咨询与建议

限定检索结果

文献类型

  • 1,305 篇 会议
  • 629 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,109 篇 工学
    • 913 篇 计算机科学与技术...
    • 768 篇 软件工程
    • 303 篇 信息与通信工程
    • 198 篇 控制科学与工程
    • 158 篇 电气工程
    • 111 篇 网络空间安全
    • 110 篇 生物工程
    • 106 篇 电子科学与技术(可...
    • 79 篇 安全科学与工程
    • 71 篇 机械工程
    • 68 篇 交通运输工程
    • 59 篇 化学工程与技术
    • 50 篇 生物医学工程(可授...
    • 48 篇 仪器科学与技术
    • 45 篇 光学工程
    • 39 篇 动力工程及工程热...
    • 39 篇 建筑学
  • 456 篇 理学
    • 226 篇 数学
    • 117 篇 生物学
    • 99 篇 物理学
    • 89 篇 统计学(可授理学、...
    • 64 篇 化学
    • 50 篇 系统科学
  • 309 篇 管理学
    • 190 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 95 篇 法学
    • 66 篇 社会学
  • 63 篇 医学
    • 45 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 34 篇 经济学
  • 18 篇 农学
  • 17 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 122 篇 accuracy
  • 99 篇 feature extracti...
  • 97 篇 deep learning
  • 84 篇 security
  • 82 篇 real-time system...
  • 71 篇 training
  • 70 篇 machine learning
  • 68 篇 computational mo...
  • 62 篇 internet of thin...
  • 53 篇 predictive model...
  • 50 篇 semantics
  • 50 篇 privacy
  • 50 篇 convolutional ne...
  • 42 篇 support vector m...
  • 38 篇 data models
  • 37 篇 protocols
  • 34 篇 neural networks
  • 34 篇 optimization
  • 31 篇 authentication
  • 31 篇 blockchain

机构

  • 523 篇 school of cyber ...
  • 397 篇 institute of inf...
  • 67 篇 state key labora...
  • 53 篇 chinese academy ...
  • 38 篇 school of cyber ...
  • 38 篇 department of co...
  • 36 篇 university of bu...
  • 33 篇 department of me...
  • 31 篇 school of comput...
  • 31 篇 cyberspace insti...
  • 29 篇 university of ch...
  • 28 篇 institute of inf...
  • 26 篇 institute of com...
  • 25 篇 beijing electron...
  • 23 篇 department of cy...
  • 21 篇 maharishi school...
  • 20 篇 kuaishou technol...
  • 20 篇 yeshwantrao chav...
  • 20 篇 school of cyber ...
  • 19 篇 division of comp...

作者

  • 54 篇 cao xiaochun
  • 30 篇 xu qianqian
  • 28 篇 huang qingming
  • 22 篇 hu songlin
  • 20 篇 yang zhiyong
  • 20 篇 cao yanan
  • 20 篇 wu xing
  • 19 篇 jayant giri
  • 18 篇 jingqiang lin
  • 18 篇 zhou pan
  • 18 篇 hu yue
  • 17 篇 wang wei
  • 17 篇 sun limin
  • 17 篇 lin jingqiang
  • 16 篇 limin sun
  • 16 篇 n. sreevani
  • 14 篇 peng hao
  • 14 篇 xiong gang
  • 14 篇 lin zheng
  • 14 篇 gai keke

语言

  • 1,429 篇 英文
  • 506 篇 其他
  • 12 篇 中文
检索条件"机构=Cyber Security and Cyber Forensics in the Institute of Engineering and Technology"
1939 条 记 录,以下是31-40 订阅
排序:
Ensemble of deep learning models with Walrus Optimization Algorithm for accurate botnet recognition and classification
收藏 引用
Iran Journal of Computer Science 2025年 1-18页
作者: Chacko, Ashwathy Anda Edwin, E. Bijolin Thanka, M. Roshni Ebenezer, V. Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India
The rapid growth of Internet of Things (IoT) networks has introduced significant security challenges, with botnet attacks being one of the most prevalent threats. These attacks exploit vulnerabilities in IoT devices, ... 详细信息
来源: 评论
Detecting conflict of heterogeneous access control policies
收藏 引用
Digital Communications and Networks 2022年 第5期8卷 664-679页
作者: Mingjie Yu Fenghua Li Nenghai Yu Xiao Wang Yunchuan Guo School of Cyber Security University of Science and Technology of ChinaHefei230027China Institute of Information Engineering Chinese Academy of SciencesBeijing100093China School of Cyber Security University of Chinese Academy of SciencesBeijing100049China
Policy conflicts may cause substantial economic *** a large amount of effort has been spent on detecting intra-domain policy conflict,it can not detect conflicts of heterogeneous *** this paper,considering background ... 详细信息
来源: 评论
Blockchain-Based Cognitive Computing Model for Data security on a Cloud Platform
收藏 引用
Computers, Materials & Continua 2023年 第12期77卷 3305-3323页
作者: Xiangmin Guo Guangjun Liang Jiayin Liu Xianyi Chen Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjing210031China Jiangsu Electronic Data Forensics and Analysis Engineering Research Center Jiangsu Police InstituteNanjing210031China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China
Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and ***,information shoplifting poses significant threats,potentially leading to poor perf... 详细信息
来源: 评论
Sentiment Analysis using Dictionary-Based Lexicon Approach: Analysis on the Opinion of Indian Community for the Topic of Cryptocurrency
收藏 引用
Annals of Data Science 2024年 第6期11卷 2019-2034页
作者: Loomba, Sankalp Dave, Madhavi Arolkar, Harshal Sharma, Sachin School of Cyber Security and Digital Forensics National Forensic Sciences University Gujarat Gandhinagar India Adani Institute of Digital Technology Management Gujarat Ahmedabad India Faculty of Computer Application and Information Technology GLS University Gujarat Ahmedabad India Indrashil University Gujarat Mehsana India
Due to the ever-increasing computing power and easy availability, social-networking platforms like Facebook, Twitter, etc. have become a popular medium to express one’s views instantly, be it about political situatio... 详细信息
来源: 评论
Co-Dance With Ambiguity: An Ambiguity-Aware Facial Expression Recognition Framework for More Robustness
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年 第6期35卷 5431-5444页
作者: Cao, Xinran Luo, Liang Gu, Yu Ren, Fuji University of Electronic Science and Technology of China School of Computer Science and Engineering School of Cyber Security Chengdu611731 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518110 China
Facial Expression Recognition (FER) has received considerable research attention owing to its poor robustness in real-world scenarios. This issue, defined as the uncertainty problem in FER, is often solved by recogniz... 详细信息
来源: 评论
Dissecting zero trust:research landscape and its implementation in IoT
收藏 引用
cybersecurity 2025年 第2期8卷 201-228页
作者: Chunwen Liu Ru Tan Yang Wu Yun Feng Ze Jin Fangjiao Zhang Yuling Liu Qixu Liu Institute of Information Engineering Chinese Academy of SciencesBeijing 100085China School of Cyber Security University of Chinese Academy of SciencesBeijing 100049China China Cybersecurity Review Technology and Certification Center Beijing 100013China
As a progressive security strategy,the zero trust model has attracted notable attention and importance within the realm of network security,especially in the context of the Internet of Things(IoT).This paper aims to e... 详细信息
来源: 评论
On-Demand Emergency Medical Response: A Seamless Android Application for Auto Ambulance System
On-Demand Emergency Medical Response: A Seamless Android App...
收藏 引用
2024 IEEE International Conference on Electronic Systems and Intelligent Computing, ICESIC 2024
作者: Samuel, Prithi Reshmy Arun Kumar, R. Nilay Keshri, Karan SRM Institute of Science and Technology School of Compuitng Department of Computational Intelligence Chennai India University of South Wales Department of Digital Forensics and Cyber Security Treforest United Kingdom
This Android app has an easy-to-use interface that makes it possible for users to quickly reach local ambulance services. By utilizing location-based services, the application locates available ambulance services quic... 详细信息
来源: 评论
Research on Site Planning of Mobile Communication Network
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3243-3261页
作者: Jiahan He Guangjun Liang Meng Li KefanYao Bixia Wang Lu Li Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjing210000China Engineering Research Center of Electronic Data Forensics Analysis Nanjing210000China Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjing210000China Basic Course Teaching and Research Department Jiangsu Police InstituteNanjing210000China Communication and Signal College Nanjing Railway Vocational and TechnicalNanjing210000China
In this paper,considering the cost of base station,coverage,call quality,and other practical factors,a multi-objective optimal site planning scheme is ***,based on practical needs,mathematical modeling methods were us... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 432-441页
作者: Yunhua He Yigang Yang Chao Wang Anke Xie Li Ma Bin Wu Yongdong Wu Information Science and Technology North China University of TechnologyBeijing100144China Bei Hang University Yunnan Innovation Institute Yunnan650233China Institute of Information Engineering Chinese Academy of SciencesBeijing101408China College of Cyber Security and College of Information Science and Technology Jinan UniversityGuangzhou510632China
The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix ***,complex functions ... 详细信息
来源: 评论