咨询与建议

限定检索结果

文献类型

  • 1,176 篇 会议
  • 582 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 1,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,036 篇 工学
    • 875 篇 计算机科学与技术...
    • 742 篇 软件工程
    • 301 篇 信息与通信工程
    • 187 篇 控制科学与工程
    • 141 篇 电气工程
    • 136 篇 生物工程
    • 88 篇 网络空间安全
    • 76 篇 电子科学与技术(可...
    • 76 篇 生物医学工程(可授...
    • 67 篇 安全科学与工程
    • 43 篇 仪器科学与技术
    • 42 篇 机械工程
    • 39 篇 交通运输工程
    • 36 篇 光学工程
  • 434 篇 理学
    • 212 篇 数学
    • 144 篇 生物学
    • 85 篇 物理学
    • 64 篇 系统科学
    • 64 篇 统计学(可授理学、...
    • 36 篇 化学
  • 314 篇 管理学
    • 208 篇 管理科学与工程(可...
    • 124 篇 图书情报与档案管...
    • 108 篇 工商管理
  • 111 篇 法学
    • 72 篇 社会学
    • 40 篇 法学
  • 90 篇 医学
    • 68 篇 基础医学(可授医学...
    • 68 篇 临床医学
    • 49 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 48 篇 经济学
    • 48 篇 应用经济学
  • 20 篇 农学
  • 12 篇 教育学
  • 9 篇 军事学
  • 8 篇 文学
  • 4 篇 艺术学
  • 1 篇 历史学

主题

  • 110 篇 accuracy
  • 82 篇 deep learning
  • 73 篇 internet of thin...
  • 71 篇 machine learning
  • 67 篇 training
  • 64 篇 real-time system...
  • 61 篇 feature extracti...
  • 59 篇 security
  • 47 篇 computational mo...
  • 45 篇 predictive model...
  • 43 篇 support vector m...
  • 43 篇 blockchain
  • 38 篇 artificial intel...
  • 38 篇 convolutional ne...
  • 36 篇 privacy
  • 34 篇 data models
  • 33 篇 reliability
  • 32 篇 authentication
  • 32 篇 cloud computing
  • 31 篇 machine learning...

机构

  • 77 篇 school of cyber ...
  • 54 篇 institute of inf...
  • 36 篇 department of co...
  • 23 篇 college of compu...
  • 21 篇 college of cyber...
  • 17 篇 state key labora...
  • 16 篇 department of cy...
  • 16 篇 cyber security s...
  • 15 篇 key laboratory o...
  • 15 篇 center for cyber...
  • 14 篇 zarqa university...
  • 13 篇 department of cy...
  • 13 篇 center for cyber...
  • 13 篇 school of cyber ...
  • 12 篇 school of comput...
  • 12 篇 engineering rese...
  • 11 篇 key laboratory o...
  • 10 篇 school of cyber ...
  • 10 篇 department of co...
  • 10 篇 department of co...

作者

  • 43 篇 choo kim-kwang r...
  • 24 篇 kim-kwang raymon...
  • 21 篇 taher m. ghazal
  • 19 篇 mohammad kamrul ...
  • 17 篇 ghazal taher m.
  • 16 篇 guo yuanxiong
  • 16 篇 zhou pan
  • 16 篇 amjed abbas ahme...
  • 15 篇 gong yanmin
  • 15 篇 ahmed amjed abba...
  • 14 篇 yu philip s.
  • 13 篇 hasan mohammad k...
  • 12 篇 peng hao
  • 12 篇 dehghantanha ali
  • 12 篇 gupta brij b.
  • 11 篇 gan wensheng
  • 10 篇 ibrahem mohamed ...
  • 10 篇 xu li
  • 10 篇 javed abdul rehm...
  • 9 篇 parizi reza m.

语言

  • 1,680 篇 英文
  • 94 篇 其他
  • 5 篇 中文
检索条件"机构=Department of Computer Engineering and Cyber Security"
1778 条 记 录,以下是41-50 订阅
排序:
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph Networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
Smart Water-Powered Renewable Energy System with IoT Integration
Smart Water-Powered Renewable Energy System with IoT Integra...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Ibraheem, Ahmed Salman Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq Department of Computer Technical Engineering Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
An advanced hybrid renewable energy collecting and storage system prototype that utilizes water flow as its primary power source. Additionally, the system incorporates an energy monitoring system based on the Internet... 详细信息
来源: 评论
Improving VANET Localization Performance with Data Verification: Challenges and Solutions
Improving VANET Localization Performance with Data Verificat...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Kadhim, Aqeel Kamil Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisa Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
In VANETs, the important and effective applications of vehicle localization include safety and communication applications. Thus, it is difficult to get very accurate localization in the dynamic and often very fluctuat... 详细信息
来源: 评论
A Survey of Machine Learning Applications in Medical Imaging for Neurodegenerative Disease Diagnosis  2
A Survey of Machine Learning Applications in Medical Imaging...
收藏 引用
2nd International Conference on computer Vision and Internet of Things, ICCVIoT 2024
作者: Nandhashree, K.R. Senthil Kumar, M. Susee, S.K. Department of Cyber Security SRM Valliammai Engineering College India Department of Computer Science and Engineering SRM Valliammai Engineering College India Department of Electronics and Communication Mohamed Sathak A J College of Engineering India
The increasing prevalence of brain degenerative disorders particularly Alzheimer's and Parkinson's, have incurred a dire need for effective diagnostic methodologies. With advancements in medical imaging techni... 详细信息
来源: 评论
Implementing Three Factors Authentication System (3FA) to Maintain Employee Attendance Record to Enhance security  3
Implementing Three Factors Authentication System (3FA) to Ma...
收藏 引用
3rd IEEE International Conference on Intelligent Technologies, CONIT 2023
作者: Johnson, Plezzant Columbus Kant, Shri Kumar, Sandeep Sharda University Department of Computer Science Engineering India Sharda University Center for Cyber Security and Cryptology India
Today as we all know that maintaining of employee credential have been some major issues around the world. Finding it more difficult to keep track of employees. With this, the company, institution, or government entit... 详细信息
来源: 评论
Demand Response in Smart Grids: Challenges, Solutions, and security Implications  2
Demand Response in Smart Grids: Challenges, Solutions, and S...
收藏 引用
2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Abdelraouf, Hussien Gogolkiewicz, Ryker Kim, Nathaniel McCaughan, Nicholas Alanes, Joel Nadhaif, Ali Fouda, Mostafa M. Ibrahem, Mohamed I. Augusta University School of Computer and Cyber Sciences AugustaGA30912 United States George Mason University Cyber Security Engineering Department FairfaxVA United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States
This paper discusses demand response (DR) in the context of smart grids (SGs). DR is a method of controlling electricity consumption and production, usually for financial and security reasons. The topics covered inclu... 详细信息
来源: 评论
Privacy Preservation Techniques in Smart Grids: Balancing security and Utility in IoT-Driven Environments  2
Privacy Preservation Techniques in Smart Grids: Balancing Se...
收藏 引用
2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Abdelraouf, Hussien Long, Michael Tran, Paul Baral, Luna Khan, Zuha Mahmoud, Mohamed Fouda, Mostafa M. Ibrahem, Mohamed I. Augusta University School of Computer and Cyber Sciences AugustaGA30912 United States George Mason University Cyber Security Engineering Department FairfaxVA United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States
The Internet of Things (IoT) has significantly impacted the energy industry, leading to increased reliance on smart grid (SG) technology. However, integrating electricity with the internet introduces security vulnerab... 详细信息
来源: 评论
Novel method for ranking batsmen in Indian Premier League
收藏 引用
Data Science and Management 2023年 第3期6卷 158-173页
作者: M.K.Manju Abin Oommen Philip Department of Computer Science&Engineering Toch Institute of Science&TechnologyErnakulamKerala682313India Department of CSE-Cyber Security Indian Institute of Information TechnologyKottayam686635India
Sports analytics have benefited immensely from the growth and popularity of artificial intelligence and machine *** techniques enable sports analysts to evaluate player performance more effectively.A literature review... 详细信息
来源: 评论
Survey on digital twins for Internet of Vehicles:Fundamentals,challenges,and opportunities
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 237-247页
作者: Jiajie Guo Muhammad Bilal Yuying Qiu Cheng Qian Xiaolong Xu Kim-Kwang Raymond Choo School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Engineering Hankuk University of Foreign StudiesGyeonggi-do17035South Korea Jiangsu Hydraulic Research Institute Nanjing210044China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly *** have been attem... 详细信息
来源: 评论