咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,545 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,467 篇 工学
    • 1,207 篇 计算机科学与技术...
    • 1,020 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 594 篇 理学
    • 288 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,084 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2545 条 记 录,以下是2481-2490 订阅
排序:
Malicious data classification using structural information and behavioral specifications in executables
Malicious data classification using structural information a...
收藏 引用
Recent Advances in engineering and Computational sciences (RAECS)
作者: Sandeep Kumar C. Rama Krishna Naveen Aggarwal Rakesh Sehgal Saurabh Chamotra Department of Computer Science and Engineering NITTTR Chandigarh India Department of Computer Science and Engineering Punjab University Chandigarh India Department of Cyber Security Technology Development CDAC Mohali India
With the rise in the underground Internet economy, automated malicious programs popularly known as malwares have become a major threat to computers and information systems connected to the internet. Properties such as... 详细信息
来源: 评论
WarMops: A Workload-Aware Resource Management Optimization Strategy for IaaS Private Clouds
WarMops: A Workload-Aware Resource Management Optimization S...
收藏 引用
IEEE International Conference on Services Computing (SCC)
作者: Jun Zhang Jing Wang Jie Wu Zhihui Lu Shiyong Zhang Yiping Zhong School of Computer Science Fudan University Shanghai China Engineering Research Center of Cyber Security Ministry of Education Shanghai China
For an IaaS cloud, the primary task is to satisfy users' demands for resources. Besides, administrators also have to deal with problems such as how to optimize allocation and utilization of resources at the data c... 详细信息
来源: 评论
Non-dominated sorting environmental adaptation method (NS-EAM)
Non-dominated sorting environmental adaptation method (NS-EA...
收藏 引用
International Conference on Signal Processing and Integrated Networks (SPIN)
作者: Ritu Nigam Arjun Choudhary K. K. Mishra Computer Science & Engineering ABES Engg. College Ghaziabad India Computer Science & Cyber Security S. P. U. P. Security and Criminal Justice Jodhpur India Computer Science & Engineering Moti Lal Nehru NIT Allahabad India
A modified version of NSGA-II named as NSEAM is proposed to solve multi-objective optimization (MOO) problems, which is better in performance as compared to NSGA-II. In this proposed algorithm a new Bio inspired algor... 详细信息
来源: 评论
Fairness-Aware Cooperative Caching Scheme for Mobile Social Networks
Fairness-Aware Cooperative Caching Scheme for Mobile Social ...
收藏 引用
IEEE International Conference on Communications
作者: Dongsheng Wei Konglin Zhu Xin Wang Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education China Institute of Computer Science University of Goettingen Goettingen Germany
Data access is an important and challenging issue in Mobile Social Networks (MSNs), and cooperative caching is an effective technique to improve the access performance. Most of current research efforts in data access ... 详细信息
来源: 评论
A biometric-based authenticated key agreement scheme using ECC for Wireless Sensor Networks  14
A biometric-based authenticated key agreement scheme using E...
收藏 引用
29th Annual ACM Symposium on Applied Computing, SAC 2014
作者: Yoon, Eun-Jun Yoo, Kee-Young Department of Cyber Security Kyungil University 33 Buho-Ri Hayang-Ub Kyungsan-Si Kyungsangpuk-Do 712-701 Korea Republic of School of Computer Science and Engineering Kyungpook National University 1370 Sankyuk-Dong Buk-Gu Daegu 702-701 Korea Republic of
Recently, various user authentication schemes have successfully drawn researchers' attention and been studied widely in order to guarantee secure communication for wireless sensor networks (WSNs). This paper propo... 详细信息
来源: 评论
PROTECTING COMMUNICATIONS INFRASTRUCTURE AGAINST cyber ATTACKS
收藏 引用
中国通信 2014年 第8期11卷 前插1-前插2页
作者: GU Dawu JIANG Xuxian XUE Yibo ZOU Wei Guo Li Shanghai Jiao Tong University in Computer Science and Engineering Department Cyber Defense Lab at the North Carolina State University Raleigh NC USA Tsinghua University Peking University and China Computer Federation(CCF) National Engineering Laboratory for Information Security Technologies in China
Our world becomes more and more dependent on communications infrastructure such as computer resources,network connections and devices for ***,current security techniques do not provide adequate protection against cybe... 详细信息
来源: 评论
CDCAS: A Novel Cloud Data Center security Auditing System
CDCAS: A Novel Cloud Data Center Security Auditing System
收藏 引用
IEEE International Conference on Services Computing (SCC)
作者: Xueying Wang Jun Zhang Mingbo Wang Lijun Zu Zhihui Lu Jie Wu School of Computer Science Fudan University China UnionPay Research Institute of Electronic Payment Shanghai China Auditing and Monitoring Engineering Research Center of Cyber Security Shanghai China
With the increasing acceptance of cloud data center and virtualization technology by enterprises and industries, the security concern becomes the key hindrance to the development and deployment of cloud computing. Sec... 详细信息
来源: 评论
Implementing a novel load-aware auto scale scheme for private cloud resource management platform
Implementing a novel load-aware auto scale scheme for privat...
收藏 引用
IEEE Symposium on Network Operations and Management
作者: Jie Bao Zhihui Lu Jie Wu Shiyong Zhang Yiping Zhong School of Computer Science Fudan University Shanghai China Fudan University Shanghai Shanghai CN Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education Shanghai China
Resources dynamical allocation and management is always an important feature in cloud computing. Auto Scale allows users to scale their cloud resources capacity according to elastic loads timely, which has been widely... 详细信息
来源: 评论
Improvement of timing reliability and data transfer security of synchrophasor measurements
Improvement of timing reliability and data transfer security...
收藏 引用
IEEE PES Transmission and Distribution Conference and Exposition
作者: L. Zhan D. Zhou T. King Y. Liu E. Johannessen J. Alexander B. Boza Dept. of Electrical Engineering and Computer Science University of Tennessee Knoxville USA Low Frequency Systems UrsaNav Inc Bedford USA Business Development Scout Industries LLC - Scout Cyber Security Knoxville USA
Synchronized phasor measurements are becoming one of the key measurement elements of wide area measurement systems in advanced power system monitoring, protection, and control applications. Availability of global posi... 详细信息
来源: 评论
Applying data mining to improve faculty evaluation for educational organizations
Applying data mining to improve faculty evaluation for educa...
收藏 引用
2014 International Conference on engineering Technology And Applications(ICETA2014)
作者: Wen Si Rong Tan Jian Wang Hongmei Liu Jianye Li College of Information and Computer Science Shanghai Business School Cyber Physical System R&D Center The Third Research Institute of Ministry of Public Security School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Donghua University The Third Research Institute of Ministry of Public Security
One of the challenges of educational organization improvement is to manage talented teachers effectively,*** assign the right teacher for given *** providing scientific performance evaluation,some factors related to a... 详细信息
来源: 评论