咨询与建议

限定检索结果

文献类型

  • 1,305 篇 会议
  • 629 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,109 篇 工学
    • 913 篇 计算机科学与技术...
    • 768 篇 软件工程
    • 303 篇 信息与通信工程
    • 198 篇 控制科学与工程
    • 158 篇 电气工程
    • 111 篇 网络空间安全
    • 110 篇 生物工程
    • 106 篇 电子科学与技术(可...
    • 79 篇 安全科学与工程
    • 71 篇 机械工程
    • 68 篇 交通运输工程
    • 59 篇 化学工程与技术
    • 50 篇 生物医学工程(可授...
    • 48 篇 仪器科学与技术
    • 45 篇 光学工程
    • 39 篇 动力工程及工程热...
    • 39 篇 建筑学
  • 456 篇 理学
    • 226 篇 数学
    • 117 篇 生物学
    • 99 篇 物理学
    • 89 篇 统计学(可授理学、...
    • 64 篇 化学
    • 50 篇 系统科学
  • 309 篇 管理学
    • 190 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 95 篇 法学
    • 66 篇 社会学
  • 63 篇 医学
    • 45 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 34 篇 经济学
  • 18 篇 农学
  • 17 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 122 篇 accuracy
  • 99 篇 feature extracti...
  • 97 篇 deep learning
  • 84 篇 security
  • 82 篇 real-time system...
  • 71 篇 training
  • 70 篇 machine learning
  • 68 篇 computational mo...
  • 62 篇 internet of thin...
  • 53 篇 predictive model...
  • 50 篇 semantics
  • 50 篇 privacy
  • 50 篇 convolutional ne...
  • 42 篇 support vector m...
  • 38 篇 data models
  • 37 篇 protocols
  • 34 篇 neural networks
  • 34 篇 optimization
  • 31 篇 authentication
  • 31 篇 blockchain

机构

  • 523 篇 school of cyber ...
  • 397 篇 institute of inf...
  • 67 篇 state key labora...
  • 53 篇 chinese academy ...
  • 38 篇 school of cyber ...
  • 38 篇 department of co...
  • 36 篇 university of bu...
  • 33 篇 department of me...
  • 31 篇 school of comput...
  • 31 篇 cyberspace insti...
  • 29 篇 university of ch...
  • 28 篇 institute of inf...
  • 26 篇 institute of com...
  • 25 篇 beijing electron...
  • 23 篇 department of cy...
  • 21 篇 maharishi school...
  • 20 篇 kuaishou technol...
  • 20 篇 yeshwantrao chav...
  • 20 篇 school of cyber ...
  • 19 篇 division of comp...

作者

  • 54 篇 cao xiaochun
  • 30 篇 xu qianqian
  • 28 篇 huang qingming
  • 22 篇 hu songlin
  • 20 篇 yang zhiyong
  • 20 篇 cao yanan
  • 20 篇 wu xing
  • 19 篇 jayant giri
  • 18 篇 jingqiang lin
  • 18 篇 zhou pan
  • 18 篇 hu yue
  • 17 篇 wang wei
  • 17 篇 sun limin
  • 17 篇 lin jingqiang
  • 16 篇 limin sun
  • 16 篇 n. sreevani
  • 14 篇 peng hao
  • 14 篇 xiong gang
  • 14 篇 lin zheng
  • 14 篇 gai keke

语言

  • 1,429 篇 英文
  • 506 篇 其他
  • 12 篇 中文
检索条件"机构=Cyber Security and Cyber Forensics in the Institute of Engineering and Technology"
1939 条 记 录,以下是11-20 订阅
排序:
Combating Terrorism: Detecting and Analyzing Extremist Content on X (Formerly Twitter)  3
Combating Terrorism: Detecting and Analyzing Extremist Conte...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Mwendwa, Gideon Chouhan, Lokesh Etyang, Felix Mandela, Ngaira Gift, Uwineza School of Cyber Security and Digital Forensics National Forensic Sciences University Goa India Cochin University of Science and Technology School of Engineering Department of Computer Science Cochin India School of Cyber Security and Digital Forensics National Forensic Sciences University Gandhinagar India School of Cyber Security and Digital Forensics National Forensic Sciences University Jinja Uganda
This study investigates the efficacy of machine learning algorithms in detecting and evaluating extremist content on social media platforms, and we employ X, formerly known as Twitter. We therefore utilize Kaggle'... 详细信息
来源: 评论
Extraction of Actionable Threat Intelligence from Dark Web Data  5
Extraction of Actionable Threat Intelligence from Dark Web D...
收藏 引用
5th International Conference on Control, Communication and Computing, ICCC 2023
作者: Varghese, Varsha Mahalakshmi, S. Senthilkumar, K.B. ER&DCI Institute of Technology Cyber Forensics and Information Security Department of Computer Science & Engineering Thiruvananthapuram India Cyber Security Group Centre for Development of Advanced Computing Thiruvananthapuram India
Darknet has emerged as an excellent platform for cybercriminals to conduct various illicit activities such as operating a fully functional crypto-currency-based marketplace or maintaining a highly anonymous communicat... 详细信息
来源: 评论
Enhancing non-profiled side-channel attacks by time-frequency analysis
收藏 引用
cybersecurity 2023年 第4期6卷 50-75页
作者: Chengbin Jin Yongbin Zhou Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina School of Cyber Science and Engineering Nanjing University of Science and TechnologyNanjingChina
Side-channel analysis(SCA)has become an increasing important method to assess the physical security of cryptographic *** the process of SCA,the number of attack data directly determines the performance of *** sufficie... 详细信息
来源: 评论
The Role of AI in Vehicle-to-Infrastructure Communication for Tolling Systems
The Role of AI in Vehicle-to-Infrastructure Communication fo...
收藏 引用
2024 IEEE International Women in engineering (WIE) Conference on Electrical and Computer engineering, WIECON-ECE 2024
作者: Mahalakshmi, S. Baskaran, Nithiya Partheeban, Pachaivanna Krishnara, Kowsalyadevi Arjun, S. Chennai Institute of Technology Department of Computer Science and Engineering Kundrathur Chennai India Chennai Institute of Technology Department Cyber Security Kundrathur Chennai India Chennai Institute of Technology Department Civil EngDepartment Cyber Security Kundrathur Chennai India Sona Institute of Technology Department of Cyber Security Salem India
The number of vehicles people use is substantial;thus, surveillance must be accurate. License plates are detected and recognized by detecting static and real-time images captured by the camera using OCR technology, Co... 详细信息
来源: 评论
Terahertz metasurface biosensor for high-sensitivity salinity detection and data encoding with machine learning optimization based on random forest regression
收藏 引用
Optical and Quantum Electronics 2024年 第11期56卷 1-39页
作者: Wekalao, Jacob Mandela, Ngaira Department of Optics and Optical Engineering University of Science and Technology of China Hefei230026 China School of Digital Forensics and Cyber Security National Forensic Sciences University Gujarat Gandhinagar382007 India
This research presents a terahertz-based biosensor for high-precision salinity detection, employing a synergistic integration of graphene, gold, and silver in a metasurface configuration. The sensor exhibits exception... 详细信息
来源: 评论
AI-Powered Automated Wheelchair with Lane Detection  6
AI-Powered Automated Wheelchair with Lane Detection
收藏 引用
6th IEEE International Conference on Emerging Smart Computing and Informatics, ESCI 2024
作者: Abiraj, B. Sethuraman, K. Bethanney Janney, J. Prince Grace Kanmani, P. Sudhakar, T. Ezekiel Jebaraj, S. Sathyabama Institute of Science and Technology Dept. of Biomedical Engineering Chennai India University of Madras M.Sc. Cyber Forensics and Information Security Chennai India
A wheelchair is a revolutionary assistive mobility aid that improves the flexibility and standard of life for those with mobility limitations. There are many guidance systems for impaired people to navigate against ob... 详细信息
来源: 评论
Assistance for Healthcare Professionals using Hand Gesture Recognition
Assistance for Healthcare Professionals using Hand Gesture R...
收藏 引用
2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2023
作者: Sethuraman, K. Jeffrey Delaperle, S. Bethanney Janney, J. Mohammed Thoufeeq, A. Aadhitya, S. Solomon, Ezekiel Jebaraj Sathyabama Institute of Science and Technology Department of Biomedical Engineering Chennai India University of Madras Cyber Forensics and Information Security Chennai India
Bedridden and paralyzed individuals need to be continuously taken care of since they find it difficult to convey their requirements due to loss of movement management in their brain. This results in communication disa... 详细信息
来源: 评论
TU-IR Apple Image Dataset: Benchmarking, Challenges, and Asymmetric Characterization for Bruise Detection in Application of Automatic Harvesting
IEEE Transactions on AgriFood Electronics
收藏 引用
IEEE Transactions on AgriFood Electronics 2024年 第1期2卷 105-124页
作者: Das, Dipak Hrishi Roy, Sourav Dey Saha, Priya Bhowmik, Mrinal Kanti Government Degree College Department of Information Technology Santirbazar 799144 India Department of Computer Science and Engineering Suryamaninagar 799022 India Department of Cyber Security and Digital Forensics Agartala799001 India
With the blooming interest in computer vision-based technologies for future automation of food producers, there is a need for incorporating an automatic bruise detection module in robotic apple harvesting because of d... 详细信息
来源: 评论
TransTM:A device-free method based on time-streaming multiscale transformer for human activity recognition
收藏 引用
Defence technology(防务技术) 2024年 第2期32卷 619-628页
作者: Yi Liu Weiqing Huang Shang Jiang Bobai Zhao Shuai Wang Siye Wang Yanfang Zhang Institute of Information Engineering Chinese Academy of Sciences School of Cyber SecurityUniversity of Chinese Academy of SciencesBeijingChina School of Information Management Beijing Information Science and Technology UniversityBeijingChina
RFID-based human activity recognition(HAR)attracts attention due to its convenience,noninvasiveness,and privacy *** RFID-based HAR methods use modeling,CNN,or LSTM to extract features ***,they have shortcomings:1)requ... 详细信息
来源: 评论
Design and Realization of Personal Password Management System Based on Domestic Cryptographic Algorithms  14th
Design and Realization of Personal Password Management Syste...
收藏 引用
14th International Conference on Computer engineering and Networks, CENet 2024
作者: Mo, Zixi Zhuge, Chengchen Ma, Zhuo Li, Xiang Zhang, Heyu Zhang, Xunrui Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing China Engineering Research Center of Electronic Data Forensics Analysis Nanjing China Department of Public Security of Jiangsu Province Key Laboratory of Digital Forensics Nanjing China
To address the problems of low password security and the use of the same password on multiple network platforms, we analyze the major techniques and shortcomings of the existing personal password manager, and a person... 详细信息
来源: 评论