咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,466 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 593 篇 理学
    • 287 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,080 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2539 条 记 录,以下是2491-2500 订阅
排序:
Towards an Attribute Based Constraints Specification Language
Towards an Attribute Based Constraints Specification Languag...
收藏 引用
IEEE International Conference on Social Computing (SocialCom)
作者: Khalid Zaman Bijon Ram Krishnan Ravi Sandhu Department of Computer Science Institute for Cyber Security Department of Electrical and Computer Engineering University of Texas at San Antonio
Recently, attribute based access control (ABAC) has received considerable attention from the security community for its policy flexibility and dynamic decision making capabilities. In ABAC, authorization decisions are... 详细信息
来源: 评论
Identity-based privacy preservation framework over u-healthcare system
Identity-based privacy preservation framework over u-healthc...
收藏 引用
FTRA 7th International Conference on Multimedia and Ubiquitous engineering, MUE 2013
作者: Mtonga, Kambombo Yang, Haomiao Yoon, Eun-Jun Kim, Hyunsung Department of IT Convergence Kyungil University 712-701 Kyungsansi Kyungpook Province Korea Republic of College of Computer Science and Engineering UEST of China Chengdu 610054 China Department of Cyber Security Kyungil University 712-701 Kyungsansi Kyungpook Province Korea Republic of
The digitization of patient health information has brought many benefits and challenges for both the patient and doctor. But security and privacy preservation have remained important challenges for wireless health mon... 详细信息
来源: 评论
On security with the new Gen2 RFID security framework
On security with the new Gen2 RFID security framework
收藏 引用
IEEE International Conference on RFID
作者: Daniel W. Engels You Sung Kang Junyu Wang Computer Science and Engineering Department Southern Methodist University Dallas Texas USA Cyber Convergence Security Research Division ETRL Daejeon Korea Department of Electrical Engineering KAIST Daejeon Korea Auto-ID Lab Fudan University Shanghai China
Radio frequency identification (RFID) systems compliant to the EPCglobal Generation 2 (Gen2) passive UHF RFID protocol are being deployed in a broad range of applications including access control, automated tolling, p... 详细信息
来源: 评论
A group-centric model for collaboration with expedient insiders in multilevel systems
A group-centric model for collaboration with expedient insid...
收藏 引用
2012 13th International Conference on Collaboration Technologies and Systems, CTS 2012
作者: Bijon, Khalid Zaman Sandhu, Ravi Krishnan, Ram Institute for Cyber Security Department of Computer Science United States Institute for Cyber Security Department of Electrical and Computer Engineering University of Texas at San Antonio United States
An authorization model for group-centric organizational collaboration has been recently proposed wherein multiple organizations may collaborate via groups [3]. Each group is independent of all others and adheres to th... 详细信息
来源: 评论
Risk-aware RBAC sessions
Risk-aware RBAC sessions
收藏 引用
8th International Conference on Information Systems security, ICISS 2012
作者: Bijon, Khalid Zaman Krishnan, Ram Sandhu, Ravi Institute for Cyber Security Department of Computer Science University of Texas San Antonio TX United States Institute for Cyber Security Department of Electrical and Computer Engineering University of Texas San Antonio TX United States
Role Based Access Control (RBAC) has received considerable attention as a model of choice for simplified access control over the past decade. More recently, risk awareness in access control has emerged as an important... 详细信息
来源: 评论
An intelligent question answering conversational agent using Naïve Bayesian classifier
An intelligent question answering conversational agent using...
收藏 引用
2012 IEEE International Conference on Technology Enhanced Education, ICTEE 2012
作者: Niranjan, M. Saipreethy, M.S. Kumar, T. Gireesh Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Ettimadai India Department of Cyber Security Amrita Vishwa Vidyapeetham Ettimadai India
In the current scenario, learning has taken a completely new dimension. New methods of teaching like E-learning and collaborative learning etc have computerized the learning process to a large extent. But the teachers... 详细信息
来源: 评论
A role-based administration model for attributes
A role-based administration model for attributes
收藏 引用
1st International Workshop on Secure and Resilient Architectures and Systems, SRAS 2012 - Held in Conjunction with the 21st International Conference on Parallel Architectures and Compilation Techniques, PACT 2012
作者: Jin, Xin Krishnan, Ram Sandhu, Ravi Institute for Cyber Security Dept. of Computer Science Univ. of Texas at San Antonio San Antonio TX United States Institute for Cyber Security Dept. of Electrical and Computer Engineering Univ. of Texas at San Antonio San Antonio TX United States
Attribute based access control (ABAC) provides flexibility and scalability for securely managing access to resources, particularly in distributed environments. In ABAC, access requests are authorized through policies ... 详细信息
来源: 评论
Malware classification method via binary content comparison  12
Malware classification method via binary content comparison
收藏 引用
2012 ACM Research in Applied Computation Symposium, RACS 2012
作者: Kang, Boojoong Kim, Taekeun Kwon, Heejun Choi, Yangseo Im, Eul Gyu Dept. of Electronics and Computer Engineering Hanyang University Seoul Korea Republic of Cyber Convergence Security Research Division ETRI Daejeon Korea Republic of Div. of Computer Science and Engineering Hanyang University Seoul Korea Republic of
With the wide spread uses of the Internet, the number of Internet attacks keeps increasing, and malware is the main cause of most Internet attacks. Malware is used by attackers to infect normal users' computers an... 详细信息
来源: 评论
Towards provenance and risk-awareness in social computing
Towards provenance and risk-awareness in social computing
收藏 引用
1st International Workshop on Secure and Resilient Architectures and Systems, SRAS 2012 - Held in Conjunction with the 21st International Conference on Parallel Architectures and Compilation Techniques, PACT 2012
作者: Cheng, Yuan Nguyen, Dang Bijon, Khalid Krishnan, Ram Park, Jaehong Sandhu, Ravi Department of Computer Science University of Texas San Antonio TX United States Department of Electrical and Computer Engineering University of Texas San Antonio TX United States Institute for Cyber Security University of Texas San Antonio TX United States
Although social computing (SC) has been growing phenomenally, it still lacks an appropriate way of protecting the security and privacy of data shared in the system. Current access control mechanisms in the domain of S... 详细信息
来源: 评论
Practical firewall policy inspection using anomaly detection and its visualization
收藏 引用
International Conference on IT Convergence and security 2011, ICITCS 2011
作者: Kim, Ui-Hyong Kang, Jung-Min Lee, Jae-Sung Kim, Hyong-Shik Department of Computer Science and Engineering Chungnam University 79 Daehak-ro Yuseong-gu Daejeon 305-764 Korea Republic of Computer Science Education Korea University Anam-dong 5-ga Seongbuk-gu Seoul 136-701 Korea Republic of Cyber Security Research Department Attached Institute of ETRI P.O. Box 1 Yuseong Daejeon 305-600 Korea Republic of
Due to the increasing cyber threats, firewall has become the one of the core elements in network security. The effectiveness of firewall security is dependent on providing policy management techniques. For this reason... 详细信息
来源: 评论