咨询与建议

限定检索结果

文献类型

  • 1,550 篇 会议
  • 934 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,506 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,465 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 372 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 215 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 113 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 82 篇 安全科学与工程
    • 61 篇 机械工程
    • 54 篇 化学工程与技术
    • 52 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 286 篇 数学
    • 212 篇 生物学
    • 120 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 66 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 83 篇 基础医学(可授医学...
    • 81 篇 临床医学
    • 53 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 141 篇 accuracy
  • 118 篇 deep learning
  • 105 篇 feature extracti...
  • 103 篇 training
  • 94 篇 machine learning
  • 89 篇 security
  • 77 篇 computational mo...
  • 74 篇 real-time system...
  • 72 篇 internet of thin...
  • 72 篇 privacy
  • 60 篇 blockchain
  • 54 篇 support vector m...
  • 53 篇 predictive model...
  • 49 篇 data models
  • 46 篇 artificial intel...
  • 45 篇 semantics
  • 45 篇 cloud computing
  • 43 篇 convolutional ne...
  • 42 篇 data privacy
  • 40 篇 reliability

机构

  • 226 篇 school of cyber ...
  • 157 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 46 篇 college of cyber...
  • 45 篇 college of compu...
  • 44 篇 key laboratory o...
  • 36 篇 school of comput...
  • 32 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 school of cyber ...
  • 30 篇 school of comput...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 state key labora...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 2,245 篇 英文
  • 254 篇 其他
  • 14 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2506 条 记 录,以下是71-80 订阅
排序:
Anomaly-Based Detection of Log4j Attack in SDN
Anomaly-Based Detection of Log4j Attack in SDN
收藏 引用
International Conference on Smart Systems and Wireless Communication, SSWC 2024
作者: Deshmukh, Pruthviraj Nitin Harish, R. Sangeetha, V. Praveen, K. TIFAC-CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham Coimbatore India Department of Computer Science and Information Systems BITS Pilani India
The widely used Java library Log4j logging framework has lately come under attack from a major vulnerability known as CVE-2021–44228, also known as Log4Shell. Through the use of malicious log messages, the vulnerabil... 详细信息
来源: 评论
CNN Based Model for Underwater Image Classification and Enhancement
CNN Based Model for Underwater Image Classification and Enha...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering science, AMATHE 2024
作者: Jamandlamudi, Sahit Isravel, Deva Priya Dhas, Julia Punitha Malar Karunya Institute Of Technology And Sciences Division Of Data Science And Cyber Security Coimbatore India Karunya Institute Of Technology And Sciences Division Of Computer Science And Engineering Coimbatore India
The challenge of enhancing underwater images is difficult because of several issues, including color distortion, inadequate illumination, and dispersion from suspended particles in the water. Conventional picture enha... 详细信息
来源: 评论
Advancing Alzheimer's Diagnosis Through Transfer Learning with Deep MRI Analysis
Advancing Alzheimer's Diagnosis Through Transfer Learning wi...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering science, AMATHE 2024
作者: Adityasai, B. Babu, Nirmal Varghese Karunya Institute Of Technology And Sciences Division Of Computer Science And Engineering Coimbatore India Karunya Institute Of Technology And Sciences Division Of Data Science And Cyber Security Coimbatore India
Alzheimer's disease (AD) poses a significant health-care challenge, necessitating early and accurate diagnosis for effective management. This study presents a novel approach aimed at enhancing AD diagnosis through... 详细信息
来源: 评论
Enhanced Deep Learning Approaches for Robust Darknet Traffic Classification  3
Enhanced Deep Learning Approaches for Robust Darknet Traffic...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Etyang, Felix Pavithran, Pramod Mwendwa, Gideon Mandela, Ngaira Hillary, Musiime School of Engineering Cochin University of Science & Technology Department of Computer Science Cochin India School of Cyber Security and Digital Forensics National Forensics Sciences University Gandhinagar India School of Cyber Security and Digital Forensics National Forensics Sciences University Jinja Uganda
The classification of darknet traffic remains a pivotal task in modern cybersecurity efforts, necessitating advanced analytical techniques to address malicious activities pre-emptively. This study introduces and compa... 详细信息
来源: 评论
Investigation of Handwritten Image-To-Speech Using Deep Learning
Investigation of Handwritten Image-To-Speech Using Deep Lear...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering science, AMATHE 2024
作者: Manju, S. Anitha, J. Sujitha Juliet, D. Karunya Institute Of Technology And Sciences Division Of Computer Science And Engineering Coimbatore India Karunya Institute Of Technology And Sciences Division Of Data Science And Cyber Security Coimbatore India
In the realm of accessibility technology, this paper introduces a pioneering method for converting handwritten images to speech. The work primarily focuses on recognizing handwritten text and subsequently converting i... 详细信息
来源: 评论
A Deepfake Image Classifier System for real and Doctored Image Differentiation  7
A Deepfake Image Classifier System for real and Doctored Ima...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Thomas, Juanith Mathew Ebenezer, V. Richard, Rohan Paul Karunya Institute of Technology And Sciences Division of Computer Science And Engineering Coimbatore India Karunya Institute of Technology And Sciences Division of Data Science And Cyber Security Coimbatore India
The sudden proliferation of deepfake technology has raised concerns about the authenticity and integrity of digital media. In response to these concerns, this paper presents a Deepfake image classifier system designed... 详细信息
来源: 评论
Knee Osteoarthritis Detection Using X-Rays and DNN  3
Knee Osteoarthritis Detection Using X-Rays and DNN
收藏 引用
3rd International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2024
作者: Sinha, Vaishnawi Veemaraj, Ebenezer Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Tamil Nadu Coimbatore India Division of Data Science and Cyber Security Tamil Nadu Coimbatore India
Knee osteoarthritis (OA) is a prevalent degenerative joint disease that affects millions worldwide, leading to pain, disability, and reduced quality of life. Early detection and intervention are crucial for effective ... 详细信息
来源: 评论
Combating Terrorism: Detecting and Analyzing Extremist Content on X (Formerly Twitter)  3
Combating Terrorism: Detecting and Analyzing Extremist Conte...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Mwendwa, Gideon Chouhan, Lokesh Etyang, Felix Mandela, Ngaira Gift, Uwineza School of Cyber Security and Digital Forensics National Forensic Sciences University Goa India Cochin University of Science and Technology School of Engineering Department of Computer Science Cochin India School of Cyber Security and Digital Forensics National Forensic Sciences University Gandhinagar India School of Cyber Security and Digital Forensics National Forensic Sciences University Jinja Uganda
This study investigates the efficacy of machine learning algorithms in detecting and evaluating extremist content on social media platforms, and we employ X, formerly known as Twitter. We therefore utilize Kaggle'... 详细信息
来源: 评论
Machine Learning for Detecting Subtle Signs of EyeDisease  4
Machine Learning for Detecting Subtle Signs of EyeDisease
收藏 引用
4th International Conference on Expert Clouds and Applications, ICOECA 2024
作者: Dafny Neola, J. Ebenezer, V. Edwin, E.Bijolin Kirubakaran, S.Stewart Thanka, M.Roshni Yona Davincy, R. Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Karunya Institute of Technology and Sciences Division of Data Science and Cyber Security Coimbatore India
Eye disorders can have serious repercussions, such as blindness or visual impairment, if they are not identified or addressed, Treatment that works and preventing permanent harm depend on early diagnosis and predictio... 详细信息
来源: 评论
Extraction of Actionable Threat Intelligence from Dark Web Data  5
Extraction of Actionable Threat Intelligence from Dark Web D...
收藏 引用
5th International Conference on Control, Communication and Computing, ICCC 2023
作者: Varghese, Varsha Mahalakshmi, S. Senthilkumar, K.B. ER&DCI Institute of Technology Cyber Forensics and Information Security Department of Computer Science & Engineering Thiruvananthapuram India Cyber Security Group Centre for Development of Advanced Computing Thiruvananthapuram India
Darknet has emerged as an excellent platform for cybercriminals to conduct various illicit activities such as operating a fully functional crypto-currency-based marketplace or maintaining a highly anonymous communicat... 详细信息
来源: 评论