咨询与建议

限定检索结果

文献类型

  • 1,305 篇 会议
  • 629 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,109 篇 工学
    • 913 篇 计算机科学与技术...
    • 768 篇 软件工程
    • 303 篇 信息与通信工程
    • 198 篇 控制科学与工程
    • 158 篇 电气工程
    • 111 篇 网络空间安全
    • 110 篇 生物工程
    • 106 篇 电子科学与技术(可...
    • 79 篇 安全科学与工程
    • 71 篇 机械工程
    • 68 篇 交通运输工程
    • 59 篇 化学工程与技术
    • 50 篇 生物医学工程(可授...
    • 48 篇 仪器科学与技术
    • 45 篇 光学工程
    • 39 篇 动力工程及工程热...
    • 39 篇 建筑学
  • 456 篇 理学
    • 226 篇 数学
    • 117 篇 生物学
    • 99 篇 物理学
    • 89 篇 统计学(可授理学、...
    • 64 篇 化学
    • 50 篇 系统科学
  • 309 篇 管理学
    • 190 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 95 篇 法学
    • 66 篇 社会学
  • 63 篇 医学
    • 45 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 34 篇 经济学
  • 18 篇 农学
  • 17 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 122 篇 accuracy
  • 99 篇 feature extracti...
  • 97 篇 deep learning
  • 84 篇 security
  • 82 篇 real-time system...
  • 71 篇 training
  • 70 篇 machine learning
  • 68 篇 computational mo...
  • 62 篇 internet of thin...
  • 53 篇 predictive model...
  • 50 篇 semantics
  • 50 篇 privacy
  • 50 篇 convolutional ne...
  • 42 篇 support vector m...
  • 38 篇 data models
  • 37 篇 protocols
  • 34 篇 neural networks
  • 34 篇 optimization
  • 31 篇 authentication
  • 31 篇 blockchain

机构

  • 523 篇 school of cyber ...
  • 397 篇 institute of inf...
  • 67 篇 state key labora...
  • 53 篇 chinese academy ...
  • 38 篇 school of cyber ...
  • 38 篇 department of co...
  • 36 篇 university of bu...
  • 33 篇 department of me...
  • 31 篇 school of comput...
  • 31 篇 cyberspace insti...
  • 29 篇 university of ch...
  • 28 篇 institute of inf...
  • 26 篇 institute of com...
  • 25 篇 beijing electron...
  • 23 篇 department of cy...
  • 21 篇 maharishi school...
  • 20 篇 kuaishou technol...
  • 20 篇 yeshwantrao chav...
  • 20 篇 school of cyber ...
  • 19 篇 division of comp...

作者

  • 54 篇 cao xiaochun
  • 30 篇 xu qianqian
  • 28 篇 huang qingming
  • 22 篇 hu songlin
  • 20 篇 yang zhiyong
  • 20 篇 cao yanan
  • 20 篇 wu xing
  • 19 篇 jayant giri
  • 18 篇 jingqiang lin
  • 18 篇 zhou pan
  • 18 篇 hu yue
  • 17 篇 wang wei
  • 17 篇 sun limin
  • 17 篇 lin jingqiang
  • 16 篇 limin sun
  • 16 篇 n. sreevani
  • 14 篇 peng hao
  • 14 篇 xiong gang
  • 14 篇 lin zheng
  • 14 篇 gai keke

语言

  • 1,429 篇 英文
  • 506 篇 其他
  • 12 篇 中文
检索条件"机构=Cyber Security and Cyber Forensics in the Institute of Engineering and Technology"
1939 条 记 录,以下是141-150 订阅
排序:
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
Unleashing the power of pseudo-code for binary code similarity analysis
收藏 引用
cybersecurity 2023年 第2期6卷 44-61页
作者: Weiwei Zhang Zhengzi Xu Yang Xiao Yinxing Xue School of Computer Science and Engineering University of Science and Technology of ChinaHefeiChina School of Computer Science and Engineering Nanyang Technological UniversitySingaporeSingapore Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina
Code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most... 详细信息
来源: 评论
MAD-LLM: A Novel Approach for Alert-Based Multi-stage Attack Detection via LLM  22
MAD-LLM: A Novel Approach for Alert-Based Multi-stage Attack...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Du, Dan Guan, Xingmao Liu, Yuling Jiang, Bo Liu, Song Feng, Huamin Liu, Junrong Chinese Academy of Sciences Institute of Information Engineering Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China Beijing Electronic Science and Technology Institute Beijing China
In the realm of cybersecurity, detecting multi-stage attacks is vital for uncovering the actual intentions and strategies of attackers. However, the detection of multi-stage attacks is fraught with challenges due to t... 详细信息
来源: 评论
Relation Also Knows: Rethinking the Recall and Editing of Factual Associations in Auto-Regressive Transformer Language Models  39
Relation Also Knows: Rethinking the Recall and Editing of Fa...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Liu, Xiyu Liu, Zhengxiao Gu, Naibin Lin, Zheng Ma, Wanli Xiang, Ji Wang, Weiping Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China University of Electronic Science and Technology of China Chengdu China
The storage and recall of factual associations in auto-regressive transformer language models (LMs) have drawn a great deal of attention, inspiring knowledge editing by directly modifying the located model weights. Mo...
来源: 评论
Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs  24
Save the Bruised Striver: A Reliable Live Patching Framework...
收藏 引用
19th European Conference on Computer Systems, EuroSys 2024
作者: Zhou, Ming Wang, Haining Li, Ke Zhu, Hongsong Sun, Limin School of Cyber Science and Engineering Nanjing University of Science and Technology China Department of Electrical and Computer Engineering Virginia Tech China Nari Group Corporation State Grid Electric Power Research Institute School of Cyber Security University of Chinese Academy of Sciences China Institute of Information Engineering Cas China Virginia Tech. United States
Industrial Control Systems (ICS), particularly programmable logic controllers (PLCs) responsible for managing underlying physical infrastructures, often operate for extended periods without interruption. Thus, it is c... 详细信息
来源: 评论
Conformal Graph-level Out-of-distribution Detection with Adaptive Data Augmentation  25
Conformal Graph-level Out-of-distribution Detection with Ada...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Lin, Xixun Cao, Yanan Sun, Nan Zou, Lixin Zhou, Chuan Zhang, Peng Zhang, Shuai Zhang, Ge Wu, Jia Institute of Information Engineering Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Cyber Science and Engineering Wuhan University Wuhan China Academy of Mathematics and Systems Science CAS School of Cyber Security University of Chinese Academy of Sciences Beijing China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China Academy of Mathematics and Systems Science CAS Beijing China School of Computer Science and Technology Donghua University Shanghai China Department of Computing Macquarie University Sydney Australia
Graph-level out-of-distribution (OOD) detection, which attempts to identify OOD graphs originated from an unknown distribution, is a vital building block for safety-critical applications in Web and society. Current ap... 详细信息
来源: 评论
DBSFT: A High-Precision Database Anomaly Detection and Analysis via Task-Tune Based LLM  3rd
DBSFT: A High-Precision Database Anomaly Detection and Analy...
收藏 引用
3rd International Conference on Machine Learning, Cloud Computing and Intelligent Mining, MLCCIM 2024
作者: Zhong, Huazhen Wang, Jibin Wang, Xuejian Wang, Xin Xiao, Wenjie Tang, Xuehai Zang, Liangjun Institute of Information Engineering Chinese Academy of Sciences Beijing China China Mobile Information Technology Center Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Databases, serving as crucial tools for storing and managing critical information, play pivotal roles in today's information technology landscape and are simultaneously focal points for cybersecurity. However, an ... 详细信息
来源: 评论
PowerDP: De-Obfuscating and Profiling Malicious PowerShell Commands With Multi-Label Classifiers
收藏 引用
IEEE Access 2023年 11卷 256-270页
作者: Tsai, Meng-Han Lin, Chia-Ching He, Zheng-Gang Yang, Wei-Chieh Lei, Chin-Laung Graduate Institute of Electrical Engineering National Taiwan University Taipei106319 Taiwan Institute for Information Industry Center for Cybersecurity Service Taipei106214 Taiwan National Center for Cyber Security Technology Taipei106043 Taiwan
In recent years, PowerShell has become the common tool that helps attackers launch targeted attacks using living-off-the-land tactics and fileless attack techniques. Unfortunately, malware-derived PowerShell Commands ... 详细信息
来源: 评论
Machine Learning-Based Crop Recommendation System  4
Machine Learning-Based Crop Recommendation System
收藏 引用
4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024
作者: Ebenezer, V. Nair, Akash Stewart Kirubakaran, S. Praising Linijah, N.L. Rajan, Jerlin Santhiya, P. Karunya Institute of Technology and Sciences Division of Data Sciences and Cyber Security Coimbatore India Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Karunya School of Management Karunya Institute of Technology and Sciences Coimbatore India
The time-honored way that farmers have been used to apply to the identification of the best crops for better yield is not exhaustive. Under this technique, the management process of powerful and productive resources, ... 详细信息
来源: 评论
Strategies for Building and Maintaining Secure Web Applications  5
Strategies for Building and Maintaining Secure Web Applicati...
收藏 引用
5th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2024
作者: Sathiyapriyan, C. Manikandan, B. Gokul, S. Satheesh, Rewin Nivetha, S. Leelavathy, S. Aarupadai Veedu Institute of Technology Cyber Security Department of Computer Science and Engineering Chennai603104 India Aarupadai Veedu Institute of Technology Department of Computer Science and Engineering Chennai603104 India Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai600119 India
Ensuring the security of web applications is paramount in safeguarding sensitive data and maintaining user trust. This study presents a comprehensive overview of strategies for building and maintaining secure web appl... 详细信息
来源: 评论