咨询与建议

限定检索结果

文献类型

  • 1,437 篇 会议
  • 748 篇 期刊文献
  • 24 册 图书

馆藏范围

  • 2,209 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,299 篇 工学
    • 1,093 篇 计算机科学与技术...
    • 904 篇 软件工程
    • 350 篇 信息与通信工程
    • 231 篇 控制科学与工程
    • 177 篇 电气工程
    • 148 篇 生物工程
    • 123 篇 网络空间安全
    • 88 篇 安全科学与工程
    • 86 篇 生物医学工程(可授...
    • 77 篇 电子科学与技术(可...
    • 62 篇 机械工程
    • 61 篇 交通运输工程
    • 54 篇 动力工程及工程热...
    • 48 篇 仪器科学与技术
  • 532 篇 理学
    • 258 篇 数学
    • 167 篇 生物学
    • 101 篇 物理学
    • 80 篇 统计学(可授理学、...
    • 74 篇 系统科学
    • 41 篇 化学
  • 384 篇 管理学
    • 251 篇 管理科学与工程(可...
    • 162 篇 图书情报与档案管...
    • 123 篇 工商管理
  • 162 篇 法学
    • 107 篇 社会学
    • 59 篇 法学
  • 117 篇 医学
    • 91 篇 临床医学
    • 84 篇 基础医学(可授医学...
    • 63 篇 公共卫生与预防医...
    • 41 篇 药学(可授医学、理...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 22 篇 农学
  • 20 篇 教育学
  • 11 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 128 篇 accuracy
  • 101 篇 deep learning
  • 90 篇 internet of thin...
  • 87 篇 security
  • 80 篇 machine learning
  • 79 篇 feature extracti...
  • 72 篇 training
  • 68 篇 real-time system...
  • 56 篇 computational mo...
  • 54 篇 artificial intel...
  • 53 篇 predictive model...
  • 49 篇 support vector m...
  • 48 篇 cloud computing
  • 46 篇 blockchain
  • 45 篇 privacy
  • 44 篇 data models
  • 43 篇 convolutional ne...
  • 41 篇 reliability
  • 41 篇 authentication
  • 40 篇 data privacy

机构

  • 69 篇 school of cyber ...
  • 57 篇 college of cyber...
  • 48 篇 institute of inf...
  • 25 篇 college of compu...
  • 22 篇 cyber security d...
  • 18 篇 center for cyber...
  • 18 篇 department of cy...
  • 16 篇 key laboratory o...
  • 16 篇 state key labora...
  • 14 篇 computer science...
  • 14 篇 department of cy...
  • 14 篇 center for cyber...
  • 13 篇 school of cyber ...
  • 12 篇 school of comput...
  • 12 篇 department of co...
  • 12 篇 school of comput...
  • 12 篇 school of comput...
  • 12 篇 department of co...
  • 11 篇 jinan university...
  • 11 篇 school of cyber ...

作者

  • 53 篇 choo kim-kwang r...
  • 34 篇 kim-kwang raymon...
  • 29 篇 yu philip s.
  • 24 篇 gan wensheng
  • 23 篇 taher m. ghazal
  • 22 篇 ghazal taher m.
  • 19 篇 mohammad kamrul ...
  • 18 篇 hasan mohammad k...
  • 18 篇 sandhu ravi
  • 16 篇 zhou pan
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 munir ahmad
  • 15 篇 nwankwo wilson
  • 15 篇 ravi sandhu
  • 13 篇 mohammad aljaidi
  • 13 篇 taher m.ghazal
  • 12 篇 peng hao
  • 12 篇 dehghantanha ali
  • 12 篇 quist-aphetsi ke...

语言

  • 1,637 篇 英文
  • 566 篇 其他
  • 9 篇 中文
检索条件"机构=Cyber Security Program Computer Science Department"
2209 条 记 录,以下是1-10 订阅
排序:
Feature-Based Augmentation in Sarcasm Detection Using Reverse Generative Adversarial Network
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3637-3657页
作者: Derwin Suhartono Alif Tri Handoyo Franz Adeta Junior Computer Science Department School of Computer ScienceBina Nusantara UniversityJakarta11480Indonesia Cyber Security Program Computer Science DepartmentSchool of Computer ScienceBina Nusantara UniversityJakarta11480Indonesia
Sarcasm detection in text data is an increasingly vital area of research due to the prevalence of sarcastic content in online *** study addresses challenges associated with small datasets and class imbalances in sarca... 详细信息
来源: 评论
Machine Learning for Threat Detection
Machine Learning for Threat Detection
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Sutanto, Dustin Fransisca, Febri Liem, Steven Chowanda, Andry Muliono, Yohan Izdihar, Zahra Nabila School of Computer Science Cyber Security Program Computer Science Department Bina Nusantara Jakarta Indonesia School of Computer Science Computer Science Program Computer Science Department Bina Nusantara Jakarta Indonesia
These days almost all people in the world use the Internet as the internet is constantly evolving. cyber attack scale are increased thanks to cybercriminals that have become sophisticated in employing threats. Since t... 详细信息
来源: 评论
security Challenges and Issues in Cloud Computing
Security Challenges and Issues in Cloud Computing
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Zakiyyah, Rika Permana, Daniel Valenecio, Devan Chowanda, Andry Muliono, Yohan Izdihar, Zahra Nabila Cyber Security Program Computer Science Department School of Computer Science Bina Nusantara Jakarta Indonesia Computer Science Program Computer Science Department School of Computer Science Bina Nusantara Jakarta Indonesia
Managing data has changed significantly because of cloud computing, which offers scalabe, flexible and reasonably priced solutions to enterprises and to people as well such as Amazon, Google, and Microsoft expanding t... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
An Efficient Privacy-Enhanced Federated Learning with Single-Key Homomorphic Encryption
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23598-23613页
作者: Liu, Yilong Zhang, Hong Wang, Miao Xie, Qiqi Wang, Liqiang Hebei University School of Cyber Security and Computer Baoding071032 China University of Central Florida Department of Computer Science OrlandoFL32816 United States
As the proliferation of Internet of Things (IoT) devices continues, vast amounts of data are being collected on various end devices. However, uploading these data to the cloud for centralized processing poses signific... 详细信息
来源: 评论
security Flaw in TCP/IP and Proposed Measures  1
收藏 引用
International Conference on Recent Developments in cyber security, ReDCySec 2023
作者: Upadhyay, Sourav Kumar Kumar, Prakash Department of Computer Science and Engineering BIT Sindri Dhanbad India Department of Computer Science and Cyber Security JRSU Ranchi India
The whole Internet is based on TCP/IP protocol suite. The inherent flaw in the TCP/IP makes a cascading effect for other attacks like flooding, fingerprinting, and many more. All the switching and routing mechanisms a... 详细信息
来源: 评论
Electronic Medical Records Management and Administration: Current Trends, Issues, Solutions, and Future Directions
收藏 引用
SN computer science 2024年 第5期5卷 460页
作者: Abdulkadir, Umar Waziri, Victor Onomza Alhassan, John Kolo Ismaila, Idris Department of Cyber Security Science Federal University of Technology Minna Nigeria Department of Computer Science Federal University of Technology Minna Nigeria
Electronic Medical Records (EMR) is often used to refer to as electronic personal health (EPH) records or electronic healthcare records (EHR). These are considered vivacious assets of health facilities and patients. T... 详细信息
来源: 评论
Genetic Algorithm-optimized k-nearest Neighbors and Support Vector Machines for Breast Cancer Detection in Resource-constrained Environments
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第3期52卷 848-861页
作者: Alemu, Abebe Girma, Anteneh Abebe, Mesfin Srinivasagan, Ramasamy Adama Science and Technology University Adama Ethiopia Computer Science/Cyber-Security department University of the District of Columbia WashingtonDC United States Computer Science and Engineering department Adama Science and Technology University Adama Ethiopia Computer Engineering department CCSIT King Faisal University Al Hufuf Saudi Arabia
Breast cancer poses a significant global threat, highlighting the urgent need for early detection to reduce mortality rates. Researchers are working to minimize the occurrence of false positives and false negatives, t... 详细信息
来源: 评论
3GPP Edge–Fog federation: Transparent 3rd-party authentication and application mobility
收藏 引用
computer Communications 2024年 222卷 220-229页
作者: Ali, Asad Islam, Minhajul Mallick, Tushin Islam, Mohammad Sakibul Sakib, Sadman Shohrab Hossain, Md. Lin, Ying-Dar National Institute of Cyber Security Ministry of Digital Affairs Taiwan Department of Computer Science National Yang Ming Chiao Tung University Hsinchu Taiwan Department of Computer Science and Engineering Bangladesh University of Engineering and Technology Bangladesh
3GPP edge and fog computing paradigms provide computational services to users at low latency. These paradigms alone are not enough to fulfill the users’ requirements completely. Therefore, a federation among these co... 详细信息
来源: 评论
A hybrid encryption for secure data deduplication the cloud
收藏 引用
International Journal of Cloud Computing 2023年 第2-4期12卷 295-307页
作者: Ebinazer, Silambarasan Elkana Savarimuthu, Nickolas Bhanu, S. Mary Saira Department of Computer Science and Engineering Cyber Security IIIT Kottayam India Department of Computer Applications National Institute of Technology Tiruchirappalli India Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli India
Cloud computing (CC) is a cost-effective platform for users to store their data on the internet rather than investing in additional devices for storage. Data deduplication (DD) defines a process of eliminating redunda... 详细信息
来源: 评论