咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,545 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,467 篇 工学
    • 1,207 篇 计算机科学与技术...
    • 1,020 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 594 篇 理学
    • 288 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,084 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2545 条 记 录,以下是131-140 订阅
排序:
Enhancing Wireless Sensor Network Data Collection through Aerial Unmanned Vehicles
Enhancing Wireless Sensor Network Data Collection through Ae...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Ali Alheeti, Khattab M. Najim, Ali Hamza Satar, Nurhizam Safie Mohd Aliesawi, Salah A. Hashim, Aisha Hassan Abdallah Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq Faculty of Engineering Department of Electrical and Computer Engineering International Islamic University Malaysia Selangor Malaysia
This study addresses the critical aspect of data collection within Wireless Sensor Networks (WSNs), which consist of autonomous, compact sensor devices deployed to monitor environmental conditions. These networks have... 详细信息
来源: 评论
AI-Driven Solutions for Cloud security Implementing Intelligent Threat Detection and Mitigation Strategies
AI-Driven Solutions for Cloud Security Implementing Intellig...
收藏 引用
2024 IEEE International Conference on Intelligent Computing and Emerging Communication Technologies, ICEC 2024
作者: Yasani, Rajashekar Reddy Prasad, Putalpattu Muni Srinivas, Pattlola Reddy, N V Raja Sekhar Jawarkar, Parag Raghunath, Vedaprada Cloud Security Cloud Computing Cyber Security India University of Rome Tor Vergata Department of Industrial Engineering Italy Department of Computer Science and Engineering Telangana India Mlr Institute of Technology Department of It India Shri Ramdeobaba College of Engineering and Management Electronics Engineering Nagpur India Visveswaraya Technological University India
Adapting threat detection and response procedures is essential for businesses to stay ahead of the constantly developing cyberattack landscape. Researching cutting-edge tools like XDR, SIEM, SOAR, and NDR - which shed... 详细信息
来源: 评论
A novel coarse-grained knowledge graph embedding framework for platform risk identification from relational data
收藏 引用
Neural Computing and Applications 2025年 第18期37卷 12231-12251页
作者: Zhang, Qi Wang, Shicheng Wang, Lihong Sheng, Jiawei Guo, Shu Li, Chen He, Min Zhang, Renqiang School of Economics and Management Beihang University Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China School of Computer Science and Engineering Beihang University Beijing China
Platform risk identification from relational data aims to determine whether the target platforms are risky or not. However, in such a scenario, the relation data involve massive types of relations and numerous numeric... 详细信息
来源: 评论
Characterization and Properties of Bent-Negabent Functions
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 786-792页
作者: JIANG Niu ZHAO Min YANG Zhiyao ZHUO Zepeng CHEN Guolong School of Mathematical Sciences Huaibei Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University School of Cyber Science University of Science and Technology of China School of Computer Engineering Bengbu University
A further characterization of the bentnegabent functions is presented. Based on the concept of complete mapping polynomial, we provide a necessary and sufficient condition for a class of quadratic Boolean functions to... 详细信息
来源: 评论
Unveiling the Nexus: Exploring the Societal Implications of AI-Driven cybersecurity and Data Analysis  13
Unveiling the Nexus: Exploring the Societal Implications of ...
收藏 引用
13th International Conference on System Modeling and Advancement in Research Trends, SMART 2024
作者: Arif, Mohd Ahmad, Shahnawaz Nazim, Mohd Ahmad, Javed Onyarin, Ogala Justin Galgotias University Department of Computer Science Engineering and Technology Greater Noida India School of Computer Science Engineering and Technology Bennett University Greater Noida India Noida Institute of Engineering and Technology Department of Computer Science Greater Noida India University of Delta Pmb Cyber Security Department Delta State Agbor2090 Nigeria
AI when integrated with cybersecurity and data analysis forms a new field that will have great impact on the society. The present research focuses on the social consequences of integrating AI for cybersecurity and big... 详细信息
来源: 评论
Get A Sense of Accomplishment in Doing Exercises: A Reinforcement Learning Perspective  25
Get A Sense of Accomplishment in Doing Exercises: A Reinforc...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Niu, Songdeng Cao, Sheng University of Electronic Science and Technology of China School of Computer Science and Engineering Institute for Cyber Security China
Doing exercises is vital to improving students' learning effects. Setting reasonable rewards in the process of doing exercises can promote students' problem-solving interests. Reinforcement learning has been e... 详细信息
来源: 评论
A Behavior-Aware Scheme for Personalized Credit Computing  25
A Behavior-Aware Scheme for Personalized Credit Computing
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Dang, Sixuan Cao, Sheng Institute for Cyber Security University of Electronic Science and Technology of China School of Computer Science and Engineering China
Quality of Service (QoS) and Quality of Experience (QoE) are employed to characterize network performance to improve network resource utilization in web/internet-based services. However, user credit that also contribu... 详细信息
来源: 评论
The Future of Recruitment: Using Deep Learning to Build Intelligent Interview Bots  15
The Future of Recruitment: Using Deep Learning to Build Inte...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Ahmad, Shahnawaz Hussain, Shahadat Wasid, Mohammed Onyarin, Ogala Justin Arif, Mohd Ahmad, Javed Bennett University School of Computer Science Engineering and Technology Greater Noida India University of Delta Cyber Security Department PMB 2090 Delta State Agbor Nigeria Galgotias University Department of Computer Science Engineering and Technology Greater Noida India Sharda University Department of Computer Science Engineering and Technology Greater Noida India
The hiring process for IT positions is often complex and time-consuming, posing significant challenges for businesses seeking to maintain consistency and efficiency. Interview scheduling is complicated by manual effor... 详细信息
来源: 评论
GAN-Based Anomaly Intrusion Detection for Industrial Controller System  1
收藏 引用
World Conference on Information Systems for Business Management, ISBM 2023
作者: Riya V. Raj Sangeetha, V. Amritha, P.P. TIFAC-CORE in Cyber Security Amrita School of Engineering Coimbatore Amrita Vishwa Vidyapeetham Coimbatore India Department of Computer Science and Information Systems BITS Pilani Pilani India
Industrial controller system (ICS) is becoming more and more important in daily lives. In recent years, ICS has become more frequent targets of cyberattacks. In addition to the system, the environment is also signific... 详细信息
来源: 评论
Blockchain Based security Enabled Smart Contract for Energy Management  16
Blockchain Based Security Enabled Smart Contract for Energy ...
收藏 引用
16th International Conference on security of Information and Networks, SIN 2023
作者: Sharma, Aditi Patel, Mukta Choudhary, Arjun Kumar, Gajender Department of Computer Science and Engineering Maharashtra Pune India Parul Institute of Technology Parul University Department of Computer Science and Engineering Gujarat Vadodara India Sardar Patel University of Police Center for Cyber Security Security and Criminal Justice Jodhpur India Srm University Department of Computer Science and Engineering Delhi-NCR Campus India
Energy consumption is highly demanded area for major security concerns due to the high eye from attackers. In 2020, the 'Recorded future' released report for massive power outage in India[1]. With the increasi... 详细信息
来源: 评论