咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,545 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,467 篇 工学
    • 1,207 篇 计算机科学与技术...
    • 1,020 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 594 篇 理学
    • 288 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,084 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2545 条 记 录,以下是2491-2500 订阅
排序:
A privacy protection model for location-based social networking services
A privacy protection model for location-based social network...
收藏 引用
2014 International Conference on engineering Technology And Applications(ICETA2014)
作者: Rong Tan Wen Si Jian Wang College of Information and Computer Science Shanghai Business School Cyber Physical System R&D Center The Third Research Institute of Ministry of Public Security School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University
Since the location-based social networking services emerged,the location privacy issue has gained widespread concerns from consumers and *** the location history plays an important role in knowledge discovery,many peo... 详细信息
来源: 评论
Practice of PBL in the Reading Teaching Strategies
Practice of PBL in the Reading Teaching Strategies
收藏 引用
2014 International Conference on Information Technology and Career Education
作者: Yingting Wang Jian Wang Hao Sheng Nanjing Yuying Foreign Language School Cyber Physical System R&D Center The Third Research Institute of Ministry of Public Security School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University School of Computer Science and Engineering Beihang University
Combined PBL with some advanced foreign reading teaching strategies,we choose the most suitable way to give lessons and bring up students ability to think of *** on teaching experience for several years,we propose som... 详细信息
来源: 评论
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance
S2Logger: End-to-End Data Tracking Mechanism for Cloud Data ...
收藏 引用
12th IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Suen, Chun Hui Ko, Ryan K. L. Tan, Yu Shyang Jagadpramana, Peter Lee, Bu Sung Cyber Security Lab Department of Computer Science University of Waikato Hamilton New Zealand School of Computer Engineering Nanyang Technological University Singapore
The inability to effectively track data in cloud computing environments is becoming one of the top concerns for cloud stakeholders. This inability is due to two main reasons. Firstly, the lack of data tracking tools b... 详细信息
来源: 评论
Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing
Compact and unified hardware architecture for SHA-1 and SHA-...
收藏 引用
作者: Kim, Mooseop Lee, Deok Gyu Ryou, Jaecheol Cyber Security-Convergence Research Department ETRI Daejeon Korea Republic of Division of Computer Science and Engineering Chungnam National University Daejeon Korea Republic of
This paper presents a compact and unified hardware architecture implementing SHA-1 and SHA-256 algorithms that is suitable for the mobile trusted module (MTM), which should satisfy small area and low-power condition. ... 详细信息
来源: 评论
Attack on recent homomorphic encryption scheme over integers
Attack on recent homomorphic encryption scheme over integers
收藏 引用
FTRA 7th International Conference on Multimedia and Ubiquitous engineering, MUE 2013
作者: Yang, Haomiao Kim, Hyunsung Tang, Dianhua College of Computer Science and Engineering UEST of China Chengdu 610054 China Department of Cyber Security Kyungil University Kyungpook Kyungsansi 712-701 Korea Republic of Science and Technology on Communication Security Laboratory Chengdu 610041 China
At CDCIEM 2012, Yang et al. proposed a new construction of somewhat homomorphic encryption scheme over integers, which is quite efficient in the perspective of the key size. In this paper, we present an effective latt... 详细信息
来源: 评论
A framework for risk-aware role based access control
A framework for risk-aware role based access control
收藏 引用
IEEE Conference on Communications and Network security (CNS)
作者: Khalid Zaman Bijon Ram Krishnan Ravi Sandhu Department of Computer Science Institute for Cyber Security Department of Electrical and Computer Engineering University of Texas at San Antonio
Over the years, role based access control (RBAC) has remained a dominant form of access control both in the industry and academia. More recently, the need for risk awareness in access control has received considerable... 详细信息
来源: 评论
Towards an Attribute Based Constraints Specification Language
Towards an Attribute Based Constraints Specification Languag...
收藏 引用
IEEE International Conference on Social Computing (SocialCom)
作者: Khalid Zaman Bijon Ram Krishnan Ravi Sandhu Department of Computer Science Institute for Cyber Security Department of Electrical and Computer Engineering University of Texas at San Antonio
Recently, attribute based access control (ABAC) has received considerable attention from the security community for its policy flexibility and dynamic decision making capabilities. In ABAC, authorization decisions are... 详细信息
来源: 评论
Identity-based privacy preservation framework over u-healthcare system
Identity-based privacy preservation framework over u-healthc...
收藏 引用
FTRA 7th International Conference on Multimedia and Ubiquitous engineering, MUE 2013
作者: Mtonga, Kambombo Yang, Haomiao Yoon, Eun-Jun Kim, Hyunsung Department of IT Convergence Kyungil University 712-701 Kyungsansi Kyungpook Province Korea Republic of College of Computer Science and Engineering UEST of China Chengdu 610054 China Department of Cyber Security Kyungil University 712-701 Kyungsansi Kyungpook Province Korea Republic of
The digitization of patient health information has brought many benefits and challenges for both the patient and doctor. But security and privacy preservation have remained important challenges for wireless health mon... 详细信息
来源: 评论
On security with the new Gen2 RFID security framework
On security with the new Gen2 RFID security framework
收藏 引用
IEEE International Conference on RFID
作者: Daniel W. Engels You Sung Kang Junyu Wang Computer Science and Engineering Department Southern Methodist University Dallas Texas USA Cyber Convergence Security Research Division ETRL Daejeon Korea Department of Electrical Engineering KAIST Daejeon Korea Auto-ID Lab Fudan University Shanghai China
Radio frequency identification (RFID) systems compliant to the EPCglobal Generation 2 (Gen2) passive UHF RFID protocol are being deployed in a broad range of applications including access control, automated tolling, p... 详细信息
来源: 评论
A group-centric model for collaboration with expedient insiders in multilevel systems
A group-centric model for collaboration with expedient insid...
收藏 引用
2012 13th International Conference on Collaboration Technologies and Systems, CTS 2012
作者: Bijon, Khalid Zaman Sandhu, Ravi Krishnan, Ram Institute for Cyber Security Department of Computer Science United States Institute for Cyber Security Department of Electrical and Computer Engineering University of Texas at San Antonio United States
An authorization model for group-centric organizational collaboration has been recently proposed wherein multiple organizations may collaborate via groups [3]. Each group is independent of all others and adheres to th... 详细信息
来源: 评论