咨询与建议

限定检索结果

文献类型

  • 1,198 篇 会议
  • 593 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 1,811 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,068 篇 工学
    • 899 篇 计算机科学与技术...
    • 754 篇 软件工程
    • 310 篇 信息与通信工程
    • 195 篇 控制科学与工程
    • 148 篇 电气工程
    • 136 篇 生物工程
    • 93 篇 网络空间安全
    • 80 篇 电子科学与技术(可...
    • 77 篇 生物医学工程(可授...
    • 72 篇 安全科学与工程
    • 46 篇 机械工程
    • 46 篇 仪器科学与技术
    • 44 篇 交通运输工程
    • 38 篇 光学工程
    • 38 篇 动力工程及工程热...
  • 439 篇 理学
    • 213 篇 数学
    • 144 篇 生物学
    • 86 篇 物理学
    • 64 篇 系统科学
    • 64 篇 统计学(可授理学、...
    • 40 篇 化学
  • 325 篇 管理学
    • 216 篇 管理科学与工程(可...
    • 126 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 111 篇 法学
    • 72 篇 社会学
    • 40 篇 法学
  • 91 篇 医学
    • 69 篇 基础医学(可授医学...
    • 68 篇 临床医学
    • 50 篇 公共卫生与预防医...
  • 48 篇 经济学
    • 48 篇 应用经济学
  • 20 篇 农学
  • 12 篇 教育学
  • 9 篇 军事学
  • 8 篇 文学
  • 4 篇 艺术学
  • 1 篇 历史学

主题

  • 110 篇 accuracy
  • 85 篇 deep learning
  • 73 篇 internet of thin...
  • 71 篇 machine learning
  • 67 篇 training
  • 65 篇 real-time system...
  • 61 篇 feature extracti...
  • 61 篇 security
  • 48 篇 computational mo...
  • 45 篇 predictive model...
  • 43 篇 support vector m...
  • 43 篇 blockchain
  • 38 篇 artificial intel...
  • 38 篇 privacy
  • 38 篇 convolutional ne...
  • 34 篇 data models
  • 33 篇 reliability
  • 32 篇 authentication
  • 32 篇 cloud computing
  • 32 篇 machine learning...

机构

  • 80 篇 school of cyber ...
  • 56 篇 institute of inf...
  • 40 篇 department of co...
  • 23 篇 college of cyber...
  • 23 篇 college of compu...
  • 17 篇 state key labora...
  • 16 篇 department of cy...
  • 16 篇 cyber security s...
  • 16 篇 center for cyber...
  • 15 篇 key laboratory o...
  • 15 篇 engineering rese...
  • 14 篇 zarqa university...
  • 13 篇 department of cy...
  • 13 篇 center for cyber...
  • 13 篇 school of cyber ...
  • 12 篇 school of comput...
  • 11 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 10 篇 school of cyber ...
  • 10 篇 department of co...

作者

  • 44 篇 choo kim-kwang r...
  • 24 篇 kim-kwang raymon...
  • 21 篇 taher m. ghazal
  • 19 篇 mohammad kamrul ...
  • 18 篇 ghazal taher m.
  • 16 篇 guo yuanxiong
  • 16 篇 zhou pan
  • 16 篇 hasan mohammad k...
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 gong yanmin
  • 14 篇 yu philip s.
  • 12 篇 peng hao
  • 12 篇 dehghantanha ali
  • 12 篇 gupta brij b.
  • 11 篇 gan wensheng
  • 10 篇 ibrahem mohamed ...
  • 10 篇 xu li
  • 10 篇 cao xiaochun
  • 10 篇 javed abdul rehm...

语言

  • 1,626 篇 英文
  • 181 篇 其他
  • 6 篇 中文
检索条件"机构=Department of Computer Engineering and Cyber Security"
1811 条 记 录,以下是61-70 订阅
排序:
A Novel Deep Learning Framework for Contraband Items Recognition in Smart City Applications  2nd
A Novel Deep Learning Framework for Contraband Items Recogni...
收藏 引用
2nd International Conference on Sustainability: Developments and Innovations, ICSDI 2024
作者: Khalid, Shehzad Ahmed, Zubair Noor, Ayesha Sedik, Ahmed Asif, Waqar Department of Computer Engineering Bahria University Islamabad Pakistan Smart Systems Engineering Laboratory College of Engineering Prince Sultan University Riyadh Saudi Arabia Computer Science and Cyber Security University of West London London United Kingdom
Ensuring safety and security is paramount in today’s complex environment, and the effective detection of contraband items plays a pivotal role in achieving this objective. Contraband items, ranging from illegal subst... 详细信息
来源: 评论
LEGF-DST:LLMs-Enhanced Graph-Fusion Dual-Stream Transformer for Fine-Grained Chinese Malicious SMS Detection
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1901-1924页
作者: Xin Tong Jingya Wang Ying Yang Tian Peng Hanming Zhai Guangming Ling School of Information and Cybersecurity People’s Public Security University of ChinaBeijing100038China Cyber Investigation Technology Research and Development Center The Third Research Institute of the Ministry of Public SecurityShanghai201204China Department of Cybersecurity Defense Beijing Police CollegeBeijing102202China School of Computer Science Henan Institute of EngineeringZhengzhou451191China
With the widespread use of SMS(Short Message Service),the proliferation of malicious SMS has emerged as a pressing societal *** deep learning-based text classifiers offer promise,they often exhibit suboptimal performa... 详细信息
来源: 评论
A Literature Review on Predictive Classification of Major Depressive Disorder Using Advanced Data Analytics Techniques  5th
A Literature Review on Predictive Classification of Major De...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Mahender, Udutala Arivalagan, S. Sathiyasuntharam, V. Sudhakar, P. Annamalai University Tamilnadu Chidambaram India Department of Computer Science and Technology Annamalai University Tamilnadu Chidambaram India Department of Cyber Security CMR Engineering College Hyderabad India Department of Computer Science and Engineering Annamalai University Tamilnadu Chidambaram India
Major Depressive Disorder (MDD) is a significant global mental health concern predicted to become the leading mental health condition by 2030. It is characterised by persistent sadness, hopelessness, and a lack of int... 详细信息
来源: 评论
Strategies for Building and Maintaining Secure Web Applications  5
Strategies for Building and Maintaining Secure Web Applicati...
收藏 引用
5th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2024
作者: Sathiyapriyan, C. Manikandan, B. Gokul, S. Satheesh, Rewin Nivetha, S. Leelavathy, S. Aarupadai Veedu Institute of Technology Cyber Security Department of Computer Science and Engineering Chennai603104 India Aarupadai Veedu Institute of Technology Department of Computer Science and Engineering Chennai603104 India Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai600119 India
Ensuring the security of web applications is paramount in safeguarding sensitive data and maintaining user trust. This study presents a comprehensive overview of strategies for building and maintaining secure web appl... 详细信息
来源: 评论
A Review of Key Elements for Underwater Wireless Sensor Networks
A Review of Key Elements for Underwater Wireless Sensor Netw...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Al-Dulaimi, Aymen Mohammed Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Aliesawi, Salah A. Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq
Underwater Wireless Sensor Networks (UWSNs) are emerging and have huge prospects since they have various applications in oceanography, environmental monitoring, and underwater communication. These networks contain low... 详细信息
来源: 评论
Efficient UAV Routing Strategies for Wireless Sensor Network Data Retrieval
Efficient UAV Routing Strategies for Wireless Sensor Network...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Al-Sharhanee, Kareem Ali Malalah Najim, Ali Hamza Alheeti, Khattab M. Ali Satar, Nurhizam Safie Mohd Hashim, Aisha Hassan Abdallah Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad10011 Iraq Department of Computer Technical Al-Diwaniyah Iraq College of Computer and Information Technology University of Anbar Computer Networking Systems Department Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
WSNs are applied in many disciplines where certain conditions require the ability to adapt to network sink mobility and changes in the dynamics of the area coverage. To meet these needs, it is necessary to develop int... 详细信息
来源: 评论
Literature Review on Packet Sniffing: Essential for cybersecurity & Network security  5
Literature Review on Packet Sniffing: Essential for Cybersec...
收藏 引用
5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Shaw, Ranju Parveen, Suraiya Jamia Hamdard University Dept. of Computer Science Engineering with Specialization in Cyber Forensic Information Security Delhi India Faculty at Jamia Hamdard University Sest Department of Computer Science Engineering Delhi India
In the realm of cybersecurity and network security, the significance of monitoring and analyzing network traffic cannot be overstated Network packet sniffing, a technique employed to capture and inspect data packets t... 详细信息
来源: 评论
Combating Terrorism: Detecting and Analyzing Extremist Content on X (Formerly Twitter)  3
Combating Terrorism: Detecting and Analyzing Extremist Conte...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Mwendwa, Gideon Chouhan, Lokesh Etyang, Felix Mandela, Ngaira Gift, Uwineza School of Cyber Security and Digital Forensics National Forensic Sciences University Goa India Cochin University of Science and Technology School of Engineering Department of Computer Science Cochin India School of Cyber Security and Digital Forensics National Forensic Sciences University Gandhinagar India School of Cyber Security and Digital Forensics National Forensic Sciences University Jinja Uganda
This study investigates the efficacy of machine learning algorithms in detecting and evaluating extremist content on social media platforms, and we employ X, formerly known as Twitter. We therefore utilize Kaggle'... 详细信息
来源: 评论
Enhancing Computational Model for Human Motion Recognition Using Deep Learning
Enhancing Computational Model for Human Motion Recognition U...
收藏 引用
2024 IEEE International Conference on Intelligent Signal Processing and Effective Communication Technologies, INSPECT 2024
作者: Yadav, Ram Kumar Daniel, A. Kumar, Birendra Sakhare, Apeksha Moriwal, Rahul Pawar, Raju Amity university Gwalior Department of Computer Science and Engineering Gwalior India G H Raisoni college of engineering Department of Data Science Internet of Things and Cyber Security Nagpur India G H Raisoni college of engineering Department of Computer Science and Engineering Nagpur India
Human motion recognition (HMR) is a fundamental task in computer vision with applications in healthcare, surveillance, human-computer interaction, and intelligent environments. This paper proposes a better-performing ... 详细信息
来源: 评论
Multi-Layer Perceptrons and Convolutional Neural Networks Based Side-Channel Attacks on AES Encryption
Multi-Layer Perceptrons and Convolutional Neural Networks Ba...
收藏 引用
2023 International Conference on engineering Technology and Technopreneurship, ICE2T 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Center for Cyber Security Faculty of Information Science and Technology Bangi 43600 Malaysia Department of Computer Techniques Engineering Baghdad Iraq
Side - channel attacks (SCA) exploit vulnerabilities introduced by insecure implementations in order to get information about the data that is being processed or the data itself via device leakages. The majority of mo... 详细信息
来源: 评论