咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,465 篇 工学
    • 1,205 篇 计算机科学与技术...
    • 1,018 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 592 篇 理学
    • 286 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,077 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2538 条 记 录,以下是31-40 订阅
排序:
Electromagnetic Radiation Effects in Human and Animal Health  14
Electromagnetic Radiation Effects in Human and Animal Health
收藏 引用
14th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2023
作者: Singh, Jagjot Kumar, Sanu Johnson, Derick Mathew Savita Department of Computer Science Engineering Spl. Digital Forensics and Cyber Security India
Electromagnetic (EM) radiations are the waves of electromagnetic and magnetic field which are generated from electromagnetic devices. These radiations are dangerous to humans as well as animal health. Talking medicall... 详细信息
来源: 评论
Exploring the landscape of network security: a comparative analysis of attack detection strategies
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第8期15卷 3211-3228页
作者: Rajesh Kanna, P. Santhi, P. Department of Computer Science and Engineering Bannari Amman Institute of Technology Tamil Nadu Erode India TIFAC-CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham Tamil Nadu Coimbatore India
The field of computer networking is experiencing rapid growth, accompanied by the swift advancement of internet tools. As a result, people are becoming more aware of the importance of network security. One of the prim... 详细信息
来源: 评论
Ensemble of deep learning models with Walrus Optimization Algorithm for accurate botnet recognition and classification
收藏 引用
Iran Journal of computer science 2025年 1-18页
作者: Chacko, Ashwathy Anda Edwin, E. Bijolin Thanka, M. Roshni Ebenezer, V. Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India
The rapid growth of Internet of Things (IoT) networks has introduced significant security challenges, with botnet attacks being one of the most prevalent threats. These attacks exploit vulnerabilities in IoT devices, ... 详细信息
来源: 评论
Unleashing the power of pseudo-code for binary code similarity analysis
收藏 引用
cybersecurity 2023年 第2期6卷 44-61页
作者: Weiwei Zhang Zhengzi Xu Yang Xiao Yinxing Xue School of Computer Science and Engineering University of Science and Technology of ChinaHefeiChina School of Computer Science and Engineering Nanyang Technological UniversitySingaporeSingapore Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina
Code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most... 详细信息
来源: 评论
An Imperceptible Adversarial Attack Against 3D Object Detectors in Autonomous Driving
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21404-21414页
作者: Wang, Yizhou Wu, Libing Jin, Jiong Wang, Enshu Zhang, Zhuangzhuang Zhao, Yu Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Swinburne University of Technology School of Engineering MelbourneVIC3122 Australia Wuhan University School of Cyber Science and Engineering Wuhan430072 China City University of Hong Kong Department of Computer Science Hong Kong Hong Kong
As LiDAR-based 3D object detection gains attention, existing research on point cloud adversarial attacks has exposed vulnerabilities in 3D neural network models, which can further impact the reliability of perception ... 详细信息
来源: 评论
Advancing Android Malware Detection with BioSentinel Neural Network using Hybrid Deep Learning Techniques  18
Advancing Android Malware Detection with BioSentinel Neural ...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Rani, D. Sandhya Gnaneshwar, K. Sampurnima Pattem, K. Sekhar, Soma Krishna, G. Bala Kakarla, Shirisha Cvr College of Engineering Department of Computer Science Engineering Rangareddy Ibrahimpatnam India Sreenidhi Institute of Science and Technology Department of Computer Science Engineering-Cyber Security Hyderabad India Vardhaman College of Engineering Department of Computer Science Engineering Hyderabad India
The paper introduces the BioSentinel Neural Network (BSNN), a novel hybrid deep learning model designed to enhance malware detection, particularly focusing on zero-day threats. The BSNN model integrates diverse neural... 详细信息
来源: 评论
Leveraging OpenStack-based Private Cloud for Intrusion Detection Using Deep Learning Techniques  1
Leveraging OpenStack-based Private Cloud for Intrusion Detec...
收藏 引用
1st International Conference for Women in Computing, InCoWoCo 2024
作者: Roshan, Rahul G. Salanke, Vishal S Nagasundari, S. Research Center for Information Security Forensics and Cyber Resilience PES University Department of Computer Science and Engineering Bangalore India
OpenStack is a cloud platform that offers infrastructure services, providing access to computing, storage, and network resources. However, due to its open-source nature, the cloud environment can be vulnerable to secu... 详细信息
来源: 评论
EEG-VARNet: An Advanced Deep Learning Model for AccuratePrediction and Classification of Major Depressive Disorder Using EEG Data  6
EEG-VARNet: An Advanced Deep Learning Model for AccuratePred...
收藏 引用
6th International Conference on cybernetics, Cognition and Machine Learning Applications, ICCCMLA 2024
作者: Mahender, Udutala Sathiyasuntharam, V. Annamalai University Department of Computer Science and Engineering Tamilnadu Chidambaram India CMR Engineering College Department of Cyber Security Hyderabad India
The correct and early identification of Major Depressive Disorder (MDD) is challenging because of its complicated causes and symptoms that are similar to those of other mental diseases. This study introduces a new met... 详细信息
来源: 评论
Malicious PE File Detection Using Machine Learning: An Analysis of Header Features
Malicious PE File Detection Using Machine Learning: An Analy...
收藏 引用
2024 IEEE International Conference on Computing, Semiconductor, Mechatronics, Intelligent Systems and Communications, COSMIC 2024
作者: Shyam Kumar, S. Shetty, Jyothi Department of Cyber Security Nitte574 110 India Department of Computer Science and Engineering Nitte574 110 India
Portable Executable (PE) files serve as the foundation of the Windows operating system, containing executable code, object code, and Dynamic Link Libraries (DLLs). Their importance lies in their capacity to execute ta... 详细信息
来源: 评论
Real-Time Detection of AI-Generated Deepfake Audio: A Novel Approach
Real-Time Detection of AI-Generated Deepfake Audio: A Novel ...
收藏 引用
International Conference on ICT in Business Industry & Government (ICTBIG)
作者: Prathamesh Chiddarwar Computer Science Engineering (Specialization in Cyber Security and Forensics) MIT World Peace University Pune India
The rise of AI-generated deepfake audio presents a significant challenge in audio forensics, as traditional detection methods are inadequate against sophisticated manipulations. This study proposes a novel approach co... 详细信息
来源: 评论