咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,465 篇 工学
    • 1,205 篇 计算机科学与技术...
    • 1,018 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 592 篇 理学
    • 286 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,077 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2538 条 记 录,以下是151-160 订阅
排序:
Design and Implementation of Side Channel Attack Based on Deep Learning LSTM
Design and Implementation of Side Channel Attack Based on De...
收藏 引用
2023 IEEE Region 10 Symposium, TENSYMP 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Center for Cyber Security Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq
Encryption algorithms and encryption devices both play a key role in ensuring the safety of data that has been encrypted. Various types of attacks, such as energy analysis, can be used to assess the reliability of the... 详细信息
来源: 评论
A Review of Key Elements for Underwater Wireless Sensor Networks
A Review of Key Elements for Underwater Wireless Sensor Netw...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Al-Dulaimi, Aymen Mohammed Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Aliesawi, Salah A. Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq
Underwater Wireless Sensor Networks (UWSNs) are emerging and have huge prospects since they have various applications in oceanography, environmental monitoring, and underwater communication. These networks contain low... 详细信息
来源: 评论
IoT Devices Authentication Using Artificial Neural Network
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 3701-3716页
作者: Syed Shabih Ul Hasan Anwar Ghani Ikram Ud Din Ahmad Almogren Ayman Altameem Department of Computer Science and Software Engineering International Islamic University Islamabad45000Pakistan Department of Information Technology The University of Haripur22620HaripurPakistan Chair of Cyber Security Department of Computer ScienceCollege of Computer and Information SciencesKing Saud UniversityRiyadh11633Saudi Arabia Chair of Cyber Security Department of Natural and Engineering SciencesCollege of Applied Studies and Community ServicesKing Saud UniversityRiyadh11543Saudi Arabia
User authentication is one of the critical concerns of information *** tend to use strong textual passwords,but remembering complex passwords is hard as they often write it on a piece of paper or save it in their mobi... 详细信息
来源: 评论
A Comprehensive Vulnerability Tools Analysis for security and Control in IT Environment and Organizations
A Comprehensive Vulnerability Tools Analysis for Security an...
收藏 引用
Electronics and Sustainable Communication Systems (ICESC), 2020 International Conference on
作者: Aryan Chaturvedi Bhumi Lakhani Tanisha Agarwal Mohana Minal Moharir Ashok Kumar A R Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
This research study analyzes the potential of integrating OpenVAS, Wireshark, Nmap, and Metasploit for comprehensive vulnerability analysis and assessment in IT environment and various public and private organizations... 详细信息
来源: 评论
GPS Based Efficient Real Time Vehicle Tracking and Monitoring System Using Two Factor Authentication and Internet of Things (IoT)
GPS Based Efficient Real Time Vehicle Tracking and Monitorin...
收藏 引用
Intelligent cyber Physical Systems and Internet of Things (ICoICI), International Conference on
作者: S Jeevan Kishan Karthik S Jayanth Sharma Mohana Minal Moharir Ashok Kumar A R Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
Vehicle tracking systems have evolved significantly over the years, transitioning from simple passive tracking devices to real-time monitoring systems that utilize global positioning system (GPS) and global system for... 详细信息
来源: 评论
Distributed Timestamp Mechanism Based on Verifiable Delay Functions
收藏 引用
computer Systems science & engineering 2023年 第2期44卷 1633-1646页
作者: Qiang Wu Zhaoyang Han Ghulam Mohiuddin Yongjun Ren Engineering Research Center of Digital Forensics of Ministry of Education School of Computer ScienceNanjing University of Information Science and TechnologyNanjing210044China Nanjing University of Aeronautics and Astronautics Nanjing210008China Department of Cyber Security at VaporVM Abu Dhabi999041United Arab Emirates
In the data communication system,the real-time information interaction of communication device increases the risk of privacy sensitive data being tam-pered ***,maintaining data security is one of the most important is... 详细信息
来源: 评论
An Urban Electric Vehicle Charging System via Hybrid Heterogeneous Modes
An Urban Electric Vehicle Charging System via Hybrid Heterog...
收藏 引用
2024 IEEE International Conference on Systems, Man, and cybernetics, SMC 2024
作者: Zhang, Keyang Liu, Yueheng Liu, Shuohan Gao, Junqiao Cao, Yue Ahmad, Naveed Zhang, Xu School of Cyber Science and Engineering Wuhan University China Wuhan Cyber Security Association China Qilu University of Technology China College of Computer and Information Sciences Prince Sultan University Riyadh Saudi Arabia Norwich United Kingdom
Electric Vehicle (EV) is regarded as the optimal alternative to traditional fuel-powered vehicles. However, the exponential surge in EV charging demand poses challenges in charging infrastructure planning and charging... 详细信息
来源: 评论
A Comprehensive Analysis of Social engineering Attacks: From Phishing to Prevention - Tools, Techniques and Strategies
A Comprehensive Analysis of Social Engineering Attacks: From...
收藏 引用
Intelligent cyber Physical Systems and Internet of Things (ICoICI), International Conference on
作者: Sarthak Gupta Mayank Pritwani Adarsh Shrivastava Mohana Minal Moharir Ashok Kumar A R Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
As the digitalization has accelerated, Social engineering Attacks have emerged as a prevalent threat in contemporary cybersecurity landscapes. This paper provides a comprehensive exploration of Social engineering Atta... 详细信息
来源: 评论
Efficient UAV Routing Strategies for Wireless Sensor Network Data Retrieval
Efficient UAV Routing Strategies for Wireless Sensor Network...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Al-Sharhanee, Kareem Ali Malalah Najim, Ali Hamza Alheeti, Khattab M. Ali Satar, Nurhizam Safie Mohd Hashim, Aisha Hassan Abdallah Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad10011 Iraq Department of Computer Technical Al-Diwaniyah Iraq College of Computer and Information Technology University of Anbar Computer Networking Systems Department Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
WSNs are applied in many disciplines where certain conditions require the ability to adapt to network sink mobility and changes in the dynamics of the area coverage. To meet these needs, it is necessary to develop int... 详细信息
来源: 评论
Collecting and analyzing key-value data under shuffled differential privacy
收藏 引用
Frontiers of computer science 2023年 第2期17卷 241-243页
作者: Ning WANG Wei ZHENG Zhigang WANG Zhiqiang WEI Yu GU Peng TANG Ge YU Faculty of Information Science and Engineering Ocean University of ChinaQingdao 266100China School of Computer Science and Engineering Northeastern UniversityShenyang 110819China Key Lab of Cryptologic Technology and Information Security Ministry of EducationShandong UniversityQingdao 266200China School of Cyber Science and Technology Shandong UniversityQingdao 266200China
1 Introduction Key-value data,as NoSQL data widely used in recent years,has been frequently collected and used for analysis in major websites and mobile *** frequency distribution estimation on the key domain,as well ... 详细信息
来源: 评论