咨询与建议

限定检索结果

文献类型

  • 1,305 篇 会议
  • 629 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,109 篇 工学
    • 913 篇 计算机科学与技术...
    • 768 篇 软件工程
    • 303 篇 信息与通信工程
    • 198 篇 控制科学与工程
    • 158 篇 电气工程
    • 111 篇 网络空间安全
    • 110 篇 生物工程
    • 106 篇 电子科学与技术(可...
    • 79 篇 安全科学与工程
    • 71 篇 机械工程
    • 68 篇 交通运输工程
    • 59 篇 化学工程与技术
    • 50 篇 生物医学工程(可授...
    • 48 篇 仪器科学与技术
    • 45 篇 光学工程
    • 39 篇 动力工程及工程热...
    • 39 篇 建筑学
  • 456 篇 理学
    • 226 篇 数学
    • 117 篇 生物学
    • 99 篇 物理学
    • 89 篇 统计学(可授理学、...
    • 64 篇 化学
    • 50 篇 系统科学
  • 309 篇 管理学
    • 190 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 95 篇 法学
    • 66 篇 社会学
  • 63 篇 医学
    • 45 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 34 篇 经济学
  • 18 篇 农学
  • 17 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 122 篇 accuracy
  • 99 篇 feature extracti...
  • 97 篇 deep learning
  • 84 篇 security
  • 82 篇 real-time system...
  • 71 篇 training
  • 70 篇 machine learning
  • 68 篇 computational mo...
  • 62 篇 internet of thin...
  • 53 篇 predictive model...
  • 50 篇 semantics
  • 50 篇 privacy
  • 50 篇 convolutional ne...
  • 42 篇 support vector m...
  • 38 篇 data models
  • 37 篇 protocols
  • 34 篇 neural networks
  • 34 篇 optimization
  • 31 篇 authentication
  • 31 篇 blockchain

机构

  • 523 篇 school of cyber ...
  • 397 篇 institute of inf...
  • 67 篇 state key labora...
  • 53 篇 chinese academy ...
  • 38 篇 school of cyber ...
  • 38 篇 department of co...
  • 36 篇 university of bu...
  • 33 篇 department of me...
  • 31 篇 school of comput...
  • 31 篇 cyberspace insti...
  • 29 篇 university of ch...
  • 28 篇 institute of inf...
  • 26 篇 institute of com...
  • 25 篇 beijing electron...
  • 23 篇 department of cy...
  • 21 篇 maharishi school...
  • 20 篇 kuaishou technol...
  • 20 篇 yeshwantrao chav...
  • 20 篇 school of cyber ...
  • 19 篇 division of comp...

作者

  • 54 篇 cao xiaochun
  • 30 篇 xu qianqian
  • 28 篇 huang qingming
  • 22 篇 hu songlin
  • 20 篇 yang zhiyong
  • 20 篇 cao yanan
  • 20 篇 wu xing
  • 19 篇 jayant giri
  • 18 篇 jingqiang lin
  • 18 篇 zhou pan
  • 18 篇 hu yue
  • 17 篇 wang wei
  • 17 篇 sun limin
  • 17 篇 lin jingqiang
  • 16 篇 limin sun
  • 16 篇 n. sreevani
  • 14 篇 peng hao
  • 14 篇 xiong gang
  • 14 篇 lin zheng
  • 14 篇 gai keke

语言

  • 1,429 篇 英文
  • 506 篇 其他
  • 12 篇 中文
检索条件"机构=Cyber Security and Cyber Forensics in the Institute of Engineering and Technology"
1939 条 记 录,以下是21-30 订阅
排序:
Design and Implementation of a BERT Based Weibo Public Opinion Monitoring System  14th
Design and Implementation of a BERT Based Weibo Public Opini...
收藏 引用
14th International Conference on Computer engineering and Networks, CENet 2024
作者: Chen, Shun-Chao Zhu, Tao Pang, Zi-An Xu, Chen Department of Computer Information and Cyber Security Key Laboratory of Digital Forensics Department of Public Security of Jiangsu Province Jiangsu Police Institute Engineering Research Center of Electronic Data Forensics Analysis Jiangsu Province NAN Jing210031 China
With the rapid development of online We Media, it is not easy to monitor and guide massive public opinion information. The massive forwarding, emotional polarization, and mixed rumors of blog posts are highly likely t... 详细信息
来源: 评论
APK Automated Analysis System Based on Machine Learning  14th
APK Automated Analysis System Based on Machine Learning
收藏 引用
14th International Conference on Computer engineering and Networks, CENet 2024
作者: Tang, Keyan Liang, Guangjun Chen, Mengxuan Lu, You Zhang, Yang Xu, Zhongping Xu, Yiquan Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing China Engineering Research Center of Electronic Data Forensics Analysis Nanjing China Key Laboratory of Digital Forensics Department of Public Security of Jiangsu Province Nanjing China
This article first analyzes and compares the advantages and disadvantages of various traditional data mining methods and machine learning algorithms. Then, a new model for identifying Android malicious code was propos... 详细信息
来源: 评论
Deployment of Co-operative Farming Ecosystems Using Blockchain  22nd
Deployment of Co-operative Farming Ecosystems Using Blockcha...
收藏 引用
22nd International Conference on Hybrid Intelligent Systems, HIS 2022 and the 18th International Conference on Information Assurance and security, IAS 2022
作者: Mahapatra, Aishwarya Gupta, Pranav Swarnkar, Latika Gupta, Deeya Kar, Jayaprakash Centre for Cryptography Cyber Security and Digital Forensics Department of Computer Science & Engineering Department of Communication & Computer Engineering The LNM Institute of Information Technology Jaipur India
Blockchain has helped us in designing and developing decentralised distributed systems. This, in turn, has proved to be quite beneficial for various industries grappling with problems regarding a centralised system. S... 详细信息
来源: 评论
Metaverse security and forensics: VR Devices as an Example  14th
Metaverse Security and Forensics: VR Devices as an Example
收藏 引用
14th International Conference on Computer engineering and Networks, CENet 2024
作者: Su, Fu Liang, Guangjun Ni, Xueli Zhang, Qinrui Chen, Pu Liu, Jianning Li, Xiang Du, Hongtian Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing China Engineering Research Center of Electronic Data Forensics Analysis Nanjing China Department of Public Security of Jiangsu Province Key Laboratory of Digital Forensics Nanjing China
VR devices are a rapidly emerging type of sensory terminal device in the context of the metaverse, with its immersive use effects attracting a large number of users to experience. However, with the continuous developm... 详细信息
来源: 评论
Enhanced Prediction of Swimmer Fitness Using Modified Resilient PSO Algorithm
收藏 引用
Transactions of the Indian National Academy of engineering 2024年 第4期9卷 903-915页
作者: Geetha Poornima, K. Krishna Prasad, K. Institute of Computer Science and Information Science Srinivas University Mangalore India Cyber Security and Cyber Forensics in the Institute of Engineering and Technology Srinivas University Mangalore India
Sports develop both physical and mental growth of an individual. In order to enhance the physical and mental health effectively and effortlessly, swimming is considered to be one of the healthier activities, in develo...
来源: 评论
Design and Implementation of an Automated APK Analysis System for Practical forensics  13th
Design and Implementation of an Automated APK Analysis Syste...
收藏 引用
13th International Conference on Computer engineering and Networks, CENet 2023
作者: Li, Yicheng Liang, Guangjun Tang, Keyan Teng, Yijia Ruan, Haoran Mo, Zixi Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing China Engineering Research Center of Electronic Data Forensics Analysis Nanjing China Key Laboratory of Digital Forensics Department of Public Security of Jiangsu Province Nanjing China
In order to cope with the widespread emergence of malicious APK in the application market and the increasingly rampant situation of mobile malware, as well as to meet the needs of the actual forensics work, this paper... 详细信息
来源: 评论
Effectiveness of a touch-based hand therapeutic application for hand dexterity in children with handwriting difficulties-a pilot study
收藏 引用
Multimedia Tools and Applications 2024年 1-35页
作者: Smitha, John Renumol, V.G. School of Computer Science and Technology Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Tamil Nadu Coimbatore India School of Engineering Cochin University of Science and Technology Kochi India
Handwriting is an important skill for children during their academic years. It is the coordination of perceptual-motor and cognitive abilities. Some children have difficulties in handwriting, which is an indication of... 详细信息
来源: 评论
Aparecium:understanding and detecting scam behaviors on Ethereum via biased random Walk
收藏 引用
cybersecurity 2024年 第3期7卷 16-31页
作者: Chuyi Yan Chen Zhang Meng Shen Ning Li Jinhao Liu Yinhao Qi Zhigang Lu Yuling Liu Institute of Information Engineering Chinese Academy of SciencesBeijing 100093China School of Cyber Security University of Chinese Academy of SciencesBeijing 100049China School of Cyberspace Science and Technology Bejing Institute of TechnologyBeijing 100081China
Ethereum's high attention,rich business,certain anonymity,and untraceability have attracted a group of *** on it has become increasingly rampant,among which scam behavior is convenient,cryptic,antagonistic and res... 详细信息
来源: 评论
A Police UAV System Based on Target Recognition  13th
A Police UAV System Based on Target Recognition
收藏 引用
13th International Conference on Computer engineering and Networks, CENet 2023
作者: Qiu, Zhenyu Liang, Guangjun Du, Hongtian Yan, Bohan Peng, Jiahao Ju, Zexin Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing China Engineering Research Center of Electronic Data Forensics Analysis Nanjing China Key Laboratory of Digital Forensics Department of Public Security of Jiangsu Province Nanjing China
The As a kind of aircraft without carrying operators, unmanned aerial vehicle (UAV) has been rapidly developed in the civil field. It is widely used in police, urban management, agriculture, geology, meteorology, elec... 详细信息
来源: 评论
Minimizing CNOT-count in quantum circuit of the extended Shor’s algorithm for ECDLP
收藏 引用
cybersecurity 2025年 第1期8卷 153-179页
作者: Xia Liu Huan Yang Li Yang State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina Beijing Youzhuju Network Technology Co. Ltd.BeijingChina
The elliptic curve discrete logarithm problem(ECDLP)is a popular choice for cryptosystems due to its high level of ***,with the advent of the extended Shor’s algorithm,there is concern that ECDLP may soon be *** the ... 详细信息
来源: 评论