咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,466 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 593 篇 理学
    • 287 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,080 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2539 条 记 录,以下是2421-2430 订阅
排序:
Survey of on-line risks faced by internet users in the Nigerian telecommunication space
Survey of on-line risks faced by internet users in the Niger...
收藏 引用
2016 International Conference on Information and Communication Technology and its Applications, ICTA 2016
作者: Onwuka, Elizabeth N. Afolayan, David O. Abubakar, Wasiu Ibrahim, Joshua I. Department of Telecommunications Engineering Federal University of Technology Minna Nigeria Department of Cyber Security Science Federal University of Technology Minna Nigeria Department of Computer Science Federal University of Technology Minna Nigeria
In the past ten years, mobile broadband has made an inroad into the country and just in the last six years a twenty-two percent leap has been gained with respect to Internet use penetration. To this end the use of Inf... 详细信息
来源: 评论
Reencryption scheme for secure data sharing
Reencryption scheme for secure data sharing
收藏 引用
2016 International Conference on Communication and Signal Processing, ICCSP 2016
作者: Muthusenthil, B. Nivetha, D. Kim, Hyunsung Dept. Computer Science and Engineering Valliammai Engineering College Chennai India Dept. of Cyber Security Kyungil University Dept. of Mathematical Sciences University of Malawi Kyungsan Korea Republic of
Cloud computing is an evolutionary model for distributed computing, which consists of centralized data centers providing resources for massive scalable computing. Major security challenges are the generation, distribu... 详细信息
来源: 评论
Bandwidth-aware delayed repair in distributed storage systems  24
Bandwidth-aware delayed repair in distributed storage system...
收藏 引用
24th IEEE/ACM International Symposium on Quality of Service, IWQoS 2016
作者: Shen, Jiajie Gu, Jiazhen Zhou, Yangfan Wang, Xin School of Computer Science Fudan University Shanghai China The State Key Laboratory of Integrated Services Networks Xidian University Xi'an China Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education China
In data storage systems, data are typically stored in redundant storage nodes to ensure storage reliability. When storage nodes fail, with the help of the redundant nodes, the lost data can be restored in new storage ... 详细信息
来源: 评论
Argus: Smartphone-Enabled Human Cooperation via Multi-agent Reinforcement Learning for Disaster Situational Awareness
Argus: Smartphone-Enabled Human Cooperation via Multi-agent ...
收藏 引用
International Conference on Autonomic Computing (ICAC)
作者: Vidyasagar Sadhu Gabriel Salles-Loustau Dario Pompili Saman Zonouz Vincent Sritapan Department of Electrical and Computer Engineering Rutgers University Cyber Security Division Department of Homeland Security Science & Technology Directorate
Argus exploits a Multi-Agent Reinforcement Learning (MARL) framework to create a 3D mapping of the disaster scene using agents present around the incident zone to facilitate the rescue operations. The agents can be bo... 详细信息
来源: 评论
GRAAD: Group anonymous and accountable D2D communication in mobile networks
arXiv
收藏 引用
arXiv 2017年
作者: Hsu, Ruei-Hau Lee, Jemin Quek, Tony Q.S. Chen, Jyh-Cheng ITrust Centre for Research in Cyber Security Singapore University of Technology and Design Singapore487372 Singapore Department of Information and Communication Engineering Daegu Gyeongbuk Institute of Science and Technology 43016 Korea Republic of Information Systems Technology and Design Pillar Singapore University of Technology and Design Singapore487372 Singapore Department of Computer Science National Chiao Tung University 300 Taiwan
Device-to-Device (D2D) communication is mainly launched by the transmission requirements between devices for specific applications such as Proximity Services in Long-Term Evolution Advanced (LTE-A) networks, and each ... 详细信息
来源: 评论
Study on Demand Response of Residential Power Customer
Study on Demand Response of Residential Power Customer
收藏 引用
Workshop 7 2016
作者: Xiu Cao Haiyong Jiang Lei Huang Xueping Wang Xuqi Zhang School of Computer Science Fudan University Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education
In order to optimize the ladder-pricing scheme in Shanghai, we present a multi-objective optimization model(MOOM). To build this model, first we use price elasticity theory;divide the ladder pricing into peak electric... 详细信息
来源: 评论
HybridFlow: A lightweight control plane for hybrid SDN in enterprise networks
HybridFlow: A lightweight control plane for hybrid SDN in en...
收藏 引用
International Workshop on Quality of Service
作者: Siyuan Huang Jin Zhao Xin Wang School of Computer Science Fudan University Shanghai China Ministry of Education Engineering Research Center of Cyber Security Auditing and Monitoring China
Software-Defined Networking (SDN) has great potentials in changing the fragile and complex enterprise networks. One operational challenge to SDN deployment is the settlement of legacy switches. A hybrid SDN consisting... 详细信息
来源: 评论
Implementation of switching circuit models as transfer functions
Implementation of switching circuit models as transfer funct...
收藏 引用
International Symposium on Circuits and Systems
作者: David Kebo Houngninou Mitchell A Thornton Department of Computer Science and Engineering SMU Dallas Texas USA Darwin Deason Institute for Cyber Security SMU Dallas Texas USA
A transfer function is a mathematical function relating the output or response of a system to the input or stimulus. It is a concise mathematical model representing the input/output behavior of a system and is widely ... 详细信息
来源: 评论
Teaching test-drive development using Dojo
Journal of Computing Sciences in Colleges
收藏 引用
Journal of Computing sciences in Colleges 2017年 第4期32卷
作者: Young Lee Dhanunjaya Bhargavan Marepalli Jeong Yang Electrical Engineering and Computer Science Department Texas A&M University-Kingsville Computing and Cyber Security Department Texas A&M University-San Antonio
Teaching Test-Driven Development (TDD) to the students is challenging. TDD is best learned when it is actually performed rather than read about. Especially when the students are novice to TDD, starting by writing a te...
来源: 评论
Fast shortest-path queries on large-scale graphs
Fast shortest-path queries on large-scale graphs
收藏 引用
International Conference on Network Protocols
作者: Qiongwen Xu Xu Zhang Jin Zhao Xin Wang Tilman Wolf School of Computer Science Fudan University China Ministry of Education Engineering Research Center of Cyber Security Auditing and Monitoring China Department of Electrical and Computer Engineering University of Massachusetts Amherst USA
Shortest-path queries on weighted graphs are an essential operation in computer networks. The performance of such algorithms has become a critical challenge in emerging software-defined networks (SDN), since SDN contr... 详细信息
来源: 评论