咨询与建议

限定检索结果

文献类型

  • 1,198 篇 会议
  • 585 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 1,803 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,059 篇 工学
    • 891 篇 计算机科学与技术...
    • 753 篇 软件工程
    • 307 篇 信息与通信工程
    • 192 篇 控制科学与工程
    • 145 篇 电气工程
    • 136 篇 生物工程
    • 92 篇 网络空间安全
    • 77 篇 电子科学与技术(可...
    • 75 篇 生物医学工程(可授...
    • 69 篇 安全科学与工程
    • 44 篇 机械工程
    • 43 篇 仪器科学与技术
    • 41 篇 交通运输工程
    • 38 篇 光学工程
    • 37 篇 动力工程及工程热...
  • 436 篇 理学
    • 215 篇 数学
    • 144 篇 生物学
    • 85 篇 物理学
    • 66 篇 统计学(可授理学、...
    • 63 篇 系统科学
  • 321 篇 管理学
    • 212 篇 管理科学与工程(可...
    • 127 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 112 篇 法学
    • 72 篇 社会学
    • 41 篇 法学
  • 93 篇 医学
    • 71 篇 基础医学(可授医学...
    • 71 篇 临床医学
    • 52 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 48 篇 经济学
    • 48 篇 应用经济学
  • 20 篇 农学
  • 12 篇 教育学
  • 9 篇 军事学
  • 8 篇 文学
  • 4 篇 艺术学
  • 1 篇 历史学

主题

  • 109 篇 accuracy
  • 82 篇 deep learning
  • 73 篇 internet of thin...
  • 71 篇 machine learning
  • 67 篇 training
  • 65 篇 real-time system...
  • 61 篇 feature extracti...
  • 61 篇 security
  • 48 篇 computational mo...
  • 45 篇 predictive model...
  • 43 篇 support vector m...
  • 43 篇 blockchain
  • 38 篇 artificial intel...
  • 38 篇 privacy
  • 37 篇 convolutional ne...
  • 34 篇 reliability
  • 34 篇 data models
  • 32 篇 authentication
  • 32 篇 cloud computing
  • 31 篇 machine learning...

机构

  • 80 篇 school of cyber ...
  • 56 篇 institute of inf...
  • 39 篇 department of co...
  • 23 篇 college of cyber...
  • 23 篇 college of compu...
  • 17 篇 state key labora...
  • 16 篇 department of cy...
  • 16 篇 key laboratory o...
  • 16 篇 cyber security s...
  • 16 篇 center for cyber...
  • 15 篇 engineering rese...
  • 14 篇 zarqa university...
  • 13 篇 department of cy...
  • 13 篇 center for cyber...
  • 13 篇 school of cyber ...
  • 12 篇 school of comput...
  • 11 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 10 篇 school of cyber ...
  • 10 篇 department of co...

作者

  • 44 篇 choo kim-kwang r...
  • 24 篇 kim-kwang raymon...
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 18 篇 mohammad kamrul ...
  • 16 篇 guo yuanxiong
  • 16 篇 zhou pan
  • 16 篇 hasan mohammad k...
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 gong yanmin
  • 14 篇 yu philip s.
  • 12 篇 peng hao
  • 12 篇 dehghantanha ali
  • 12 篇 gupta brij b.
  • 11 篇 xu li
  • 11 篇 gan wensheng
  • 10 篇 ibrahem mohamed ...
  • 10 篇 cao xiaochun
  • 10 篇 javed abdul rehm...

语言

  • 1,619 篇 英文
  • 180 篇 其他
  • 6 篇 中文
检索条件"机构=Department of Computer Engineering and Cyber Security"
1803 条 记 录,以下是91-100 订阅
排序:
GAN-Based Anomaly Intrusion Detection for Industrial Controller System  1
收藏 引用
World Conference on Information Systems for Business Management, ISBM 2023
作者: Riya V. Raj Sangeetha, V. Amritha, P.P. TIFAC-CORE in Cyber Security Amrita School of Engineering Coimbatore Amrita Vishwa Vidyapeetham Coimbatore India Department of Computer Science and Information Systems BITS Pilani Pilani India
Industrial controller system (ICS) is becoming more and more important in daily lives. In recent years, ICS has become more frequent targets of cyberattacks. In addition to the system, the environment is also signific... 详细信息
来源: 评论
CNN-BO-LSTM: an ensemble framework for prognosis of liver cancer
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第2期17卷 1103-1109页
作者: K N, Sunil Kumar Kashyap, Pavan P. Bhyratae, Darshan A. Bhyratae, Suhas A. Kalaivani, A. Department of ISE Sri Venkateshwara College of Engineering Bangalore India Department of Electronics & amp Communication Engineering Sri Venkateshwara College of Engineering Bangalore India Computer Science and Engineering Sahyadri College of Engineering and Management Mangaluru India Department of MCA New Horizon College of Engineering Marathahalli Bangalore India Department of CSE-Cyber Security Sri Venkateshwara College of Engineering Bangalore India
computer-assisted diagnosis (CAD) is preferred for cancer identification across the globe, which relies on computerized image processing. The creation of previous CAD instruments involved a semi-automated approach tha... 详细信息
来源: 评论
Blockchain-Based Cognitive Computing Model for Data security on a Cloud Platform
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3305-3323页
作者: Xiangmin Guo Guangjun Liang Jiayin Liu Xianyi Chen Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjing210031China Jiangsu Electronic Data Forensics and Analysis Engineering Research Center Jiangsu Police InstituteNanjing210031China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China
Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and ***,information shoplifting poses significant threats,potentially leading to poor perf... 详细信息
来源: 评论
security and Privacy Preservation for Future Vehicular Transportation Systems: A Survey  12
Security and Privacy Preservation for Future Vehicular Trans...
收藏 引用
12th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2023
作者: Almarshoodi, Abdulazeiz Keenan, James Campbell, Ivan Hassan, Tashfin Ibrahem, Mohamed I. Fouda, Mostafa M. George Mason University Department of Cyber Security Engineering FairfaxVA United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States
Electric Vehicles (EVs) with numerous optimized features are becoming more popular in today's world of vehicle technology. This is especially in these days when climate change is becoming more of a concern, and th... 详细信息
来源: 评论
Intermittent Fault Diagnosis of Split-Star Networks and its Applications
收藏 引用
IEEE Transactions on Parallel and Distributed Systems 2023年 第4期34卷 1253-1264页
作者: Song, Jiankang Lin, Limei Huang, Yanze Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou Fujian350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou Fujian350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid increase of the number of processors in multiprocessor systems and the fast expansion of interconnection networks, the reliability of interconnection network is facing severe challenges, where the fast ... 详细信息
来源: 评论
Design and Implementation of Side Channel Attack Based on Deep Learning LSTM
Design and Implementation of Side Channel Attack Based on De...
收藏 引用
2023 IEEE Region 10 Symposium, TENSYMP 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Center for Cyber Security Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq
Encryption algorithms and encryption devices both play a key role in ensuring the safety of data that has been encrypted. Various types of attacks, such as energy analysis, can be used to assess the reliability of the... 详细信息
来源: 评论
Breast Cancer Detection using Domain-Adversarial Training (DANN) with Invariant Risk Minimization (IRM) Hybrid Approach  3
Breast Cancer Detection using Domain-Adversarial Training (D...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Akash, K.V. Daniel, Esther Seetha, S. Durga, S. Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Cmr Institute of Technology Department of Information Science & Engineering India Amrita Vishwa Vidyapeetham Tifac Core in Cyber Security Amrita School of Engineering India
The breast cancer detection performs a key function in the health care network. The precise and early detection of cancer in the breast could aid to save life of the sufferer. The traditional machine learning methods ... 详细信息
来源: 评论
Blockchain Based security Enabled Smart Contract for Energy Management  16
Blockchain Based Security Enabled Smart Contract for Energy ...
收藏 引用
16th International Conference on security of Information and Networks, SIN 2023
作者: Sharma, Aditi Patel, Mukta Choudhary, Arjun Kumar, Gajender Department of Computer Science and Engineering Maharashtra Pune India Parul Institute of Technology Parul University Department of Computer Science and Engineering Gujarat Vadodara India Sardar Patel University of Police Center for Cyber Security Security and Criminal Justice Jodhpur India Srm University Department of Computer Science and Engineering Delhi-NCR Campus India
Energy consumption is highly demanded area for major security concerns due to the high eye from attackers. In 2020, the 'Recorded future' released report for massive power outage in India[1]. With the increasi... 详细信息
来源: 评论
A Review Paper on Designing Intelligent Intrusion Detection System Using Deep Learning  11
A Review Paper on Designing Intelligent Intrusion Detection ...
收藏 引用
11th International Conference on Emerging Trends in engineering and Technology - Signal and Information Processing, ICETET - SIP 2023
作者: Wasnik, Priyanka Chavhan, Nekita G H Raisoni College of Engineering Department of Computer Science and Engineering Nagpur India G H Raisoni College of Engineering IoT and Cyber Security Department of Data Science Nagpur India
Machine learning techniques have been have proven to be more effective than conventional extensively used in the creation of intrusion detection systems (IDS) that can swiftly and automatically identify and classify c... 详细信息
来源: 评论
Designing Intelligent Intrusion Detection System Using Deep Learning  14
Designing Intelligent Intrusion Detection System Using Deep ...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Wasnik, Priyanka Chavhan, Nekita G H Raisoni College of Engineering Department of Computer Science and Engineering Nagpur India G H Raisoni College of Engineering Department of Data Science IoT and Cyber Security Nagpur India
In order to increase the effectiveness and precision of cyber threat detection in computer networks, deep learning techniques are being applied in the construction of intelligent intrusion detection systems (IDS). The... 详细信息
来源: 评论