咨询与建议

限定检索结果

文献类型

  • 1,611 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,517 篇 工学
    • 1,251 篇 计算机科学与技术...
    • 1,046 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 607 篇 理学
    • 297 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 60 篇 化学
  • 412 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 126 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 99 篇 machine learning
  • 98 篇 security
  • 82 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 58 篇 support vector m...
  • 58 篇 predictive model...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 49 篇 artificial intel...
  • 47 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,925 篇 英文
  • 664 篇 其他
  • 17 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2596 条 记 录,以下是2401-2410 订阅
排序:
A conceptual framework for cyber counterintelligence: Theory that really matters  16
A conceptual framework for cyber counterintelligence: Theory...
收藏 引用
16th European Conference on cyber Warfare and security, ECCWS 2017
作者: Duvenage, Petrus Sithole, Thenjiwe Von Solms, Sebastian Academy of Computer Science and Software Engineering University of Johannesburg South Africa Centre for Cyber Security University of Johannesburg South Africa
For those connecting the dots, major cyber breaches continue to affirm the necessity of having cyber counterintelligence (CCI) at the core of a proactive cybersecurity approach. While practitioners and executives enga... 详细信息
来源: 评论
Cultivating a cyber counterintelligence maturity model  16
Cultivating a cyber counterintelligence maturity model
收藏 引用
16th European Conference on cyber Warfare and security, ECCWS 2017
作者: Jaquire, Victor Von Solms, Sebastiaan Academy of Computer Science and Software Engineering University of Johannesburg South Africa Centre for Cyber Security University of Johannesburg South Africa
Just as the utilisation of cyberspace became more mainstream, intricate and advanced during the past decade, so did the intricacy and advancement of threats mature-paralleling the conveniences and essentials that cybe... 详细信息
来源: 评论
Measurement and Analysis of the Reviews in Airbnb
Measurement and Analysis of the Reviews in Airbnb
收藏 引用
IFIP Networking Conference
作者: Qian Zhou Yang Chen Chuanhao Ma Fei Li Yu Xiao Xin Wang Xiaoming Fu Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education China Department of Communications and Networking Aalto University Finland Institute of Computer Science University of Goettingen Germany
Airbnb, a recently emerged online lodging service that allows house and apartment dwellers to lease out their premises to short-term renters like tourists, is reconstructing the value chain of the traditional hotel in... 详细信息
来源: 评论
A game-theoretic analysis of shard-based permissionless blockchains
arXiv
收藏 引用
arXiv 2018年
作者: Manshaei, Mohammad Hossein Jadliwala, Murtuza Maiti, Anindya Fooladgar, Mahdi Department of Electrical and Computer Engineering Isfahan University of Technology Iran Department of Computer Science University of Texas San Antonio United States Institute for Cyber Security University of Texas San Antonio United States
Low transaction throughput and poor scalability are significant issues in public blockchain consensus protocols such as Bitcoins. Recent research efforts in this direction have proposed shard-based consensus protocols... 详细信息
来源: 评论
Finding global optima in nonconvex stochastic semide finite optimization with variance reduction
arXiv
收藏 引用
arXiv 2018年
作者: Zeng, Jinshan Ma, Ke Yao, Yuan School of Computer Information Engineering Jiangxi Normal University Department of Mathematics Hong Kong University of Science and Technology State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences
There is a recent surge of interest in nonconvex reformulations via low-rank factorization for stochastic convex semide finite optimization problem in the purpose of efficiency and scalability. Compared with the origi... 详细信息
来源: 评论
A cyber kill chain based taxonomy of banking trojans for evolutionary computational intelligence
arXiv
收藏 引用
arXiv 2018年
作者: Kiwia, Dennis Dehghantanha, Ali Choo, Kim-Kwang Raymond Slaughter, Jim Department of Computer Science School of Computing Science and Engineering University of Salford United Kingdom Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX78249 United States
Malware such as banking Trojans are popular with financially-motivated cybercriminals. Detection of banking Trojans remains a challenging task, due to the constant evolution of techniques used to obfuscate and circumv... 详细信息
来源: 评论
Towards Privacy-preserving Incentive for Mobile Crowdsensing Under An Untrusted Platform
Towards Privacy-preserving Incentive for Mobile Crowdsensing...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Zhibo Wang Jingxin Li Jiahui Hu Ju Ren Zhetao Li Yanjun Li State Key Laboratory for Novel Software Technology Nanjing University P. R. China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University P. R. China School of Information Science and Engineering Central South University P. R. China Key Laboratory of Intelligent Computing & Information Processing of Ministry of Education College of Information Engineering Xiangtan University P. R. China School of Computer Science and Technology Zhejiang University of Technology P. R. China
Reverse auction-based incentive mechanisms have been commonly proposed to stimulate mobile users to participate in crowdsensing, where users submit bids to the platform to compete for tasks. Recent works pointed out t... 详细信息
来源: 评论
Modeling attack process of advanced persistent threat using network evolution
Modeling attack process of advanced persistent threat using ...
收藏 引用
作者: Niu, Weina Zhang, Xiaosong Yang, Guowu Chen, Ruidong Wang, Dong School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Center for Cyber Security University of Electronic Science and Technology of China Chengdu China
Advanced Persistent Threat (APT) is one of the most serious network attacks that occurred in cyberspace due to sophisticated techniques and deep concealment. Modeling APT attack process can facilitate APT analysis, de... 详细信息
来源: 评论
AClog: Attack Chain Construction Based on Log Correlation
AClog: Attack Chain Construction Based on Log Correlation
收藏 引用
IEEE Global Communications Conference
作者: Teng Li Jianfeng Ma Qingqi Pei Yulong Shen Chi Lin Siqi Ma Mohammad S. Obaidat School of Cyber Engineering Xidian University Shaanxi China Shaanxi Key Laboratory of BlockChain and Security Computing Xidian University Shaanxi China School of Computer Science Xidian University Shaanxi China School of Software Technology Dalian University of Technology Dalian China Commonwealth Scientific and Industrial Research Organisation Sydney Australia College of Computing and Informatics University of Sharjah UAE University of Jordan Jordan Nazarbayev University Kazakhstan University of Science and Technology Beijing China
Before the final attack happens, clandestine attackers conduct sequenced stages for being stealthy and elusive. These attacks can leave clues in several different log files. However existing approaches can only detect... 详细信息
来源: 评论
Improving the accuracy of automated facial age estimation to aid CSEM investigations
收藏 引用
Digital Investigation 2019年 28卷 S142-S142页
作者: Felix Anda David Lillis Aikaterini Kanta Brett Becker Elias Bou-Harb Nhien An Le Khac Mark Scanlon Forensics and Security Research Group University College Dublin Ireland Cyber Threat Intelligence Laboratory College of Engineering and Computer Science Florida Atlantic University USA
来源: 评论