咨询与建议

限定检索结果

文献类型

  • 77 篇 会议
  • 52 篇 期刊文献

馆藏范围

  • 129 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 80 篇 工学
    • 62 篇 计算机科学与技术...
    • 50 篇 软件工程
    • 20 篇 信息与通信工程
    • 12 篇 电气工程
    • 8 篇 电子科学与技术(可...
    • 8 篇 控制科学与工程
    • 7 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 航空宇航科学与技...
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 动力工程及工程热...
    • 2 篇 材料科学与工程(可...
    • 2 篇 冶金工程
    • 2 篇 化学工程与技术
    • 2 篇 石油与天然气工程
  • 45 篇 理学
    • 27 篇 数学
    • 14 篇 物理学
    • 10 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 4 篇 系统科学
    • 2 篇 化学
  • 20 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 9 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 3 篇 医学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学

主题

  • 6 篇 deep learning
  • 5 篇 computational mo...
  • 3 篇 conferences
  • 3 篇 support vector m...
  • 3 篇 public key crypt...
  • 3 篇 accuracy
  • 3 篇 quantum cryptogr...
  • 3 篇 privacy
  • 3 篇 cryptography
  • 2 篇 learning systems
  • 2 篇 scalability
  • 2 篇 sustainable deve...
  • 2 篇 telecommunicatio...
  • 2 篇 temperature meas...
  • 2 篇 genes
  • 2 篇 5g mobile commun...
  • 2 篇 medical services
  • 2 篇 quality of servi...
  • 2 篇 adversarial mach...
  • 2 篇 monitoring

机构

  • 7 篇 state key labora...
  • 6 篇 science and tech...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 care college of ...
  • 5 篇 institute of sys...
  • 5 篇 department of co...
  • 5 篇 saveetha institu...
  • 5 篇 saveetha institu...
  • 5 篇 tianjin key labo...
  • 4 篇 college of compu...
  • 4 篇 state key labora...
  • 4 篇 amrita vishwa vi...
  • 4 篇 research center ...
  • 3 篇 center for cyber...
  • 3 篇 shandong provinc...
  • 3 篇 state key labora...
  • 3 篇 center for intel...
  • 3 篇 department of mu...
  • 3 篇 school of comput...

作者

  • 6 篇 zhang yichen
  • 5 篇 guo hong
  • 5 篇 yu song
  • 5 篇 prabhakar krishn...
  • 5 篇 krishnan prabhak...
  • 5 篇 kharchenko vyach...
  • 5 篇 xu bingjie
  • 4 篇 lingjun pu
  • 4 篇 yang yang
  • 4 篇 chen ziyang
  • 4 篇 jingdong xu
  • 4 篇 fesenko herman
  • 4 篇 xinjing yuan
  • 4 篇 balakrishnan t. ...
  • 4 篇 u. samson ebenez...
  • 4 篇 ebenezar u. sams...
  • 4 篇 guan xiaohong
  • 4 篇 t. suresh balakr...
  • 3 篇 zeng bo
  • 3 篇 hongli zhang

语言

  • 115 篇 英文
  • 12 篇 其他
  • 2 篇 中文
检索条件"机构=Computer Networks and Systems Security"
129 条 记 录,以下是1-10 订阅
排序:
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Energy-Aware Reliable Routing with Blockchain security for Heterogeneous Wireless Sensor networks  5th
Energy-Aware Reliable Routing with Blockchain Security for H...
收藏 引用
5th International Conference on Advances in Information Communication Technology and Computing, AICTC 2024
作者: Swapna, M.P. Ramkumar, J. Karthikeyan, R. Center for Cyber Security Systems and Networks Amrita Vishwa Vidyapeetham Kollam Amritapuri India Department of Information Technology & Cognitive Systems Sri Krishna Arts & Science College Coimbatore India Department of Computer Technology Sri Krishna Adithya College of Arts and Science Coimbatore India
Wireless sensor networks, the dynamic networks with spatially dispersed sensors are used indispensably in a wide range of applications. Heterogeneous wireless sensor networks represent a collection of sensor nodes of ... 详细信息
来源: 评论
The Impact of 5G on the Transformation and Communication of Smart Entities
The Impact of 5G on the Transformation and Communication of ...
收藏 引用
International Conference on Smart Business and technology, ICSBT 2024
作者: Talbi, Chaymae Rahmouni, M’hamed Tahiri Alaoui, Moulay Lakbir Belhiah, Meryam Lagmiri, Souad Najoua Ziti, Soumia IPSS Intelligent Processing and Security of Systems Faculty of Science Mohammed V University Rabat1014 RP Morocco Mohammed V University Rabat Morocco IRSM Computer Science Networks Security and Management Higher Institute of Management Administration and Computer Engineering Rabat10040 Morocco
The advent of 5G technology marks a significant milestone in the evolution of smart businesses and technologies. This chapter explores the transformative effects of 5G on the communication and operational paradigms of... 详细信息
来源: 评论
A ROS-2 based Path Planning and Maze Solving of Autonomous Robots
A ROS-2 based Path Planning and Maze Solving of Autonomous R...
收藏 引用
2024 International Conference on Advances in Computing, Communication, Electrical, and Smart systems, iCACCESS 2024
作者: Nuhel, Ahsan Kabir Hossain, Sazzad Hassan, Md.Tonim Haider, Iftekhar Saha, Ankur Taha, Adnan Sabith Ony, Asma-UI Husna Electrical and Electronics Engineering Bangladesh University of Hertfordshire Computer Networks and Systems Security United Kingdom Electrical and Electronics Engineering Bangladesh Computer Science and Engineering Bangladesh University of Information Technology and Sciences Computer Science and Engineering Bangladesh
The goal of this study is to build a self-driving robot that can effectively navigate mazes by utilizing sophisticated computer vision algorithms with ROS2. Fusion 360 is used to create the robot model, and ROS2 launc... 详细信息
来源: 评论
An Unmanned Aerial Vehicle as a Multi-State System  16
An Unmanned Aerial Vehicle as a Multi-State System
收藏 引用
16th IEEE International Conference on Advanced Trends in Radioelectronics, Telecommunications and computer Engineering, TCSET 2022
作者: Kliushnikov, Ihor Kharchenko, Vyacheslav Fesenko, Herman Department of Computer Systems Networks and Cyber Security National Aerospace University 'KhAI' Kharkiv Ukraine
An unmanned aerial vehicle (UAV) is considered as a multi-state system (MSS). The results of the decomposition of the UAV into degradable and non-degradable components are presented. The reliability models of UAV as M... 详细信息
来源: 评论
IoT-Enhanced Gesture Recognition System for Healthcare Applications
IoT-Enhanced Gesture Recognition System for Healthcare Appli...
收藏 引用
2024 International Telecommunications Conference, ITC-Egypt 2024
作者: Krithika, L.B. Nallakaruppan, M.K. Baza, Mohamed Badr, Mahmoud Deora, Yuvraj Singh School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India College of Charleston Deparment of Computer Science CharlestonSC United States Polytechnic Institute Department of Networks and Computer Security UticaNY12201 United States
In response to the prevalent language barriers in medical settings, this paper proposes an innovative solution leveraging gesture recognition technology. Through the integration of deep learning models and Internet of... 详细信息
来源: 评论
Reliability Models of Multi-state UAV-based Monitoring systems: Mission Efficiency Degradation Issues
Reliability Models of Multi-state UAV-based Monitoring Syste...
收藏 引用
2023 International Conference on Information and Digital Technologies, IDT 2023
作者: Kliushnikov, Ihor Kharchenko, Vyacheslav Fesenko, Herman Zaitseva, Elena Levashenko, Vitaly Networks and Cyber Security National Aerospace University KhAI Department of Computer Systems Kharkiv Ukraine University of Zilina Faculty of Management Science and Informatics Zilina Slovakia
General classification of multi-state UAV-based monitoring systems (MsUMSs) in view of types of used main and redundant unmanned aerial vehicles (UAVs), automatic battery maintenance stations (ABMSs), and mission effi... 详细信息
来源: 评论
A Novel Low Power and High Speed 9-Transistors Dynamic Full-Adder Cell Simulation and Design  28
A Novel Low Power and High Speed 9-Transistors Dynamic Full-...
收藏 引用
28th IEEE Symposium on computers and Communications, ISCC 2023
作者: Rahimi, Parisa Tabany, Myasar Pourmoafi, Seyedali School of Physics Engineering Networks Computer Science University of Hertfordshire ALI0 9AB Hatfield Security and Systems Research Group Hertfordshire United Kingdom
In this paper, a novel Full-Adder cell, named pseudo dynamic has been proposed and designed through an intensive simulation. The circuit has only 9 transistors and no internal nodes connected to ground. The circuit ha... 详细信息
来源: 评论
Data Migration from Relational to NoSQL Database: Review and Comparative Study
Data Migration from Relational to NoSQL Database: Review a...
收藏 引用
International Conference on Advanced Intelligent systems for Sustainable Development, AI2SD 2022
作者: Saadouni, Chaimae El Bouchti, Karim Reda, Oussama Mohamed Ziti, Soumia Department of Computer Science Intelligent Processing Systems and Security Team Mohammed V University Rabat Morocco Algorithms Networks Intelligent Systems and Software Engineering Research Team Faculty of Sciences Mohammed V University Rabat Morocco
New storage requirements, analysis, and visualization of Big Data, which includes structured, semi-structured, and unstructured data, have caused the developers in the past decade to begin preferring Big Data database... 详细信息
来源: 评论
Cybersecurity elements in remote payment systems: research models
Cybersecurity elements in remote payment systems: research m...
收藏 引用
2022 IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2022
作者: Elena, Smirnova Sergey, Skryl Artyom, Sychev Mikhail, Sychev Bauman Moscow State Technical University Computer systems and networks dept Moscow Russia Bauman Moscow State Technical University Information security dept Moscow Russia
The article is devoted to the consideration of important elements of cybersecurity of payment systems for remote banking services. The existing technologies of customer service in the service of payment systems are an... 详细信息
来源: 评论