咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,464 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 1,017 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 285 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,073 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2532 条 记 录,以下是271-280 订阅
排序:
Guarding Voices, Protecting Homes: A Comprehensive Case Study on Voice Assistant security in Smart Living  12
Guarding Voices, Protecting Homes: A Comprehensive Case Stud...
收藏 引用
12th International Symposium on Digital Forensics and security, ISDFS 2024
作者: Rehman, Fazalur Hashmi, Joudat Abdullah, Moiz Zaman, Hafsah School of Electrical Engineering and Computer Science National University of Sciences and Technology Islamabad Pakistan College of Engineering Georgia Tech University Department of Analytics United States Air University Faculty of Computing and Artificial Intelligence Department of Cyber Security Islamabad Pakistan
The evolution of technologies in the last decades has transformed the whole human interaction experience with the digital world. Integrated into users' home voice assistant devices has rationalized personal intera... 详细信息
来源: 评论
The mass,fake news,and cognition security
收藏 引用
Frontiers of computer science 2021年 第3期15卷 1-13页
作者: Bin GUO Yasan DING Yueheng SUN Shuai MA Ke LI Zhiwen YU School of Computer Science Northwestern Polytechnical UniversityXi'an 710072China School of Cyber Security Tianjin UniversityTianjin 300350China School of Computer Science and Engineering Beihang UniversityBeijing 100191China
The widespread fake news in social networks is posing threats to social stability,economic development,and political democracy,*** studies have explored the effective detection approaches of online fake news,while few... 详细信息
来源: 评论
Neuroadaptive Incentivization in Healthcare using Blockchain and IoT
收藏 引用
SN computer science 2024年 第1期5卷 1-12页
作者: Kumar, Ajay Singh, Rajiv Ranjan Chatterjee, Indranath Sharma, Nikita Rana, Vaishali Department of Computer Science and Informatics Central University of Himachal Pradesh Himachal Pradesh Dharamshala India Department of Cyber Security and Networks Glasgow Caledonian University Glasgow Scotland United Kingdom Department of Computer Engineering Tongmyong University Busan South Korea School of Technology Woxsen University Hyderabad India
Financially incentivizing health-related behaviors can improve health record outcomes and reduce healthcare costs. Blockchain and IoT technologies can be used to develop safe and transparent incentive schemes in healt... 详细信息
来源: 评论
Machine Learning for Climate Change Impact Assessment and Adaptation Planning  2
Machine Learning for Climate Change Impact Assessment and Ad...
收藏 引用
2nd IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Balakrishnan, T. Suresh Krishnan, Prabhakar Ebenezar, U. Samson Mohammed Nizarudeen, M. Kamal, N. Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Chennai India Amrita Vishwa Vidyapeetham Center for Cyber Security Systems and Networks Amritapuri-Campus India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Care College of Engineering Department of Computer Science and Engineering Tamil Nadu Trichy India Grt Institute of Engineering and Technology Dept. of Computer Science and Engineering Tamil Nadu Tiruttani India
The presented research introduces a new advanced data analytics methodology for climate change impact assessment and adaptive planning that utilizes machine learning and deep-learning techniques. Quantitative analysis... 详细信息
来源: 评论
security and Threat Detection through Cloud-Based Wazuh Deployment  1
Security and Threat Detection through Cloud-Based Wazuh Depl...
收藏 引用
1st IEEE Karachi Section Humanitarian Technology Conference, Khi-HTC 2024
作者: Moiz, Syed Majid, Abdul Basit, Abdul Ebrahim, Mansoor Abro, Abdul Ahad Naeem, Mehwish Iqra University Dept. of Computer Science Karachi Pakistan Dept. of Cyber Security Karachi Pakistan Indus University Dept. of Computer Science Karachi Pakistan Iqra University Dept. of Software Engineering Karachi Pakistan University Libre de Bruxelles Brussels Belgium
In today's interconnected business landscape, security is the cornerstone of all organizations, irrespective of their size or industry. This research emphasizes the critical need to safeguard organizational assets... 详细信息
来源: 评论
TransRPRT: A Knowledge Representation Learning Model Based on Relationship Transfer and Relationship Mapping Properties
TransRPRT: A Knowledge Representation Learning Model Based o...
收藏 引用
6th International Conference on Intelligent Computing and Signal Processing (ICSP)
作者: Yanjun Guo Junlin Zhou School of Computer Science and Engineering(School of Cyber Security) University of Electronic Science and Technology of China Chengdu China
Representing learning models can vectorize entities and relationships through vectorization, and can learn the attributes of entities to complete the knowledge graph, which has become a current research hotspot. Some ... 详细信息
来源: 评论
Optimizing Diagnostic Accuracy in Ultrasound Imaging Through Cloud-Enabled Deep Learning Techniques  4
Optimizing Diagnostic Accuracy in Ultrasound Imaging Through...
收藏 引用
4th International Conference on Soft Computing for security Applications, ICSCSA 2024
作者: Kalpana, V. Girija, M. Tharageswari, K. Yobu, D. Revathi, J. Aruna, R. Department of Computer Science and Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Chennai India Jeppiaar University School of Engineering and Technology Chennai India Department of Computer Science and Engineering Karpagam Academy of Higher Education Coimbatore India Computer Science and Engineering Cyber Security J.J College of Engineering and Technology Tricy India Department of Mathematics Kongu Engineering College Erode India Department of Computer Science and Engineering School of Computing Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Chennai India
This research aims to study predicting and optimizing the diagnostic accuracy by cloud-enabled deep learning techniques in ultrasound imaging for kidney disease diagnosis. The main findings are that CNN gives 92% accu... 详细信息
来源: 评论
Blockchain-Enabled DNS: Enhancing security and Mitigating Attacks in Domain Name Systems  6
Blockchain-Enabled DNS: Enhancing Security and Mitigating At...
收藏 引用
6th International Conference on Signal Processing and Information security, ICSPIS 2023
作者: Shah, Kaushal Padhya, Mukti Sharma, Sachin Pandit DeenDayal Energy University School of Technology Department of Computer Science and Engineering Gandhinagar India National Forensic Sciences University School of Cyber Security and Digital Forensics Gandhinagar India
The importance of Internet security is increasing as businesses expand through digitalization. Like in the physical world, data transmitted over the Internet must be safeguarded to ensure confidentiality, integrity, a... 详细信息
来源: 评论
Forward and Backward Private Searchable Symmetric Encryption with Efficient Updates  24
Forward and Backward Private Searchable Symmetric Encryption...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Yin, Zhiming Li, Xiong Choo, Kim-Kwang Raymond Liu, Yuzhen Liang, Wei School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249-0631 United States
In dynamic searchable symmetric encryption, clients can search and update encrypted data stored on the server (assumed to be semi-honest). In such schemes, forward privacy guarantees that prior queries are not related... 详细信息
来源: 评论
OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of cyber security  1
收藏 引用
8th Workshop on the security of Industrial Control Systems and of cyber-Physical Systems, cyberICPS 2022, 6th International Workshop on security and Privacy Requirements engineering, SECPRE 2022, 4th Workshop on security, Privacy, Organizations, and Systems engineering, SPOSE 2022, 3rd cyber-Physical security for Critical Infrastructures Protection, CPS4CIP 2022, 2nd International Workshop on cyber Defence Technologies and Secure Communications at the Network Edge, CDT and SECOMANE 2022, 1st International Workshop on Election Infrastructure security, EIS 2022 and 1st International Workshop on System security Assurance, SecAssure 2022 held in conjunction with 27th European Symposium on Research in computer security, ESORICS 2022
作者: Heydari, Mohammad Mouratidis, Haralambos Tafreshi, Vahid Heydari Fami Cyber Security Researcher at Stockholm University Stockholm Sweden School of Computer Science and Electronic Engineering University of Essex Colchester United Kingdom Staffordshire University London London United Kingdom
A Supply chain in the era of the Internet of Industrial Things faces new challenges in terms of modelling. The challenges stem from a number of characteristics like scalability, dependency and dynamism. In this paper,... 详细信息
来源: 评论