咨询与建议

限定检索结果

文献类型

  • 17 篇 会议
  • 12 篇 期刊文献

馆藏范围

  • 29 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13 篇 工学
    • 8 篇 控制科学与工程
    • 6 篇 计算机科学与技术...
    • 6 篇 软件工程
    • 4 篇 信息与通信工程
    • 3 篇 网络空间安全
    • 2 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 航空宇航科学与技...
    • 1 篇 农业工程
  • 5 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 1 篇 公共管理
  • 3 篇 理学
    • 3 篇 系统科学
    • 2 篇 数学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 3 篇 quality of servi...
  • 2 篇 deep learning
  • 2 篇 relays
  • 2 篇 companies
  • 2 篇 optimization
  • 2 篇 feature extracti...
  • 2 篇 mobile communica...
  • 2 篇 performance eval...
  • 2 篇 artificial intel...
  • 2 篇 mathematical mod...
  • 2 篇 computer network...
  • 1 篇 internet of thin...
  • 1 篇 computer science
  • 1 篇 mobility
  • 1 篇 health informati...
  • 1 篇 eigenvalues and ...
  • 1 篇 bounded delay
  • 1 篇 image steganogra...
  • 1 篇 routing
  • 1 篇 cybersecurity an...

机构

  • 4 篇 saudi aramco cyb...
  • 3 篇 chair of compute...
  • 3 篇 chair of compute...
  • 2 篇 department of in...
  • 2 篇 department of in...
  • 2 篇 corporate techno...
  • 2 篇 department of co...
  • 1 篇 krembil research...
  • 1 篇 department of el...
  • 1 篇 university of wü...
  • 1 篇 department of ps...
  • 1 篇 neural basis of ...
  • 1 篇 fraunhofer iosb-...
  • 1 篇 school of mathem...
  • 1 篇 informatics univ...
  • 1 篇 sapienza univers...
  • 1 篇 institute of bio...
  • 1 篇 laboratory for c...
  • 1 篇 department of me...
  • 1 篇 department of bi...

作者

  • 9 篇 hermann de meer
  • 3 篇 khalid a.alissa
  • 3 篇 frimpong ansah
  • 2 篇 mesfer al duhayy...
  • 2 篇 sana alazwari
  • 2 篇 mohammed maray
  • 1 篇 marwa obbaya
  • 1 篇 roya khanzadeh
  • 1 篇 suresh kalyanasu...
  • 1 篇 alsaqer sara
  • 1 篇 holger boche
  • 1 篇 henrich c. pöhls
  • 1 篇 frank-uwe anders...
  • 1 篇 martin wollschla...
  • 1 篇 malek althubiany
  • 1 篇 christoph fische...
  • 1 篇 mohamed k.nour
  • 1 篇 mariusz głąbowsk...
  • 1 篇 aljabri malak
  • 1 篇 aljuwair mona

语言

  • 29 篇 英文
检索条件"机构=Chair of Computer Networks and Computer Communications"
29 条 记 录,以下是1-10 订阅
排序:
From computer systems to power systems: using stochastic network calculus for flexibility analysis in power systems
收藏 引用
Energy Informatics 2023年 第1期6卷 36页
作者: Fürmann, Tim Lechl, Michael de Meer, Hermann Weidlich, Anke University of Freiburg Emmy-Noether-Straße 2 Freiburg im Breisgau79110 Germany Chair of Computer Networks and Communications University of Passau Innstrasse 43 Passau94032 Germany
As power systems transition from controllable fossil fuel plants to variable renewable sources, managing power supply and demand fluctuations becomes increasingly important. Novel approaches are required to balance th... 详细信息
来源: 评论
Testing and Exploiting Tools to Improve OWASP Top Ten Security Vulnerabilities Detection  14
Testing and Exploiting Tools to Improve OWASP Top Ten Securi...
收藏 引用
14th IEEE International Conference on Computational Intelligence and Communication networks, CICN 2022
作者: Aljabri, Malak Aldossary, Maryam Al-Homeed, Noor Alhetelah, Bushra Althubiany, Malek Alotaibi, Ohoud Alsaqer, Sara Saudi Aramco Cybersecurity Chair College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University Networks and Communications Department Dammam Saudi Arabia College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University Networks and Communications Department Dammam Saudi Arabia
In many different sorts of businesses, including public and private, government, critical infrastructures, etc., web apps have grown recently. Therefore, securing web applications is a major concern to protect busines... 详细信息
来源: 评论
Modeling and Application of Self-Organizing Systems
Modeling and Application of Self-Organizing Systems
收藏 引用
International Conference on Self-Adaptive and Self-Organizing Systems (SASO)
作者: Richard Holzer Hermann de Meer University of Passau Chair for Computer Networks and Computer Communications Passau Germany
This tutorial gives an overview about mathematical modeling methods for complex and self-organizing systems. Modeling can be used for the analysis and optimization of existing systems and for the design and engineerin... 详细信息
来源: 评论
Sensor-based identification to detect counterfeit smartphones using Blockchain
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第12期14卷 16521-16538页
作者: Almuhaideb, Abdullah M. Alsunaidi, Shikah J. Department of Networks and Communications College of Computer Science and Information Technology SAUDI ARAMCO Cybersecurity Chair Imam Abdulrahman Bin Faisal University P.O. Box 1982 Dammam31441 Saudi Arabia Department of Computer Science College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University P.O. Box 1982 Dammam31441 Saudi Arabia
The rapid growth of the technology sector and the increasing need to own smartphones contributed to the increase in the rate of smartphones theft, as well as the sale of counterfeit or substandard devices. The Interne... 详细信息
来源: 评论
Regional Differences in Configurations of Energy Communities: Future Scenarios and Policy Implications  24
Regional Differences in Configurations of Energy Communities...
收藏 引用
Proceedings of the 15th ACM International Conference on Future and Sustainable Energy Systems
作者: David Reihs Friederich Kupzog Hermann De Meer Center for Energy AIT - Austrian Institute of Technology Austria and Chair of Computer Networks and Computer Communications University of Passau Germany Center for Energy AIT - Austrian Institute of Technology Austria Chair of Computer Networks and Computer Communications University of Passau Germany
Local energy communities can enable end customers to increase the use of renewable energy through sharing, trading and joint investments. These energy communities will have an impact on load flows and grid utilization... 详细信息
来源: 评论
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3515-3537页
作者: Iman Almomani Walid El-Shafai Aala AlKhayer Albandari Alsumayt Sumayh S.Aljameel Khalid Alissa Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Computer Science Department King Abdullah II School of Information TechnologyThe University of Jordan11942Jordan Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Computer Science Department Applied CollegeImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Computer Science Department College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia SAUDI ARAMCO Cybersecurity Chair Networks and Communications DepartmentCollege of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia
Nowadays,there is tremendous growth in biometric authentication and cybersecurity ***,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private ***,designing a... 详细信息
来源: 评论
Redactable signature schemes for trees with signer-controlled non-leaf-redactions
Communications in Computer and Information Science
收藏 引用
communications in computer and Information Science 2014年 455卷 155-171页
作者: Meer, Hermann De Pöhls, Henrich C. Posegga, Joachim Samelin, Kai Chair of Computer Networks and Communications University of Passau Passau Germany Chair of IT-Security University of Passau Passau Germany University of Passau Passau Germany
Redactable signature schemes (RSS) permit to remove parts from signed documents, while the signature remains valid. Some RSSs for trees allow to redact non-leaves. Then, new edges have to be added to the tree to prese... 详细信息
来源: 评论
Worst-Case Delay Slicing for Time-Sensitive Applications in Softwarized Industrial networks
Worst-Case Delay Slicing for Time-Sensitive Applications in ...
收藏 引用
International Conference on Emerging Technologies and Factory Automation (ETFA)
作者: Frimpong Ansah Jürgen Rottmeier Andreas Zirkler Hermann de Meer Chair of Computer Networks and Communications University of Passau Corporate Technology Research in Digitalization and Automation Siemens AG
The pervasiveness of network softwarization has drawn keen interest from industrial domain as network convergence becomes increasingly desirable amongst industrial operators. Coupled with the concept of network slicin...
来源: 评论
Optimal Deep Learning Driven Intrusion Detection in SDN-Enabled IoT Environment
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6587-6604页
作者: Mohammed Maray Haya Mesfer Alshahrani Khalid A.Alissa Najm Alotaibi Abdulbaset Gaddah AliMeree Mahmoud Othman Manar Ahmed Hamza Department of Information Systems College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia SAUDI ARAMCO Cybersecurity Chair Networks and Communications DepartmentCollege of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Prince Saud AlFaisal Institute for Diplomatic Studies RiyadhSaudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science Warwick UniversityCovetryUK Department of Computer Science Faculty of Computers and Information TechnologyFuture University in Egypt New Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
In recent years,wireless networks are widely used in different *** phenomenon has increased the number of Internet of Things(IoT)devices and their *** IoT has numerous advantages,the commonly-used IoT devices are expo... 详细信息
来源: 评论
Schedulability Analysis and GCL Computation for Time-Sensitive networks
Schedulability Analysis and GCL Computation for Time-Sensiti...
收藏 引用
IEEE International Conference on Industrial Informatics (INDIN)
作者: Frimpong Ansah Mohamed Amine Abid Hermann de Meer Corporate Technology Research in Digitalization and Automation Siemens AG Munich Germany Chair of Computer Networks and Computer Communications University of Passau Passau Germany
Industrial automation networks are composed of cyber-physical systems where frame delays and jitter influence significantly the quality of communication between control and field devices. Due to these constraints, suc...
来源: 评论