咨询与建议

限定检索结果

文献类型

  • 524 篇 会议
  • 360 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 892 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 541 篇 工学
    • 449 篇 计算机科学与技术...
    • 369 篇 软件工程
    • 111 篇 信息与通信工程
    • 73 篇 控制科学与工程
    • 62 篇 电气工程
    • 59 篇 生物工程
    • 48 篇 生物医学工程(可授...
    • 47 篇 电子科学与技术(可...
    • 36 篇 安全科学与工程
    • 30 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 28 篇 网络空间安全
    • 25 篇 光学工程
    • 25 篇 仪器科学与技术
    • 19 篇 建筑学
  • 219 篇 理学
    • 99 篇 数学
    • 63 篇 生物学
    • 56 篇 物理学
    • 32 篇 统计学(可授理学、...
    • 28 篇 系统科学
    • 19 篇 化学
  • 178 篇 管理学
    • 126 篇 管理科学与工程(可...
    • 79 篇 工商管理
    • 64 篇 图书情报与档案管...
  • 68 篇 医学
    • 60 篇 临床医学
    • 54 篇 基础医学(可授医学...
    • 34 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 44 篇 法学
    • 28 篇 社会学
  • 33 篇 经济学
    • 33 篇 应用经济学
  • 10 篇 农学
  • 7 篇 教育学
  • 7 篇 军事学
  • 1 篇 文学

主题

  • 41 篇 information syst...
  • 35 篇 application soft...
  • 31 篇 security
  • 31 篇 software
  • 27 篇 systems engineer...
  • 26 篇 software systems
  • 23 篇 software enginee...
  • 22 篇 computer archite...
  • 21 篇 hardware
  • 19 篇 computer science
  • 19 篇 machine learning
  • 18 篇 internet of thin...
  • 18 篇 computational mo...
  • 18 篇 protocols
  • 18 篇 cloud computing
  • 17 篇 access control
  • 16 篇 wireless sensor ...
  • 16 篇 blockchain
  • 15 篇 deep learning
  • 14 篇 authentication

机构

  • 12 篇 center for secur...
  • 9 篇 center for secur...
  • 7 篇 information and ...
  • 7 篇 key laboratory o...
  • 7 篇 center for secur...
  • 7 篇 national water a...
  • 6 篇 ieee
  • 6 篇 center for infor...
  • 6 篇 ben-gurion unive...
  • 6 篇 department of so...
  • 6 篇 college of infor...
  • 6 篇 center for secur...
  • 5 篇 interdisciplinar...
  • 5 篇 department of in...
  • 5 篇 intelligent dist...
  • 5 篇 university of ch...
  • 5 篇 state key labora...
  • 5 篇 school of inform...
  • 5 篇 state key labora...
  • 5 篇 department of so...

作者

  • 23 篇 ismail leila
  • 15 篇 jajodia sushil
  • 12 篇 sushil jajodia
  • 11 篇 r.s. sandhu
  • 11 篇 materwala huned
  • 11 篇 elovici yuval
  • 11 篇 s. jajodia
  • 9 篇 sandhu ravi s.
  • 9 篇 guri mordechai
  • 9 篇 leila ismail
  • 8 篇 ren yongchang
  • 8 篇 chen xiaoji
  • 7 篇 shahar yuval
  • 6 篇 wijesekera dumin...
  • 6 篇 seaman carolyn
  • 6 篇 muhaidat sami
  • 6 篇 choo kim-kwang r...
  • 6 篇 tomoyuki yokogaw...
  • 6 篇 xing tao
  • 6 篇 hirohisa aman

语言

  • 856 篇 英文
  • 30 篇 其他
  • 3 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 土耳其文
检索条件"机构=Center for Secure Information Systems Department of Information and Software Systems Engineering"
892 条 记 录,以下是1-10 订阅
排序:
IoT device identification based on network communication analysis using deep learning
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第7期14卷 9113-9129页
作者: Kotak, Jaidip Elovici, Yuval Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva Israel
Attack vectors for adversaries have increased in organizations because of the growing use of less secure IoT devices. The risk of attacks on an organization’s network has also increased due to the bring your own devi... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, Sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
Optimizing beyond boundaries: empowering the salp swarm algorithm for global optimization and defective software module classification
收藏 引用
Neural Computing and Applications 2024年 第30期36卷 18727-18759页
作者: Kassaymeh, Sofian Al-Betar, Mohammed Azmi Rjoubd, Gaith Fraihat, Salam Abdullah, Salwani Almasri, Ammar Software Engineering Department Faculty of Information Technology Aqaba University of Technology Aqaba Jordan College of Engineering and Information Technology Ajman University Ajman United Arab Emirates Department of Information Technology Al-Huson University College Al-Balqa Applied University Irbid Jordan Concordia Institute for Information Systems Engineering Concordia University Montreal Canada Artificial Intelligence Department Faculty of Information Technology Aqaba University of Technology Aqaba Jordan Data Mining and Optimization Research Group Center for Artificial Intelligence Technology Universiti Kebangsaan Malaysia Bangi Malaysia Management Information Systems Department Al-Balqa Applied University Amman Jordan
This work presents a new version of the salp swarm optimizer (SSA), called "mSSA," that uses complex mathematical expressions to dynamically manipulate the crucial control parameter (c1) during optimization.... 详细信息
来源: 评论
Discussion Paper: The Threat of Real Time Deepfakes  2
Discussion Paper: The Threat of Real Time Deepfakes
收藏 引用
2nd Workshop on the security implications of Deepfakes and Cheapfakes, WDC 2023, held in conjunction with ACM AsiaCCS 2023
作者: Frankovits, Guy Mirsky, Yisroel Department of Software and Information Systems Engineering Ben-Gurion University Beersheba Israel
Generative deep learning models are able to create realistic audio and video. This technology has been used to impersonate the faces and voices of individuals. These "deepfakes"are being used to spread misin... 详细信息
来源: 评论
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
Science China(information Sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论
Log Preservation in Custody Dual Blockchain With Energy Regime and Obfuscation Shuffle
收藏 引用
IEEE Transactions on Network Science and engineering 2024年 第4期11卷 3495-3511页
作者: Chew, Chit-Jie Lee, Wei-Bin Chen, Tzu-Hao Lin, Iuon-Chang Lee, Jung-San Feng Chia University Department of Information Engineering and Computer Science Taichung407 Taiwan Hon Hai Research Institute Information Security Research Center Taipei236 Taiwan National Chung Hsing University Department of Management Information Systems Taichung402 Taiwan
The rise of cybercrime has led to an explosion of threats in recent years, resulting in the increasingly important of digital forensics. To achieve successful investigation and prosecution, the log preservation is a c... 详细信息
来源: 评论
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 1867-1888页
作者: Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjman346United Arab Emirates Department of Computer Information Systems Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbid22110Jordan College of Technological Innovation Zayed UniversityAbu Dhabi144534United Arab Emirates Faculty of Information Technology and Computer Science Yarmouk UniversityIrbid21163Jordan Computer Information Systems Higher Colleges of TechnologySharjah341214United Arab Emirates
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh... 详细信息
来源: 评论
PrinterLeak: Leaking Sensitive Data by Exploiting Printer Display Panels  23rd
PrinterLeak: Leaking Sensitive Data by Exploiting Printer D...
收藏 引用
23rd International Conference on Computational Science and Its Applications, ICCSA 2023
作者: Guri, Mordechai Department of Software and Information Systems Engineering Cyber-Security Research Center Ben-Gurion University of the Negev Be’er Sheva Israel
Sensitive networks hold and process confidential information and, therefore, are kept separate from the Internet. This defensive measure is known as an ‘air gap.’ In this paper, we show that attackers can exploit ne... 详细信息
来源: 评论
A DSL-based Approach for Code Generation and Navigation Process Management in a Single Page Application  14
A DSL-based Approach for Code Generation and Navigation Proc...
收藏 引用
14th International Conference on Emerging Ubiquitous systems and Pervasive Networks / 13th International Conference on Current and Future Trends of information and Communication Technologies in Healthcare, EUSPN/ICTH 2023
作者: Naimi, Lahbib Abdelmalek, Hamza Jakimi, Abdeslam Software Engineering and Information Systems Engineering Team Department of Informatics Faculty of Sciences Techniques of Errachidia University of Moulay Ismail Errachidia52000 Morocco
Single page applications (SPAs) are web applications that offer a fast and responsive user experience, but also pose some challenges in terms of navigation process management and platform compatibility. In this paper,... 详细信息
来源: 评论
Enhancing secure Development in Globally Distributed software Product Lines: A Machine Learning-Powered Framework for Cyber-Resilient Ecosystems
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 5031-5049页
作者: Marya Iqbal Yaser Hafeez Nabil Almashfi Amjad Alsirhani Faeiz Alserhani Sadia Ali Mamoona Humayun Muhammad Jamal University Institute of Information Technology PMAS-Arid Agriculture UniversityRawalpindiPakistan Department of Software Engineering College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Computer Science College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Computer Engineering&Networks College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Information Systems College of Computer and Information SciencesJouf UniversitySakakaAl Jouf72388Saudi Arabia Department of Mathematics Pir Mehr Ali Shah Arid Agriculture UniversityRawalpindiPakistan
Embracing software product lines(SPLs)is pivotal in the dynamic landscape of contemporary software ***,the flexibility and global distribution inherent in modern systems pose significant challenges to managing SPL var... 详细信息
来源: 评论