咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,465 篇 工学
    • 1,205 篇 计算机科学与技术...
    • 1,018 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 592 篇 理学
    • 286 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,077 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2538 条 记 录,以下是2441-2450 订阅
排序:
Measurement and analysis of tips in foursquare
Measurement and analysis of tips in foursquare
收藏 引用
IEEE Annual Conference on Pervasive Computing and Communications Workshops (PerCom)
作者: Yang Chen Yuxi Yang Jiyao Hu Chenfan Zhuang School of Computer Science Fudan University Shanghai China Ministry of Education Engineering Research Center of Cyber Security Auditing and Monitoring China The State Key Laboratory of Computer Science Chinese Academy of Sciences China Malong Technologies Co. Ltd. Shenzhen China
Being a leading online service providing both local search and social networking functions, Foursquare has attracted tens of millions of users all over the world. As a location-centric platform, Foursquare maintains t... 详细信息
来源: 评论
Bandwidth-aware delayed repair in distributed storage systems
Bandwidth-aware delayed repair in distributed storage system...
收藏 引用
International Workshop on Quality of Service
作者: Jiajie Shen Jiazhen Gu Yangfan Zhou Xin Wang School of Computer Science Fudan University Shanghai China The State Key Laboratory of Integrated Services Networks Xidian University Xi'an China Ministry of Education Engineering Research Center of Cyber Security Auditing and Monitoring China
In data storage systems, data are typically stored in redundant storage nodes to ensure storage reliability. When storage nodes fail, with the help of the redundant nodes, the lost data can be restored in new storage ... 详细信息
来源: 评论
CCluster: A highly scalable and elastic OpenFlow control plane  23
CCluster: A highly scalable and elastic OpenFlow control pla...
收藏 引用
23rd IEEE International Symposium on Quality of Service, IWQoS 2015
作者: Qiu, Kun Tu, Renlong Huang, Siyuan Zhao, Jin Wang, Xin School of Computer Science Fudan University Shanghai China Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education China
OpenFlow has been widely used in Software Defined Networking (SDN) to customize data plane behaviors through policies given by a logically centralized controller. The centralized control plane design brings the potent... 详细信息
来源: 评论
The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence
The security challenges in the IoT enabled cyber-physical sy...
收藏 引用
Congress on Evolutionary Computation
作者: Hongmei He Carsten Maple Tim Watson Ashutosh Tiwari Jörn Mehnen Yaochu Jin Bogdan Gabrys Department of Manufacturing Cranfield University Cranfield MK43 OAL UK Cyber Security Centre - WMG University of Warwick UK Department of Computer Science University of Surrey UK School of Design Engineering & Computing Bournemouth University UK
Internet of Things (IoT) has given rise to the fourth industrial revolution (Industrie 4.0), and it brings great benefits by connecting people, processes and data. However, cybersecurity has become a critical challeng...
来源: 评论
The design and implementation of network attack and defense platform based on cloud desktop
收藏 引用
Journal of Physics: Conference Series 2017年 第1期887卷
作者: Zining Yan Yunhan Wang Shijiao Shao Boquan Li Embedded System Lab. College of Computer Science and Technology Harbin China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Key Laboratory of Network Assessment of Technology Chinese Academy of Sciences Beijing China
This paper discusses the cloud desktop technology, virtualization technology and penetration testing technology used in the network attack and defense training platform, and introduces the design and implementation pr...
来源: 评论
OCReM: OpenStack-based cloud datacentre resource monitoring and management scheme
收藏 引用
International Journal of High Performance Computing and Networking 2016年 第1-2期9卷 31-44页
作者: Lu, Zhihui Bao, Jie Wu, Jie Hung, Patrick C.K. School of Computer Science Fudan University Shanghai200433 China IT Management Research Department Yokohama Research Laboratory Hitachi Ltd. Japan Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education 200433 China Faculty of Business and IT University of Ontario Institute of Technology ON Canada
Managing virtualised computing, network and storage resources at large-scale in both public and private cloud datacentres is a challenging task. As an open source cloud operating system, OpenStack needs to be enhanced... 详细信息
来源: 评论
Artificial neural networks in retinal image analysis  3
Artificial neural networks in retinal image analysis
收藏 引用
3rd International Conference on Signal Processing, Communication and Networking, ICSCN 2015
作者: Gayathri Devi, T.M. Sudha, S. Suraj, P. Department of Computer Science and Engineering Thiagarajar College of Engineering Madurai India Cyber Forensics and Information Security Electronics Research and Development Center of India Thiruvananthapuram India
Glaucoma disease detection from retinal images using classifiers like Least Square-Support Vector Machine classifier, Random forest, Dual Sequential Minimal Optimization classifier, Naive bayes classifier and Artifici... 详细信息
来源: 评论
Glaucoma detection from retinal images  2
Glaucoma detection from retinal images
收藏 引用
2nd International Conference on Electronics and Communication Systems, ICECS 2015
作者: Devi, T. M. Gayathri Sudha, S. Suraj, P. Department of Computer Science and Engineering Thiagarajar College of Engineering Madurai India Cyber Forensics and Information Security Electronics Research and Development Center of India Thiruvananthapuram India
Glaucoma disease detection from retinal images using classifiers like least square-Support Vector Machine classifier, random forest, dual Sequential Minimal Optimization classifier, naive bayes classifier and artifici... 详细信息
来源: 评论
Consistency Analysis for Secure Reconstruction in Secret Image Sharing  2015
Consistency Analysis for Secure Reconstruction in Secret Ima...
收藏 引用
13th International Conference on Advances in Mobile Computing and Multimedia, MoMM 2015
作者: Hidayat, Anneke Soraya Lee, Gil-Je Yoon, Eun-Jun Yoo, Kee-Young School of Computer Science and Engineering Kyungpook National University Daegu Korea Republic of Department of Cyber Security Kyungil University Gyenggsan-Si Gyeongbuk Korea Republic of
Secret sharing is a scheme to distribute a secret message s into n participants, thus t or more participants can reconstruct the secret message s. While less than t shares can know nothing about the secret, the proble... 详细信息
来源: 评论
ESEC: An Ideal Secret Sharing Scheme
ESEC: An Ideal Secret Sharing Scheme
收藏 引用
1st International Conference on Intelligent Computing, Communication and Devices, ICCD 2014
作者: Sarath, Greeshma Deepu, S. Sundararajan, Sudharsan Achuthan, Krishnashree Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Amritapuri Kollam India Department of Cyber Security Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri Kollam India
Secret sharing techniques have been used to ensure data confidentiality and enable secure reconstruction of data. In this paper, we propose a novel secret sharing scheme called ESEC based on Elliptic Curve Cryptograph... 详细信息
来源: 评论