咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,465 篇 工学
    • 1,205 篇 计算机科学与技术...
    • 1,018 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 592 篇 理学
    • 286 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,077 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2538 条 记 录,以下是2501-2510 订阅
排序:
RT-based administrative models for community cyber security information sharing
RT-based administrative models for community cyber security ...
收藏 引用
International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
作者: Ravi Sandhu Khalid Zaman Bijon Xin Jin Ram Krishnan Institute for Cyber Security & Department of Computer Science University of Texas San Antonio USA Institute for Cyber Security & Department of Electrical and Computer Engineering University of Texas San Antonio USA
We develop a series of formal administrative models for recently proposed informal requirements for community cyber security information sharing [9]. Traditional enterprise-oriented administrative models are not suita... 详细信息
来源: 评论
Building malware infection trees
Building malware infection trees
收藏 引用
6th International Conference on Malicious and Unwanted Software, Malware 2011
作者: Morales, Jose Andre Main, Michael Luo, Weiliang Xu, Shouhuai Sandhu, Ravi Software Engineering Institute Carnegie Mellon University United States Institute for Cyber Security University of Texas San Antonio TX United States Department of Computer Science University of Texas San Antonio TX United States
Dynamic analysis of malware is an ever evolving and challenging task. A malware infection tree (MiT) can assist in analysis by identifying processes and files related to a specific malware sample. In this paper we pro... 详细信息
来源: 评论
Towards secure information sharing models for community cyber security
Towards secure information sharing models for community cybe...
收藏 引用
作者: Sandhu, Ravi Krishnan, Ram White, Gregory B. Dept. of Computer Science Institute for Cyber Security University of Texas San Antonio TX United States Dept. of Electrical and Computer Engineering Institute for Cyber Security University of Texas San Antonio TX United States
In this paper, we motivate the need for new models for Secure Information Sharing (SIS) in the specific domain of community cyber security. We believe that similar models will be applicable in numerous other domains. ... 详细信息
来源: 评论
Towards safe and productive development of secure software: FADES and model-based software engineering  10
Towards safe and productive development of secure software: ...
收藏 引用
Proceedings of the Sixth Annual Workshop on cyber security and Information Intelligence Research
作者: Hassan, Riham Bohner, Shawn Eltoweissy, Mohamed Computer Science Arab Academy for Science and Technology Egypt Computer Science and Software Engineering Rose Hulman Institute of Technology Egypt Cyber Systems Security Pacific Northwest National Laboratory United States
Cost effective development of secure software is a key goal for many software organizations as they seek to manage the risks of misbehaving software. Employing Formal Methods (FMs) in the Model-Based Software Engineer... 详细信息
来源: 评论
Towards Secure Information Sharing models for community cyber security
Towards Secure Information Sharing models for community Cybe...
收藏 引用
International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
作者: Ravi Sandhu Ram Krishnan Gregory B. White Department of Computer Science Institute for Cyber Security University of Texas San Antonio USA Department of Electrical and Computer Engineering Institute for Cyber Security University of Texas San Antonio USA
In this paper, we motivate the need for new models for Secure Information Sharing (SIS) in the specific domain of community cyber security. We believe that similar models will be applicable in numerous other domains. ... 详细信息
来源: 评论
The theft of business innovation: An ACM-BCS roundtable on threats to global competitiveness
收藏 引用
Queue 2010年 第11期8卷 1-10页
作者: Creeger, Mache Bennett, Louise Bianco, David J. Borg, Scott Clark, Andy Epstein, Jeremy Norton, Jim Bourne, Steve Emergent Technology Associates United States BCS Security Strategic Panel United States United States U.S. Cyber Consequences Unit United States Fellow of the Institution of Engineering and Technology United Kingdom Computer Science Laboratory SRI International United States Department of Electronic Engineering Sheffield University United Kingdom El Dorado Ventures United States
These days, cybercriminals are looking to steal more than just banking information. © 2010 ACM.
来源: 评论
Can people collaborate to improve the relevance of search results?
Can people collaborate to improve the relevance of search re...
收藏 引用
2008 2nd ACM International Conference on Recommender Systems, RecSys'08
作者: Agrahri, Arun Kumar Divya Anand, T.M. Riedl, John Institute of Technology University of Minnesota Twin Cities Computer Science United States Amrita School of Engineering Amrita Vishwa Vidyapeetham Cyber Security India
Search engines are among the most-used resources on the internet. However, even today's most successful search engines struggle to provide high quality search results. According to recent studies as many as 50 per... 详细信息
来源: 评论
QoS Aware Dependable Distributed Stream Processing
QoS Aware Dependable Distributed Stream Processing
收藏 引用
International Symposium on Object-Oriented Real-Time Distributed Computing
作者: Vana Kalogeraki Dimitrios Gunopulos Ravi Sandhu Bhavani Thuraisingham Department of Computer Science & Engineering University of California Riverside USA Institute for Cyber Security University of Technology San Antonio USA Department of Computer Science University of Technology Dallas USA
In this paper we describe our approach for developing a QoS-aware, dependable execution environment for large-scale distributed stream processing applications. Distributed stream processing applications have strong ti... 详细信息
来源: 评论
Efficient linear array for multiplication over NIST recommended binary fields
Efficient linear array for multiplication over NIST recommen...
收藏 引用
6th International Workshop - Fuzzy Logic and Applications
作者: Kwon, Soonhak Kwon, Taekyoung Park, Young-Ho Inst. of Basic Science Dept. of Mathematics Sungkyunkwan University Suwon 440-746 Korea Republic of School of Computer Engineering Sejong University Seoul 143-747 Korea Republic of Dept. of Information Security Sejong Cyber University Seoul 143-747 Korea Republic of
We propose a new linear array for multiplication in GF(2m) which outperforms most of the existing linear multipliers in terms of the area and time complexity. Moreover we will give a very detailed comparison of our ar... 详细信息
来源: 评论
Localized public-key management for mobile ad hoc networks
Localized public-key management for mobile ad hoc networks
收藏 引用
IEEE Conference and Exhibition on Global Telecommunications (GLOBECOM)
作者: Ruidong Li Jie Li H. Kameda Peng Liu University of Tsukuba Tsukuba Japan Department of Computer Science Graduate School of Systems and Information Engineering University of Tsukuba Tsukuba Japan Cyber Security Lab School of Information Sciences and Technology Pennsylvania State University University Park USA
A mobile ad hoc network (MANET) is the cooperative engagement of a collection of wireless mobile nodes without aid of any established infrastructure or centralized administration. The conventional security solutions t... 详细信息
来源: 评论