咨询与建议

限定检索结果

文献类型

  • 1,550 篇 会议
  • 934 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,506 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,465 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 372 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 215 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 113 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 82 篇 安全科学与工程
    • 61 篇 机械工程
    • 54 篇 化学工程与技术
    • 52 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 286 篇 数学
    • 212 篇 生物学
    • 120 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 66 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 83 篇 基础医学(可授医学...
    • 81 篇 临床医学
    • 53 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 141 篇 accuracy
  • 118 篇 deep learning
  • 105 篇 feature extracti...
  • 103 篇 training
  • 94 篇 machine learning
  • 89 篇 security
  • 77 篇 computational mo...
  • 74 篇 real-time system...
  • 72 篇 internet of thin...
  • 72 篇 privacy
  • 60 篇 blockchain
  • 54 篇 support vector m...
  • 53 篇 predictive model...
  • 49 篇 data models
  • 46 篇 artificial intel...
  • 45 篇 semantics
  • 45 篇 cloud computing
  • 43 篇 convolutional ne...
  • 42 篇 data privacy
  • 40 篇 reliability

机构

  • 226 篇 school of cyber ...
  • 157 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 46 篇 college of cyber...
  • 45 篇 college of compu...
  • 44 篇 key laboratory o...
  • 36 篇 school of comput...
  • 32 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 school of cyber ...
  • 30 篇 school of comput...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 state key labora...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 2,245 篇 英文
  • 254 篇 其他
  • 14 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2506 条 记 录,以下是141-150 订阅
排序:
IoT Devices Authentication Using Artificial Neural Network
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 3701-3716页
作者: Syed Shabih Ul Hasan Anwar Ghani Ikram Ud Din Ahmad Almogren Ayman Altameem Department of Computer Science and Software Engineering International Islamic University Islamabad45000Pakistan Department of Information Technology The University of Haripur22620HaripurPakistan Chair of Cyber Security Department of Computer ScienceCollege of Computer and Information SciencesKing Saud UniversityRiyadh11633Saudi Arabia Chair of Cyber Security Department of Natural and Engineering SciencesCollege of Applied Studies and Community ServicesKing Saud UniversityRiyadh11543Saudi Arabia
User authentication is one of the critical concerns of information *** tend to use strong textual passwords,but remembering complex passwords is hard as they often write it on a piece of paper or save it in their mobi... 详细信息
来源: 评论
A Comprehensive Vulnerability Tools Analysis for security and Control in IT Environment and Organizations
A Comprehensive Vulnerability Tools Analysis for Security an...
收藏 引用
Electronics and Sustainable Communication Systems (ICESC), 2020 International Conference on
作者: Aryan Chaturvedi Bhumi Lakhani Tanisha Agarwal Mohana Minal Moharir Ashok Kumar A R Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
This research study analyzes the potential of integrating OpenVAS, Wireshark, Nmap, and Metasploit for comprehensive vulnerability analysis and assessment in IT environment and various public and private organizations... 详细信息
来源: 评论
Efficient UAV Routing Strategies for Wireless Sensor Network Data Retrieval
Efficient UAV Routing Strategies for Wireless Sensor Network...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Al-Sharhanee, Kareem Ali Malalah Najim, Ali Hamza Alheeti, Khattab M. Ali Satar, Nurhizam Safie Mohd Hashim, Aisha Hassan Abdallah Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad10011 Iraq Department of Computer Technical Al-Diwaniyah Iraq College of Computer and Information Technology University of Anbar Computer Networking Systems Department Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
WSNs are applied in many disciplines where certain conditions require the ability to adapt to network sink mobility and changes in the dynamics of the area coverage. To meet these needs, it is necessary to develop int... 详细信息
来源: 评论
Collecting and analyzing key-value data under shuffled differential privacy
收藏 引用
Frontiers of computer science 2023年 第2期17卷 241-243页
作者: Ning WANG Wei ZHENG Zhigang WANG Zhiqiang WEI Yu GU Peng TANG Ge YU Faculty of Information Science and Engineering Ocean University of ChinaQingdao 266100China School of Computer Science and Engineering Northeastern UniversityShenyang 110819China Key Lab of Cryptologic Technology and Information Security Ministry of EducationShandong UniversityQingdao 266200China School of Cyber Science and Technology Shandong UniversityQingdao 266200China
1 Introduction Key-value data,as NoSQL data widely used in recent years,has been frequently collected and used for analysis in major websites and mobile *** frequency distribution estimation on the key domain,as well ... 详细信息
来源: 评论
A Comprehensive Analysis of Social engineering Attacks: From Phishing to Prevention - Tools, Techniques and Strategies
A Comprehensive Analysis of Social Engineering Attacks: From...
收藏 引用
Intelligent cyber Physical Systems and Internet of Things (ICoICI), International Conference on
作者: Sarthak Gupta Mayank Pritwani Adarsh Shrivastava Mohana Minal Moharir Ashok Kumar A R Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
As the digitalization has accelerated, Social engineering Attacks have emerged as a prevalent threat in contemporary cybersecurity landscapes. This paper provides a comprehensive exploration of Social engineering Atta... 详细信息
来源: 评论
GPS Based Efficient Real Time Vehicle Tracking and Monitoring System Using Two Factor Authentication and Internet of Things (IoT)
GPS Based Efficient Real Time Vehicle Tracking and Monitorin...
收藏 引用
Intelligent cyber Physical Systems and Internet of Things (ICoICI), International Conference on
作者: S Jeevan Kishan Karthik S Jayanth Sharma Mohana Minal Moharir Ashok Kumar A R Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
Vehicle tracking systems have evolved significantly over the years, transitioning from simple passive tracking devices to real-time monitoring systems that utilize global positioning system (GPS) and global system for... 详细信息
来源: 评论
An Urban Electric Vehicle Charging System via Hybrid Heterogeneous Modes
An Urban Electric Vehicle Charging System via Hybrid Heterog...
收藏 引用
2024 IEEE International Conference on Systems, Man, and cybernetics, SMC 2024
作者: Zhang, Keyang Liu, Yueheng Liu, Shuohan Gao, Junqiao Cao, Yue Ahmad, Naveed Zhang, Xu School of Cyber Science and Engineering Wuhan University China Wuhan Cyber Security Association China Qilu University of Technology China College of Computer and Information Sciences Prince Sultan University Riyadh Saudi Arabia Norwich United Kingdom
Electric Vehicle (EV) is regarded as the optimal alternative to traditional fuel-powered vehicles. However, the exponential surge in EV charging demand poses challenges in charging infrastructure planning and charging... 详细信息
来源: 评论
Smart Health Monitoring and Anomaly Detection Using Internet of Things (IoT) and Artificial Intelligence (AI)
Smart Health Monitoring and Anomaly Detection Using Internet...
收藏 引用
Intelligent cyber Physical Systems and Internet of Things (ICoICI), International Conference on
作者: Prabu Jayant Elvis Vincent Mohana Minal Moharir Ashok Kumar A R Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
Smart health monitoring systems, powered by AI and IoT, are transforming healthcare by enabling continuous, real-time patient monitoring. In India, where lapses in health monitoring contribute to 20% of premature deat... 详细信息
来源: 评论
Facial Expressions and EEG Signals for Emotion Recognition Using Deep2 Face Algorithm  10
Facial Expressions and EEG Signals for Emotion Recognition U...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Swetha, S. Babu, Nirmal Varghese Karunya Institute of Technology and Science Division of Computer Science and Engineering Karunya Nagar Tamil Nadu Coimbatore India Karunya Institute of Technology and Science Division of Data Science and Cyber Security Karunya Nagar Tamil Nadu Coimbatore India
Emotions, the essence of human connection and understanding, take center stage in this pioneering research on emotion recognition. We look at identifying common emotions including joy, sorrow, neutral, anger, fear, an... 详细信息
来源: 评论
Intrusion Detection in Network Traffic Using LSTM and Deep Learning
Intrusion Detection in Network Traffic Using LSTM and Deep L...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Prabu Jayant M Prathica Shetty S Jeevan Mohana Minal Moharir A R Ashok Kumar Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
Network Intrusion Detection system (NIDS) helps in detecting the traffic and avoids any potential harm to the system. LSTM is a deep learning model architecture that uses recurrent neural networks (RNN) for handling s... 详细信息
来源: 评论