咨询与建议

限定检索结果

文献类型

  • 6,261 篇 会议
  • 3,429 篇 期刊文献
  • 35 册 图书

馆藏范围

  • 9,725 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,018 篇 工学
    • 4,281 篇 计算机科学与技术...
    • 3,318 篇 软件工程
    • 1,619 篇 信息与通信工程
    • 662 篇 控制科学与工程
    • 631 篇 电子科学与技术(可...
    • 625 篇 电气工程
    • 494 篇 生物工程
    • 401 篇 机械工程
    • 304 篇 仪器科学与技术
    • 274 篇 网络空间安全
    • 273 篇 生物医学工程(可授...
    • 262 篇 光学工程
    • 212 篇 动力工程及工程热...
    • 210 篇 化学工程与技术
    • 172 篇 交通运输工程
    • 171 篇 安全科学与工程
    • 153 篇 材料科学与工程(可...
  • 2,789 篇 理学
    • 1,455 篇 数学
    • 817 篇 物理学
    • 559 篇 生物学
    • 435 篇 统计学(可授理学、...
    • 262 篇 系统科学
    • 218 篇 化学
  • 1,649 篇 管理学
    • 1,058 篇 管理科学与工程(可...
    • 643 篇 图书情报与档案管...
    • 385 篇 工商管理
  • 263 篇 法学
    • 171 篇 社会学
  • 252 篇 医学
    • 199 篇 临床医学
    • 167 篇 基础医学(可授医学...
  • 146 篇 经济学
    • 146 篇 应用经济学
  • 131 篇 教育学
  • 70 篇 农学
  • 53 篇 军事学
  • 43 篇 文学
  • 20 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 220 篇 computational mo...
  • 207 篇 computer network...
  • 205 篇 computer science
  • 193 篇 semantics
  • 173 篇 internet
  • 166 篇 protocols
  • 152 篇 deep learning
  • 147 篇 accuracy
  • 146 篇 bandwidth
  • 138 篇 wireless sensor ...
  • 134 篇 routing
  • 127 篇 data mining
  • 120 篇 servers
  • 118 篇 quality of servi...
  • 117 篇 security
  • 111 篇 educational inst...
  • 111 篇 optimization
  • 108 篇 throughput
  • 106 篇 training

机构

  • 203 篇 computer network...
  • 196 篇 shandong provinc...
  • 149 篇 national and kap...
  • 149 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 148 篇 key laboratory o...
  • 146 篇 universidad iber...
  • 146 篇 university of sp...
  • 145 篇 yerevan physics ...
  • 144 篇 brunel universit...
  • 144 篇 indian institute...
  • 143 篇 academy of scien...
  • 141 篇 charles universi...
  • 137 篇 rwth aachen univ...
  • 136 篇 università di to...
  • 136 篇 university of de...
  • 135 篇 imperial college...
  • 134 篇 infn sezione di ...
  • 131 篇 zhejiang univers...
  • 128 篇 department of ph...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 8,668 篇 英文
  • 792 篇 其他
  • 280 篇 中文
  • 3 篇 日文
  • 1 篇 德文
检索条件"机构=Computer Network Technology"
9725 条 记 录,以下是1-10 订阅
排序:
Research on the application of data mining technology in the evaluation and decision of network security level protection  3
Research on the application of data mining technology in the...
收藏 引用
3rd International Conference on Electronic Information Engineering and Data Processing, EIEDP 2024
作者: Chen, Liang Xie, Dehua Wang, Bowei Guizhou Branch of the National Computer Network Emergency Technology Coordination Center Guizhou Province Guiyang City550001 China
With the promulgation of the equal protection 2.0 standard, there are more and more application systems involved in the evaluation of network security level protection, and the items and data of on-site evaluation are... 详细信息
来源: 评论
Meta label associated loss for fine-grained visual recognition
收藏 引用
Science China(Information Sciences) 2024年 第6期67卷 230-247页
作者: Yanchao LI Fu XIAO Hao LI Qun LI Shui YU School of Computer Science Nanjing University of Posts and Telecommunications School of Network Engineering Zhoukou Normal University School of Computer Science University of Technology Sydney
Recently, intensive attempts have been made to design robust models for fine-grained visual recognition, most notably are the impressive gains for training with noisy labels by incorporating a reweighting strategy int... 详细信息
来源: 评论
Central Tendency Feature Selection (CTFS): a novel approach for efficient and effective feature selection in intrusion detection systems
收藏 引用
Multimedia Tools and Applications 2025年 1-22页
作者: Bouke, Mohamed Aly Abdullah, Azizol Udzir, Nur Izura Samian, Normalia Department of Communication Technology and Network Faculty of Computer Science and Information Technology Universiti Putra Malaysia 43400 Serdang Malaysia
In the digital era, the escalation of data generation and cyber threats has heightened the importance of network security. Machine Learning-based Intrusion Detection Systems (IDS) play a crucial role in combating thes... 详细信息
来源: 评论
Method and Practice of Trusted Embedded Computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr... 详细信息
来源: 评论
A Base Station Deployment Algorithm for Wireless Positioning Considering Dynamic Obstacles
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4573-4591页
作者: Aiguo Li Yunfei Jia Department of Network Engineering Xi’an University of Science and TechnologyXi’an710600China College of Computer Science and Technology Xi’an University of Science and TechnologyXi’an710600China
In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of *** studies focus on optimizing base station deployment under t... 详细信息
来源: 评论
A new quantum key distribution resource allocation and routing optimization scheme
收藏 引用
Chinese Physics B 2024年 第3期33卷 244-259页
作者: 毕琳 袁晓同 吴炜杰 林升熙 School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130012China Key Laboratory of Network and Information Security in Jilin Province Changchun 130012China
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic ***,due to the stringent requirements of the quantum key generation environment,the g... 详细信息
来源: 评论
A deep learning model enabled multi-event recognition for distributed optical fiber sensing
收藏 引用
Science China(Information Sciences) 2024年 第3期67卷 291-307页
作者: Yujiao LI Xiaomin CAO Wenhao NI Kuanglu YU Institute of Information Science School of Computer and Information TechnologyBeijing Jiaotong University Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing Jiaotong University
Fiber optic sensors that utilize backscattered light offer distributed real-time measurements and have been seen tremendous improvements in sensing distance and spatial resolution over the last ***, these improvements... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
HEN:a novel hybrid explainable neural network based framework for robust network intrusion detection
收藏 引用
Science China(Information Sciences) 2024年 第7期67卷 72-90页
作者: Wei WEI Sijin CHEN Cen CHEN Heshi WANG Jing LIU Zhongyao CHENG Xiaofeng ZOU School of Computer Science and Engineering Xi'an University of TechnologyShaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Technology Wuhan University of Science and Technology School of Future Technology South China University of Technology Shenzhen Research Institute of Hunan University School of Computer Science Hunan University of Technology and Business Institute for Infocomm Research (I2R) Agency for Science Technology and Reseach (A*STAR)
With the rapid development of network technology and the automation process for 5G, cyberattacks have become increasingly complex and threatening. In response to these threats, researchers have developed various netwo... 详细信息
来源: 评论
Wireless Sensor Security Issues on Data Link Layer:A Survey
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4065-4084页
作者: Muhammad Zulkifl Hasan Zurina Mohd Hanapi Muhammad Zunnurain Hussain Department of Communication Technology and Network Faculty of Computer Science and Information TechnologyUniversiti Putra MalaysiaSerdangSelangor43400Malaysia
A computer network can be defined as many computing devices connected via a communication medium like the *** network development has proposed how humans and devices communicate *** networks have improved,facilitated,... 详细信息
来源: 评论