咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,545 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,467 篇 工学
    • 1,207 篇 计算机科学与技术...
    • 1,020 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 594 篇 理学
    • 288 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,084 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2545 条 记 录,以下是2451-2460 订阅
排序:
The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence
The security challenges in the IoT enabled cyber-physical sy...
收藏 引用
Congress on Evolutionary Computation
作者: Hongmei He Carsten Maple Tim Watson Ashutosh Tiwari Jörn Mehnen Yaochu Jin Bogdan Gabrys Department of Manufacturing Cranfield University Cranfield MK43 OAL UK Cyber Security Centre - WMG University of Warwick UK Department of Computer Science University of Surrey UK School of Design Engineering & Computing Bournemouth University UK
Internet of Things (IoT) has given rise to the fourth industrial revolution (Industrie 4.0), and it brings great benefits by connecting people, processes and data. However, cybersecurity has become a critical challeng...
来源: 评论
The design and implementation of network attack and defense platform based on cloud desktop
收藏 引用
Journal of Physics: Conference Series 2017年 第1期887卷
作者: Zining Yan Yunhan Wang Shijiao Shao Boquan Li Embedded System Lab. College of Computer Science and Technology Harbin China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Key Laboratory of Network Assessment of Technology Chinese Academy of Sciences Beijing China
This paper discusses the cloud desktop technology, virtualization technology and penetration testing technology used in the network attack and defense training platform, and introduces the design and implementation pr...
来源: 评论
OCReM: OpenStack-based cloud datacentre resource monitoring and management scheme
收藏 引用
International Journal of High Performance Computing and Networking 2016年 第1-2期9卷 31-44页
作者: Lu, Zhihui Bao, Jie Wu, Jie Hung, Patrick C.K. School of Computer Science Fudan University Shanghai200433 China IT Management Research Department Yokohama Research Laboratory Hitachi Ltd. Japan Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education 200433 China Faculty of Business and IT University of Ontario Institute of Technology ON Canada
Managing virtualised computing, network and storage resources at large-scale in both public and private cloud datacentres is a challenging task. As an open source cloud operating system, OpenStack needs to be enhanced... 详细信息
来源: 评论
Glaucoma detection from retinal images  2
Glaucoma detection from retinal images
收藏 引用
2nd International Conference on Electronics and Communication Systems, ICECS 2015
作者: Devi, T. M. Gayathri Sudha, S. Suraj, P. Department of Computer Science and Engineering Thiagarajar College of Engineering Madurai India Cyber Forensics and Information Security Electronics Research and Development Center of India Thiruvananthapuram India
Glaucoma disease detection from retinal images using classifiers like least square-Support Vector Machine classifier, random forest, dual Sequential Minimal Optimization classifier, naive bayes classifier and artifici... 详细信息
来源: 评论
Artificial neural networks in retinal image analysis  3
Artificial neural networks in retinal image analysis
收藏 引用
3rd International Conference on Signal Processing, Communication and Networking, ICSCN 2015
作者: Gayathri Devi, T.M. Sudha, S. Suraj, P. Department of Computer Science and Engineering Thiagarajar College of Engineering Madurai India Cyber Forensics and Information Security Electronics Research and Development Center of India Thiruvananthapuram India
Glaucoma disease detection from retinal images using classifiers like Least Square-Support Vector Machine classifier, Random forest, Dual Sequential Minimal Optimization classifier, Naive bayes classifier and Artifici... 详细信息
来源: 评论
Consistency Analysis for Secure Reconstruction in Secret Image Sharing  2015
Consistency Analysis for Secure Reconstruction in Secret Ima...
收藏 引用
13th International Conference on Advances in Mobile Computing and Multimedia, MoMM 2015
作者: Hidayat, Anneke Soraya Lee, Gil-Je Yoon, Eun-Jun Yoo, Kee-Young School of Computer Science and Engineering Kyungpook National University Daegu Korea Republic of Department of Cyber Security Kyungil University Gyenggsan-Si Gyeongbuk Korea Republic of
Secret sharing is a scheme to distribute a secret message s into n participants, thus t or more participants can reconstruct the secret message s. While less than t shares can know nothing about the secret, the proble... 详细信息
来源: 评论
ESEC: An Ideal Secret Sharing Scheme
ESEC: An Ideal Secret Sharing Scheme
收藏 引用
1st International Conference on Intelligent Computing, Communication and Devices, ICCD 2014
作者: Sarath, Greeshma Deepu, S. Sundararajan, Sudharsan Achuthan, Krishnashree Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Amritapuri Kollam India Department of Cyber Security Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri Kollam India
Secret sharing techniques have been used to ensure data confidentiality and enable secure reconstruction of data. In this paper, we propose a novel secret sharing scheme called ESEC based on Elliptic Curve Cryptograph... 详细信息
来源: 评论
Multicast adaptive logic for Dynamic Adaptive Streaming over HTTP network
Multicast adaptive logic for Dynamic Adaptive Streaming over...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM WKSHPS 2015
作者: Dubin, Ran Dvir, Amit Hadar, Ofer Harel, Nissim Barkan, Refael Communication Systems Engineering Ben-Gurion University of the Negev Israel Cyber Security Center Department of Computer Science and Mathematics Ariel University Israel Computer Science Department Holon Institute of Technology Israel Computer Science School College of Management Academic Studies Israel
Video streaming constitutes the vast majority of Internet traffic and the DASH protocol has become the de-facto standard in the industry of multimedia delivery. The multicast method for information distribution has th... 详细信息
来源: 评论
Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment
收藏 引用
Multimedia Tools and Applications 2017年 第21期76卷 22785-22785页
作者: Shen, Jian Tan, Haowen Zhang, Yan Sun, Xingming Xiang, Yang Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology School of Computer & Software Nanjing University of Information Science and Technology Nanjing China School of Computer & Software Nanjing University of Information Science & Technology Nanjing China Simula Research Laboratory of Norway and the Department of Informatics University of Oslo Oslo Norway Center for Cyber Security Research Deakin University Deakin Australia
来源: 评论
Experience Report: Detecting Poor-Responsive UI in Android Applications
Experience Report: Detecting Poor-Responsive UI in Android A...
收藏 引用
International Symposium on Software Reliability engineering (ISSRE)
作者: Yu Kang Yangfan Zhou Min Gao Yixia Sun Michael R. Lyu Shenzhen Research Institute The Chinese University Hong Kong China Computer Sci. & Eng. Dept. The Chinese Univercity Hong Kong China School of Computer Science Fudan University Shanghai China Ministry of Education Engineering Research Center of Cyber Security Auditing and Monitoring China School of Management Zhejiang University Hangzhou Zhejiang China
Good user interface (UI) design is key to successful mobile apps. UI latency, which can be considered as the time between the commencement of a UI operation and its intended UI update, is a critical consideration for ... 详细信息
来源: 评论