咨询与建议

限定检索结果

文献类型

  • 1,611 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,517 篇 工学
    • 1,251 篇 计算机科学与技术...
    • 1,046 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 607 篇 理学
    • 297 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 60 篇 化学
  • 412 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 126 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 99 篇 machine learning
  • 98 篇 security
  • 82 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 58 篇 support vector m...
  • 58 篇 predictive model...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 49 篇 artificial intel...
  • 47 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,925 篇 英文
  • 664 篇 其他
  • 17 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2596 条 记 录,以下是431-440 订阅
排序:
Optimizing Real-time Task Scheduling in Cloud-based AI Systems using Genetic Algorithms  7
Optimizing Real-time Task Scheduling in Cloud-based AI Syste...
收藏 引用
7th International Conference on Contemporary Computing and Informatics, IC3I 2024
作者: Mohammed, Abdul Sajid Mallikarjunaradhya, Vinay Sreeramulu, Madhusudhan Dasari Boddapati, Nagesh Jiwani, Nasmin Natarajan, Yuvaraj University of the Cumberlands Department of School of Computer and Information Sciences KY United States Thomson Reuters Toronto Canada American Express Department of Cyber Security United States Microsoft Department of Computer Science CharlotteNC United States University of The Cumberlands Department of Information Technology WilliamsburgKY United States Sri Shakthi Institute of Engineering and Technology Department of Computer Science Engineering Tamil Nadu Coimbatore India
Artificial Intelligence (AI) has also started to be regularly introduced in cloud-based systems as it can help improve performance and skyrocket efficiency. It is a challenge for such systems to schedule tasks in real... 详细信息
来源: 评论
Design of Chatbot to Prevent cyberbullying from Social Media
Design of Chatbot to Prevent Cyberbullying from Social Media
收藏 引用
Sustainable Communication Networks and Application (ICSCNA), International Conference on
作者: Erin Sanu Medha Mummigatti Mohana Computer Science and Engineering (Data Science) RV College of Engineering® Bengaluru India Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
In the present world, social media has greatly influenced our lives but with the increase in usage of social media, people get exposed to its adverse impacts as well. The common and major impact is cyberbullying, whic...
来源: 评论
IoT-Driven Robotic System for Enhanced Nighttime Perimeter security and Real-Time Surveillance in Smart Environments
IoT-Driven Robotic System for Enhanced Nighttime Perimeter S...
收藏 引用
Visual Analytics and Data Visualization (ICVADV), International Conference on
作者: J. Jayachitra A. Aslam Khan V. Yuvaraj Computer Science Engineering (Cyber Security) IFET College of Engineering Villupuram Tamil Nadu Information Technology IFET College of Engineering Villupuram Tamil Nadu
As a result of the growing demand for automated security, this research study proposes the design and development of a night patrol robot with Raspberry Pi Zero 2 W. The main purpose of the robot is to monitor the are... 详细信息
来源: 评论
cyber security Testbed: Keyloggers and Data Visualization on Keyloggers - A Case Study
Cyber Security Testbed: Keyloggers and Data Visualization on...
收藏 引用
Sustainable Communication Networks and Application (ICSCNA), International Conference on
作者: Prasiddha Bhat Namratha H J Mohana Computer Science and Engineering (Data Science) RV College of Engineering® Bengaluru India Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
A cyber security Testbed (CST) is used to simulate cyber-attacks, test and evaluate existing and new strategies. It is a safe space to fix vulnerabilities and enhance security. Keyloggers are malicious tools that reco...
来源: 评论
End-to-End Transformer Architecture with Novel Ensemble Learning Method Integrating CT Scans and Clinical Narratives for Brain Stroke Diagnosis  1
收藏 引用
41st computer Graphics International Conference, CGI 2024
作者: Abdul Wahid, Junaid Ayoub, Muhammad Xu, Mingliang Jiang, Xiaoheng Lei, Shi Li, Lifeng Hussain, Shabir Khawaja, Ashfaque Gao, Yufei School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou450001 China School of Electronic Information and Electrical Engineering Shanghai Jiaotong University Shanghai200240 China School of Computer Science and Engineering Central South University Hunan Changsha336017 China School of Cyber Space and Security Zhengzhou University Zhengzhou450002 China Institute of Biopharmaceutical and Health Engineering Tsinghua Shenzhen International Graduate School Shenzhen100084 China
This study is an extension of our previously published manuscript [2]. Building upon the foundations laid in our earlier work, this research further refines and extends the transformer-based approach to enhance its di... 详细信息
来源: 评论
Leveraging OpenStack-based Private Cloud for Intrusion Detection Using Deep Learning Techniques
Leveraging OpenStack-based Private Cloud for Intrusion Detec...
收藏 引用
Women in Computing (InCoWoCo), International Conference for
作者: Rahul Roshan G Vishal S Salanke Nagasundari S Department of Computer Science and Engineering Research Center for Information Security Forensics and Cyber Resilience PES University Bangalore India
OpenStack is a cloud platform that offers infrastructure services, providing access to computing, storage, and network resources. However, due to its open-source nature, the cloud environment can be vulnerable to secu... 详细信息
来源: 评论
BadTTS: Identifying Vulnerabilities in Neural Text-to-Speech Models
BadTTS: Identifying Vulnerabilities in Neural Text-to-Speech...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Rui Zhang Hongwei Li Wenbo Jiang Ran Zhang Jiaming He School of Computer Science and Engineering University of Electronic Science and Technology of China College of Computer Science and Cyber Security (Oxford Brookes College) Chengdu University of Technology China
With the widespread use of deep learning systems in many applications, adversaries have strong incentives to perform attacks against these systems for their adversarial purposes. Reports have indicated that backdoor a... 详细信息
来源: 评论
Fuzzy-Based Weighted Federated Machine Learning Approach for Sustainable Energy Management with IoE Integration
Fuzzy-Based Weighted Federated Machine Learning Approach for...
收藏 引用
2024 Systems and Information engineering Design Symposium, SIEDS 2024
作者: Ghazal, Taher M. Iqbal Janjua, Jamshaid Abbas, Sagheer Fatima, Areej Saleem, Muhammad Khan, Muhammad Adnan Alqarafi, Abdulrahman Khalifa University Centre for Cyber Physical Systems Computer Science Department Abu Dhabi United Arab Emirates Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Selangor Malaysia National College of Business Administration and Economics School of Computer Sciences Lahore Pakistan Al-Khawarizmi Institute of Computer Science Lahore Pakistan Bahria University Department of Computer Science Lahore Pakistan LGU Department of Computer Science Lahore Pakistan Minhaj University School of Computer Science Lahore Pakistan Skyline University College School of Computing Sharjah United Arab Emirates Riphah International University Riphah School of Computing and Innovation Lahore Pakistan Taibah University College of Computer Science and Engineering Medina42353 Saudi Arabia
The considerable surge in energy consumption due to population growth and the use of new technology has posed significant challenges to energy security and the environment. Managing energy consumption on the consumer ... 详细信息
来源: 评论
Three-dimensional dynamic uncertainty semantic SLAM method for a production workshop
Three-dimensional dynamic uncertainty semantic SLAM method f...
收藏 引用
作者: Gou, Rongsong Chen, Guangzhu Yan, Chengliang Pu, Xin Wu, Yuanyuan Tang, Yuan College of Mechanical and Electrical Engineering Chengdu University of Technology Chengdu China College of Computer Science and Cyber Security Chengdu University of Technology Chengdu China
Simultaneous localization and mapping (SLAM) is the basis for intelligent navigation and intelligent security of mobile robots in a workshop. However, there are numerous dynamic objects in a workshop, such as robots a... 详细信息
来源: 评论
Advancing Android Malware Detection with BioSentinel Neural Network using Hybrid Deep Learning Techniques
Advancing Android Malware Detection with BioSentinel Neural ...
收藏 引用
International Conference on Computing for Sustainable Global Development (INDIACom)
作者: D Sandhya Rani K Gnaneshwar K Sampurnima Pattem Soma Sekhar G Bala Krishna Shirisha Kakarla Department of Computer Science Engineering CVR College of Engineering Ibrahimpatnam Rangareddy India Department of Computer Science Engineering-Cyber Security Sreenidhi Institute of Science and Technology Hyderabad India Department of Computer Science Engineering Vardhaman College of Engineering Hyderabad India
The paper introduces the BioSentinel Neural Network (BSNN), a novel hybrid deep learning model designed to enhance malware detection, particularly focusing on zero-day threats. The BSNN model integrates diverse neural...
来源: 评论