咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,464 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 1,017 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 285 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,073 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2532 条 记 录,以下是2461-2470 订阅
排序:
Malicious data classification using structural information and behavioral specifications in executables
Malicious data classification using structural information a...
收藏 引用
2014 Recent Advances in engineering and Computational sciences, RAECS 2014
作者: Kumar, Sandeep Rama Krishna, C. Aggarwal, Naveen Sehgal, Rakesh Chamotra, Saurabh Department of Computer Science and Engineering NITTTR Chandigarh India Department of Computer Science and Engineering UIET Punjab University Chandigarh India Department of Cyber Security Technology Development CDAC Mohali India
With the rise in the underground Internet economy, automated malicious programs popularly known as malwares have become a major threat to computers and information systems connected to the internet. Properties such as... 详细信息
来源: 评论
Multidimensional information-based tracking system
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2015年 26卷 111-118页
作者: Xu, Wei-Dong Zhou, Chuan-Jie Chen, Zhe Wang, Xin School of Computer Science Fudan University Shanghai201203 China Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education Shanghai200433 China
With the popularity of mobile devices and social informatization, a lot of trajectory data is increasingly accumulated in daily life and used in different applications. Based on the location information of users in th... 详细信息
来源: 评论
A Context Aware Reputation Mechanism for Enhancing Big Data Veracity in Mobile Cloud Computing
A Context Aware Reputation Mechanism for Enhancing Big Data ...
收藏 引用
International Conference on computer and Information Technology (CIT)
作者: Hui Lin Jia Hu Jiajia Liu Li Xu Yulei Wu Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China Department of Mathematics and Computer Science Liverpool Hope University Liverpool UK School of cyber engineering Xidian university Xian China Fujian Normal University Fuzhou Fujian CN College of Engineering University of Exeter Exeter UK
Data veracity ensures that the data used are trusted, authentic and protected from unauthorized access and modification. In order to implement the veracity of big data, specific trust models and approaches must be des... 详细信息
来源: 评论
After the ‘War on Terror’—how to maintain long-range terrorist deterrence
收藏 引用
Journal of Policing, Intelligence and Counter Terrorism 2014年 第1期9卷 19-31页
作者: Jan Kallberg Cyber Security Research and Education Institute Erik Jonsson School of Engineering and Computer Science University of Texas at Dallas Richardson USA Department of Computer Science Erik Jonsson School of Engineering and Computer Science Director of the Cyber Security and Educational Center University of Texas at Dallas Richardson USA
The American withdrawal from Afghanistan scheduled for 2014 signals an end to the first phase of the global ‘War on Terror’. Once the War on Terror enters a less intensive phase, a revised approach to terrorist dete... 详细信息
来源: 评论
An EAI Based Integration Solution for science and Research Outcomes Information Management
收藏 引用
Procedia computer science 2015年 64卷 894-901页
作者: Fernando Rosa Sequeira Rafael Z. Frantz Iryna Yevseyeva Michael T.M. Emmerich Vitor Basto-Fernandes School of Technology and Management Polytechnic Institute of Leiria 2411-901 Leiria Portugal UNIJUÍ University Department of Exact Sciences and Engineering Ijuí Brazil Cyber Security Research Institute School of Computing Science Newcastle University NE1 7RU Newcastle-upon-Tyne UK Multicriteria Optimization Design and Analytics Group LIACS Leiden University Niels Bohrweg 1 2333-CA Leiden The Netherlands School of Technology and Management Computer Science and Communications Research Centre Polytechnic Institute of Leiria 2411-901 Leiria Portugal
In this paper we present an Enterprise Application Integration (EAI) based proposal for research outcomes information management. The proposal is contextualized in terms of national and international science and resea... 详细信息
来源: 评论
Malware detection by token counting
Malware detection by token counting
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Ajeet Singh Poonia Shivraj Singh Department of Computer Science College of Engineering and Technology Bikaner India Department of Computer Science and Cyber Security Sardar Patel University of Police Security and Criminal Justice Jodhpur
Malicious software (or malware) is defined as software that fulfills the harmful intent of an attacker and it is one of the most pressing and major security threats facing the Internet today. Antivirus companies typic... 详细信息
来源: 评论
A science of System security
A Science of System Security
收藏 引用
IEEE Annual Conference on Decision and Control
作者: Ann Cox Sandip Roy Sean Warnick Cyber Security Division Homeland Security Advanced Research Projects Agency (HSARPA) Science and Technology Directorate US Department of Homeland Security School of Electrical Engineering and Computer Science at Washington State University Computer Science Department of Brigham Young University
As the internet becomes the information-technology backbone for more and more operations, including critical infrastructures such as water and power systems, the security problems introduced by linking such operations... 详细信息
来源: 评论
Malicious data classification using structural information and behavioral specifications in executables
Malicious data classification using structural information a...
收藏 引用
Recent Advances in engineering and Computational sciences (RAECS)
作者: Sandeep Kumar C. Rama Krishna Naveen Aggarwal Rakesh Sehgal Saurabh Chamotra Department of Computer Science and Engineering NITTTR Chandigarh India Department of Computer Science and Engineering Punjab University Chandigarh India Department of Cyber Security Technology Development CDAC Mohali India
With the rise in the underground Internet economy, automated malicious programs popularly known as malwares have become a major threat to computers and information systems connected to the internet. Properties such as... 详细信息
来源: 评论
WarMops: A Workload-Aware Resource Management Optimization Strategy for IaaS Private Clouds
WarMops: A Workload-Aware Resource Management Optimization S...
收藏 引用
IEEE International Conference on Services Computing (SCC)
作者: Jun Zhang Jing Wang Jie Wu Zhihui Lu Shiyong Zhang Yiping Zhong School of Computer Science Fudan University Shanghai China Engineering Research Center of Cyber Security Ministry of Education Shanghai China
For an IaaS cloud, the primary task is to satisfy users' demands for resources. Besides, administrators also have to deal with problems such as how to optimize allocation and utilization of resources at the data c... 详细信息
来源: 评论
Non-dominated sorting environmental adaptation method (NS-EAM)
Non-dominated sorting environmental adaptation method (NS-EA...
收藏 引用
International Conference on Signal Processing and Integrated Networks (SPIN)
作者: Ritu Nigam Arjun Choudhary K. K. Mishra Computer Science & Engineering ABES Engg. College Ghaziabad India Computer Science & Cyber Security S. P. U. P. Security and Criminal Justice Jodhpur India Computer Science & Engineering Moti Lal Nehru NIT Allahabad India
A modified version of NSGA-II named as NSEAM is proposed to solve multi-objective optimization (MOO) problems, which is better in performance as compared to NSGA-II. In this proposed algorithm a new Bio inspired algor... 详细信息
来源: 评论