咨询与建议

限定检索结果

文献类型

  • 1,305 篇 会议
  • 629 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,109 篇 工学
    • 913 篇 计算机科学与技术...
    • 768 篇 软件工程
    • 303 篇 信息与通信工程
    • 198 篇 控制科学与工程
    • 158 篇 电气工程
    • 111 篇 网络空间安全
    • 110 篇 生物工程
    • 106 篇 电子科学与技术(可...
    • 79 篇 安全科学与工程
    • 71 篇 机械工程
    • 68 篇 交通运输工程
    • 59 篇 化学工程与技术
    • 50 篇 生物医学工程(可授...
    • 48 篇 仪器科学与技术
    • 45 篇 光学工程
    • 39 篇 动力工程及工程热...
    • 39 篇 建筑学
  • 456 篇 理学
    • 226 篇 数学
    • 117 篇 生物学
    • 99 篇 物理学
    • 89 篇 统计学(可授理学、...
    • 64 篇 化学
    • 50 篇 系统科学
  • 309 篇 管理学
    • 190 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 95 篇 法学
    • 66 篇 社会学
  • 63 篇 医学
    • 45 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 34 篇 经济学
  • 18 篇 农学
  • 17 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 122 篇 accuracy
  • 99 篇 feature extracti...
  • 97 篇 deep learning
  • 84 篇 security
  • 82 篇 real-time system...
  • 71 篇 training
  • 70 篇 machine learning
  • 68 篇 computational mo...
  • 62 篇 internet of thin...
  • 53 篇 predictive model...
  • 50 篇 semantics
  • 50 篇 privacy
  • 50 篇 convolutional ne...
  • 42 篇 support vector m...
  • 38 篇 data models
  • 37 篇 protocols
  • 34 篇 neural networks
  • 34 篇 optimization
  • 31 篇 authentication
  • 31 篇 blockchain

机构

  • 523 篇 school of cyber ...
  • 397 篇 institute of inf...
  • 67 篇 state key labora...
  • 53 篇 chinese academy ...
  • 38 篇 school of cyber ...
  • 38 篇 department of co...
  • 36 篇 university of bu...
  • 33 篇 department of me...
  • 31 篇 school of comput...
  • 31 篇 cyberspace insti...
  • 29 篇 university of ch...
  • 28 篇 institute of inf...
  • 26 篇 institute of com...
  • 25 篇 beijing electron...
  • 23 篇 department of cy...
  • 21 篇 maharishi school...
  • 20 篇 kuaishou technol...
  • 20 篇 yeshwantrao chav...
  • 20 篇 school of cyber ...
  • 19 篇 division of comp...

作者

  • 54 篇 cao xiaochun
  • 30 篇 xu qianqian
  • 28 篇 huang qingming
  • 22 篇 hu songlin
  • 20 篇 yang zhiyong
  • 20 篇 cao yanan
  • 20 篇 wu xing
  • 19 篇 jayant giri
  • 18 篇 jingqiang lin
  • 18 篇 zhou pan
  • 18 篇 hu yue
  • 17 篇 wang wei
  • 17 篇 sun limin
  • 17 篇 lin jingqiang
  • 16 篇 limin sun
  • 16 篇 n. sreevani
  • 14 篇 peng hao
  • 14 篇 xiong gang
  • 14 篇 lin zheng
  • 14 篇 gai keke

语言

  • 1,429 篇 英文
  • 506 篇 其他
  • 12 篇 中文
检索条件"机构=Cyber Security and Cyber Forensics in the Institute of Engineering and Technology"
1939 条 记 录,以下是1811-1820 订阅
排序:
Study on advanced botnet based on publicly available resources  20th
Study on advanced botnet based on publicly available resourc...
收藏 引用
20th International Conference on Information and Communications security, ICICS 2018
作者: Yin, Jie Lv, Heyang Zhang, Fangjiao Tian, Zhihong Cui, Xiang Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Computing Technology Chinese Academy of Sciences Beijing China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China
In recent years, botnets continue to be an ever-increasing threat on the Internet. To be well prepared for future attacks and ensure the cyberspace security, defenders take more attention on advanced botnet designs th... 详细信息
来源: 评论
Structural transition in interdependent networks with regular interconnections
收藏 引用
Physical Review E 2019年 第1期99卷 012311-012311页
作者: Xiangrong Wang Robert E. Kooij Yamir Moreno Piet Van Mieghem Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft The Netherlands iTrust Centre for Research in Cyber Security Singapore University of Technology and Design Singapore Institute for Biocomputation and Physics of Complex Systems (BIFI) University of Zaragoza Zaragoza 50009 Spain Department of Theoretical Physics University of Zaragoza Zaragoza 50009 Spain ISI Foundation Turin Italy
Networks are often made up of several layers that exhibit diverse degrees of interdependencies. An interdependent network consists of a set of graphs G that are interconnected through a weighted interconnection matrix... 详细信息
来源: 评论
Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators
Cooperative Game Model of Delegation Computing: Verifier Sep...
收藏 引用
IEEE Conference on Computer Communications Workshops, INFOCOM Wksps
作者: Duo Zhang Youliang Tian Linjie Wang Sheng Gao Jianfeng Ma State Key Laboratory of Public Big Data College of Computer Science and Technology College of Mathematics and Statistics Guizhou University Guiyang China State Key Laboratory of Public Big Data College of Computer Science and Technology Institute of Cryptography and Date Security Guizhou University Guiyang China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Information Central University of Finance and Economics Beijing China School of Cyber Engineering College of Computer Science and Technology Xi'dian University Xi'an China
In cloud computing, the delegation computation service is required because end users usually are resource-constrained, and at the same time the correctness of computing results needs to be verified. However, all the e... 详细信息
来源: 评论
Detection of malicious domain names based on hidden Markov model  3
Detection of malicious domain names based on hidden Markov m...
收藏 引用
3rd IEEE International Conference on Data Science in cyberspace, DSC 2018
作者: Lv, Pin Bai, Lingling Liu, Tingwen Ning, Zhenhu Shi, Jinqiao Fang, Binxing School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China Faculty of Information Technology Beijing University of Technology Beijing China Guangdong Institute of Electronic Information Engineering University of Electronic Science and Technology Dongguan Guangdong China
The Domain Name System (DNS) is an important core infrastructure of the Internet, domain names and IP addresses is a distributed database that maps to each other, however, due to the defects of its own protocol, there... 详细信息
来源: 评论
NTIRE 2021 challenge on video super-resolution
arXiv
收藏 引用
arXiv 2021年
作者: Son, Sanghyun Lee, Suyoung Nah, Seungjun Timofte, Radu Lee, Kyoung Mu Chan, Kelvin C.K. Zhou, Shangchen Xu, Xiangyu Loy, Chen Change Jiang, Boyuan Lin, Chuming Dong, Yuchun Luo, Donghao Chu, Wenqing Ji, Xiaozhong Yang, Siqian Tai, Ying Wang, Chengjie Li, Jilin Huang, Feiyue Chen, Chengpeng Chu, Xiaojie Zhang, Jie Lu, Xin Chen, Liangyu Lin, Jing Du, Guodong Hao, Jia Zou, Xueyi Zhang, Qi Jiang, Lielin Li, Xin Zheng, He Liu, Fanglong He, Dongliang Li, Fu Dang, Qingqing Yi, Peng Wang, Zhongyuan Jiang, Kui Jiang, Junjun Ma, Jiayi Chen, Yuxiang Wang, Yutong Liu, Ting Sun, Qichao Liang, Huanwei Li, Yiming Li, Zekun Ruan, Zhubo Shang, Fanjie Guo, Chen Li, Haining Luo, Renjun Shen, Longjie Zafirouli, Kassiani Karageorgos, Konstantinos Konstantoudakis, Konstantinos Dimou, Anastasios Daras, Petros Song, Xiaowei Zhuo, Xu Liu, Hanxi Guo, Mengxi Li, Junlin Li, Yu Zhu, Ye Wang, Qing Zhao, Shijie Sun, Xiaopeng Zhan, Gen Xie, Tangxin Jia, Yu Lu, Yunhua Zhang, Wenhao Sun, Mengdi Michelini, Pablo Navarrete Zhang, Xueheng Jiang, Hao Chen, Zhiyu Chen, Li Xiong, Zhiwei Xiao, Zeyu Xu, Ruikang Cheng, Zhen Fu, Xueyang Song, Fenglong Luo, Zhipeng Yao, Yuehan Dutta, Saikat Shah, Nisarg A. Das, Sourya Dipta Zhao, Peng Shi, Yukai Liu, Hongying Shang, Fanhua Liu, Yuanyuan Chen, Fei Yu, Fangxu Gao, Ruisheng Bai, Yixin Heo, Jeonghwan Yue, Shijie Li, Chenghua Li, Jinjing Zheng, Qian Gang, Ruipeng Song, Ruixia Wee, Seungwoo Jeong, Jechang Li, Chen Wen, Geyingjie Chai, Xinning Song, Li Department of ECE ASRI SNU Korea Republic of Computer Vision Lab ETH Zurich Switzerland S-Lab Nanyang Technological University Singapore YouTu Lab Tencent East China Normal University China Megvii Peking University China Fudan University China Noah's Ark Lab Huawei Canada Technologies Co. Ltd Baidu Inc National Engineering Research Center for Multimedia Software Wuhan University China School of Computer Science and Technology Harbin Institute of Technology China Electronic Information School Wuhan University China School of Computer Science and Engineering University of Electronic Science and Technology of China China MTlab Meitu Inc Xidian university China ITI CERTH Greece Southeast University China Tencent PCG South China University of Technology China ByteDance Sun Yat-Sen University China Electronic Technology Cyber Security Co. Ltd. AIoT R&D Centre BOE Technology Group Co. Ltd. Shanghai Jiao Tong University China University of Science and Technology of China China Huawei Noah's Ark Lab DeepBlue Technology Shanghai Co. Ltd Indian Institute of Technology Madras India Indian Institute of Technology Jodhpur India Jadavpur University India Xidian University China Hanyang University Korea Republic of NCUT China CASIA China CUC China NRTA China
Super-Resolution (SR) is a fundamental computer vision task that aims to obtain a high-resolution clean image from the given low-resolution counterpart. This paper reviews the NTIRE 2021 Challenge on Video Super-Resol... 详细信息
来源: 评论
Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices
Towards Fine-grained Fingerprinting of Firmware in Online Em...
收藏 引用
2018 IEEE Conference on Computer Communications, INFOCOM 2018
作者: Li, Qiang Feng, Xuan Wang, Raining Li, Zhi Sun, Limin School of Computer and Information Technology Beijing Jiaotong University China Beijing Key Laboratory of IOT Information Security Technology Institute of Information Enzineering CAS China Department of Electrical and Computer Engineering University of Delaware United States School of Cyber Security University of Chinese Academy of Sciences China
An increasing number of embedded devices are connecting to the Internet at a surprising rate. Those devices usually run firmware and are exposed to the public by device search engines. Firmware in embedded devices com... 详细信息
来源: 评论
Detecting fingerprints of audio steganography software
收藏 引用
Forensic Science International: Reports 2020年 2卷 100075-100075页
作者: Gong, Chen Zhang, Jinghong Yang, Yunzhao Yi, Xiaowei Zhao, Xianfeng Ma, Yi State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China School of Cyber Security University of Chinese Academy of Sciences Beijing 100093 China Beijing Information Technology Institute Beijing 100094 China
AbstractSteganography has experienced rapidly growth with spreading access to the Internet in recent decades. Such low cost, simple process and easy promotion steganographic softwares pose serious and growing threats ... 详细信息
来源: 评论
Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism  24th
Understanding and Constructing AKE via Double-Key Key Encaps...
收藏 引用
24th Annual International Conference on Theory and Application of Cryptology and Information security, ASIACRYPT 2018
作者: Xue, Haiyang Lu, Xianhui Li, Bao Liang, Bei He, Jingnan State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Data Assurance and Communication Security Research Center Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Chalmers University of Technology Gothenburg Sweden
Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special ... 详细信息
来源: 评论
MaliceScript: A novel browser-based intranet threat  3
MaliceScript: A novel browser-based intranet threat
收藏 引用
3rd IEEE International Conference on Data Science in cyberspace, DSC 2018
作者: Liu, Chaoge Cui, Xiang Wang, Zhi Wang, Xiaoxi Feng, Yun Li, Xiaoyun Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China Beijing University of Posts and Telecommunications Beijing China
Recently, we have seen a sharp increase in browser-based threats that are specifically designed to attack intranet, especially in APT. In response to such attacks, it is both important to deal with the existing attack... 详细信息
来源: 评论
Initial ASEAN digital security and interoperability standard proposal
收藏 引用
AIP Conference Proceedings 2023年 第1期2739卷
作者: Sangsuree Vasupongayya Gunawan Hutagalung Obrina Candra Chalee Vorakulpipat Doni Purnomo Parinda Wattanasri Eko Supriyanto Shukor Abd Razak Othman Ibrahim Anazida Zainal Sri Devi Ravana Hiep Cong Pham Tharith Sriv Daw Khin Myo Su Mora Hertanto Agus Winarno Prabaswari Raden Muhammad Taufik Yuniantoro Badrus Zaman Fatmawati Retna Apsari Yutika Amelia Effendi Norjihan Abdul Ghani Zarina Shukur Hamidah Ibrahim Nur Izura Udzir Marnel Peradilla Jude Michael Teves Nestor Michael Tiglao Cenon Alfonso Pg Emeroylariffion Abas Mueen Uddin Agustin Kusumayati Brian Sri Prahastuti Department of Computer Engineering Faculty of Engineering Prince of Songkla University Hatyai Songkhla 90110 THAILAND Directorate General of Post and Information Technology Ministry of Communication and Information Technology Jakarta INDONESIA Politeknik Siber dan Sandi Negara National Cyber & Crypto Agency (BSSN) Depok West Java INDONESIA Information Security Research Team at National Electronics and Computer Technology Center Bangkok THAILAND National Standardization Agency of Indonesia Jakarta INDONESIA Department of Disease Control Ministry of Public Health Mueang Nonthaburi Nonthaburi THAILAND School of Biomedical Engineering and Health Sciences Faculty of Engineering Universiti Teknologi Malaysia Johor Bahru Johor MALAYSIA IJN-UTM Cardiovascular Engineering Center Institute of Human Centered Engineering Universiti Teknologi Malaysia Johor Bahru Johor MALAYSIA School of Computing Faculty of Engineering Universiti Teknologi Malaysia Johor Bahru Johor MALAYSIA Faculty of Computer Science & Information Technology Universiti Malaya Kuala Lumpur MALAYSIA RMIT University Vietnam Ho Chi Minh City VIETNAM Royal University of Phnom Penh Phnom Penh CAMBODIA Yangon University of Economics Yangon MYANMAR Agency for the Assessment and Application of Technology (BPPT) Jakarta INDONESIA Faculty of Science and Technology Universitas Airlangga Surabaya East Java INDONESIA Faculty of Advanced Technology and Multidiscipline Universitas Airlangga Surabaya East Java INDONESIA Centre for Cyber Security Universiti Kebangsaan Malaysia Bangi Selangor MALAYSIA Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang Selangor MALAYSIA Computer Technology Department College of Computer Studies De La Salle University Manila PHILIPPINES Software Technology Department College of Computer Studies De La Salle University Manila PHILIPPINES Electrical and Electronics Engineering Institute University of the Philippines Diliman Quezon City P
In this work, the result of the initial attempt to propose an Association of Southeast Asian Nations (ASEAN) digital security and interoperability standard to support the mobility among ASEAN countries is presented. L...
来源: 评论