咨询与建议

限定检索结果

文献类型

  • 1,176 篇 会议
  • 587 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 1,783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,040 篇 工学
    • 877 篇 计算机科学与技术...
    • 743 篇 软件工程
    • 302 篇 信息与通信工程
    • 187 篇 控制科学与工程
    • 143 篇 电气工程
    • 136 篇 生物工程
    • 88 篇 网络空间安全
    • 76 篇 电子科学与技术(可...
    • 76 篇 生物医学工程(可授...
    • 68 篇 安全科学与工程
    • 43 篇 仪器科学与技术
    • 42 篇 机械工程
    • 39 篇 交通运输工程
    • 36 篇 光学工程
  • 434 篇 理学
    • 212 篇 数学
    • 144 篇 生物学
    • 85 篇 物理学
    • 64 篇 系统科学
    • 64 篇 统计学(可授理学、...
    • 36 篇 化学
  • 314 篇 管理学
    • 208 篇 管理科学与工程(可...
    • 124 篇 图书情报与档案管...
    • 108 篇 工商管理
  • 112 篇 法学
    • 72 篇 社会学
    • 41 篇 法学
  • 90 篇 医学
    • 68 篇 基础医学(可授医学...
    • 68 篇 临床医学
    • 49 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 48 篇 经济学
    • 48 篇 应用经济学
  • 20 篇 农学
  • 12 篇 教育学
  • 10 篇 军事学
  • 8 篇 文学
  • 4 篇 艺术学
  • 1 篇 历史学

主题

  • 109 篇 accuracy
  • 81 篇 deep learning
  • 73 篇 internet of thin...
  • 70 篇 machine learning
  • 66 篇 training
  • 64 篇 real-time system...
  • 61 篇 feature extracti...
  • 59 篇 security
  • 46 篇 computational mo...
  • 45 篇 predictive model...
  • 43 篇 support vector m...
  • 43 篇 blockchain
  • 39 篇 convolutional ne...
  • 38 篇 artificial intel...
  • 36 篇 privacy
  • 33 篇 reliability
  • 33 篇 data models
  • 32 篇 authentication
  • 32 篇 cloud computing
  • 31 篇 machine learning...

机构

  • 77 篇 school of cyber ...
  • 54 篇 institute of inf...
  • 36 篇 department of co...
  • 23 篇 college of compu...
  • 21 篇 college of cyber...
  • 17 篇 state key labora...
  • 16 篇 department of cy...
  • 16 篇 cyber security s...
  • 15 篇 key laboratory o...
  • 15 篇 center for cyber...
  • 14 篇 zarqa university...
  • 13 篇 department of cy...
  • 13 篇 center for cyber...
  • 13 篇 school of cyber ...
  • 12 篇 school of comput...
  • 12 篇 engineering rese...
  • 11 篇 key laboratory o...
  • 10 篇 school of cyber ...
  • 10 篇 department of co...
  • 10 篇 department of co...

作者

  • 43 篇 choo kim-kwang r...
  • 24 篇 kim-kwang raymon...
  • 21 篇 taher m. ghazal
  • 19 篇 mohammad kamrul ...
  • 17 篇 ghazal taher m.
  • 16 篇 guo yuanxiong
  • 16 篇 zhou pan
  • 16 篇 amjed abbas ahme...
  • 15 篇 gong yanmin
  • 15 篇 ahmed amjed abba...
  • 14 篇 hasan mohammad k...
  • 14 篇 yu philip s.
  • 12 篇 peng hao
  • 12 篇 dehghantanha ali
  • 12 篇 gupta brij b.
  • 11 篇 xu li
  • 11 篇 gan wensheng
  • 10 篇 ibrahem mohamed ...
  • 10 篇 javed abdul rehm...
  • 9 篇 parizi reza m.

语言

  • 1,683 篇 英文
  • 96 篇 其他
  • 5 篇 中文
检索条件"机构=Department of Computer Engineering and Cyber Security"
1783 条 记 录,以下是21-30 订阅
排序:
Identifying The Coconut Leaf Disease Using Deep Transfer Learning Approach  4
Identifying The Coconut Leaf Disease Using Deep Transfer Lea...
收藏 引用
4th IEEE International Conference on Smart Information Systems and Technologies, SIST 2024
作者: Tuhin, Hemayet Hossain Kayum, Md Abdul Rahmatul Kabir Rasel Sarker, Md. Tanvir Siddiquee, Shah Md Pandey, Bishwajeet Department of Computer Science and Engineering Daffodil International University Dhaka Bangladesh Department of Intelligent System and Cyber Security Astana IT University Kazakhstan
Coconut is one of the main economic crops in Bangladesh. It is a tree whose every part is useful in one way or another in public life. The leaves, flowers, fruits, stems, and roots of this tree are used as raw materia... 详细信息
来源: 评论
IDCE:Integrated Data Compression and Encryption for Enhanced security and Efficiency
收藏 引用
computer Modeling in engineering & Sciences 2025年 第4期143卷 1029-1048页
作者: Muhammad Usama Arshad Aziz Suliman A.Alsuhibany Imtiaz Hassan Farrukh Yuldashev Department of Cyber Security Pakistan Navy Engineering CollegeNational University of Sciences and TechnologyKarachi75350Pakistan Department of Computer Science Main CampusIqra UniversityKarachi75500Pakistan Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Informatics and Its Teaching Methods Tashkent State Pedagogical UniversityTashkent100170Uzbekistan
Data compression plays a vital role in datamanagement and information theory by reducing ***,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable t... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
Advancing Android Malware Detection with BioSentinel Neural Network using Hybrid Deep Learning Techniques  18
Advancing Android Malware Detection with BioSentinel Neural ...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Rani, D. Sandhya Gnaneshwar, K. Sampurnima Pattem, K. Sekhar, Soma Krishna, G. Bala Kakarla, Shirisha Cvr College of Engineering Department of Computer Science Engineering Rangareddy Ibrahimpatnam India Sreenidhi Institute of Science and Technology Department of Computer Science Engineering-Cyber Security Hyderabad India Vardhaman College of Engineering Department of Computer Science Engineering Hyderabad India
The paper introduces the BioSentinel Neural Network (BSNN), a novel hybrid deep learning model designed to enhance malware detection, particularly focusing on zero-day threats. The BSNN model integrates diverse neural... 详细信息
来源: 评论
Credit Card Fraud Detection Using ML Techniques  1
收藏 引用
International Conference on Recent Developments in cyber security, ReDCySec 2023
作者: Bonkoungou, Samiratou Roy, Nihar Ranjan Ako, Nomel Haymes Axel-Elie Junior Mishra, Alpna Department of Computer Science and Engineering Sharda University Noida India Center of Cyber Security and Cryptology Sharda University Noida India
With the increasing use of Internet, online banking transactions have also increased. Everyday more and more users are being added to the cyberspace, which has also attracted cybercriminals. These scammers use stolen ... 详细信息
来源: 评论
Secure Communication for MUM-T: A Blockchain and Lightweight Cryptography Framework  17
Secure Communication for MUM-T: A Blockchain and Lightweight...
收藏 引用
17th International Conference on security of Information and Networks, SIN 2024
作者: Yasar, Halimcan Bahtiyar, Serif Istanbul Technical University Cyber Security and Privacy Research Lab SPFLab Department of Computer Engineering Maslak Istanbul34469 Turkey
Manned-Unmanned Teaming (MUM-T) systems integrate manned aircraft and unmanned aerial vehicles (UAVs) to enhance mission effectiveness, allowing a single pilot to coordinate multiple UAVs for tasks like reconnaissance... 详细信息
来源: 评论
A Containerized IoT Simulation Environment for Network Warfare Training  17
A Containerized IoT Simulation Environment for Network Warfa...
收藏 引用
IEEE Congress on cybermatics: 17th IEEE International Conference on Internet of Things, iThings 2024, 20th IEEE International Conference on Green Computing and Communications, GreenCom 2024, 17th IEEE International Conference on cyber, Physical and Social Computing, CPSCom 2024, 10th IEEE International Conference on Smart Data, SmartData 2024
作者: Chen, Ruihao Lyu, Chengcheng Wang, Wenzhao Lin, Hui Lin, Qingxin Fujian Normal University College of Computer and Cyber Security Fuzhou China Fuzhou University Zhicheng College Department of Computer Engineering Fuzhou350002 China
Amidst the growing prevalence of Internet of Things (IoT) devices and the expanding risks to enterprise networks, there is a sustained increase in the demand for controlled penetration testing to delineate attack surf... 详细信息
来源: 评论
Enhancing the security of SDN in 5G: A Hybrid Feature Selection Based Ensemble Machine Learning Framework for Classification of cyber-Attacks
收藏 引用
SN computer Science 2025年 第3期6卷 1-16页
作者: Singh, Mahendra Pratap Haimashreelakshmi Singh, Virendra Pratap Gupta, Maanak Cyber Security Research Lab (CSRL) Department of Computer Science and Engineering National Institute of Technology Karnataka Surathkal Mangaluru 575025 India Department of Computer Science Tennessee Technological University Cookeville TN United States
In recent years, the adoption of 5G has significantly increased due to its numerous benefits, including high availability, lower latency, improved reliability, and high performance. To manage packet flow, 5G relies on... 详细信息
来源: 评论
Detecting anomalies in blockchain transactions using machine learning classifiers and explainability analysis
收藏 引用
Blockchain(Research and Applications) 2024年 第3期5卷 106-122页
作者: Mohammad Hasan Mohammad Shahriar Rahman Helge Janicke Iqbal H.Sarker Department of Computer Science and Engineering Premier University4000 ChitagongBangladesh Department of Computer Science and Engineering United International University1212 DhakaBangladesh Cyber Security Cooperative Research Centre 6027 PerthAustralia Centre for Securing Digital Futures Edith Cowan University6027 PerthAustralia
As the use of blockchain for digital payments continues to rise,it becomes susceptible to various malicious *** detecting anomalies within blockchain transactions is essential for bolstering trust in digital ***,the t... 详细信息
来源: 评论
Data Analytic for Healthcare cyber Physical System
收藏 引用
IEEE Transactions on Network Science and engineering 2023年 第5期10卷 2490-2502页
作者: Gan, Wensheng Hu, Kaixia Huang, Gengsen Chien, Wei-Che Chao, Han-Chieh Meng, Weizhi Jinan University College of Cyber Security Guangzhou510632 China Pazhou Lab Guangzhou510330 China National Dong Hwa University Department of Computer Science and Information Engineering Hualien97401 Taiwan National Dong Hwa University Department of Electrical Engineering Hualien97401 Taiwan UCSI University Institute of Computer Science and Innovation Kuala Lumpur Malaysia Department of Applied Mathematics and Computer Science Cyber Security Section Lyngby2800 Denmark
Nowadays, a large number of AI-powered healthcare cyber-physical systems (CPSs) have been used in healthcare services. In order to provide better care, AI-powered healthcare CPSs analyze the data they collect using a ... 详细信息
来源: 评论