved as an emerging field of research. In many application domains, deep learning (DL) strategies are more...
来源: 评论
Cyclic Quantum Teleportation of Two-Qubit Entangled States by using Six-Qubit Cluster State and Six-Qubit Entangled State
arXiv
收藏 引用
arXiv 2024年
作者: Slaoui, A. El Kirdi, M. Ahl Laamara, R. Alabdulhafith, M. Chelloug, S.A. Abd El-Latif, A.A. LPHE-Modeling and Simulation Faculty of Sciences Mohammed V University in Rabat Rabat Morocco Centre of Physics and Mathematics CPM Faculty of Sciences Mohammed V University in Rabat Rabat Morocco Department of Information Technology College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia EIAS Data Science Lab College of Computer and Information Sciences Center of Excellence in Quantum and Intelligent Computing Prince Sultan University Riyadh11586 Saudi Arabia Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Koom32511 Egypt
Cyclic quantum teleportation schemes requires at least the existence of three collaborators acting all as senders and receivers of quantum information, each one of them has an information to be transmitted to the next... 详细信息
来源: 评论