咨询与建议

限定检索结果

文献类型

  • 475 篇 会议
  • 263 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 745 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 459 篇 工学
    • 361 篇 计算机科学与技术...
    • 300 篇 软件工程
    • 128 篇 信息与通信工程
    • 110 篇 控制科学与工程
    • 65 篇 电气工程
    • 54 篇 网络空间安全
    • 49 篇 电子科学与技术(可...
    • 46 篇 生物工程
    • 38 篇 生物医学工程(可授...
    • 32 篇 安全科学与工程
    • 26 篇 机械工程
    • 25 篇 交通运输工程
    • 22 篇 光学工程
    • 21 篇 仪器科学与技术
    • 21 篇 动力工程及工程热...
  • 212 篇 理学
    • 105 篇 数学
    • 50 篇 生物学
    • 47 篇 物理学
    • 43 篇 统计学(可授理学、...
    • 33 篇 系统科学
    • 18 篇 化学
  • 143 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 57 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 47 篇 医学
    • 38 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 28 篇 公共卫生与预防医...
  • 46 篇 法学
    • 27 篇 社会学
    • 22 篇 法学
  • 20 篇 经济学
    • 19 篇 应用经济学
  • 7 篇 农学
  • 5 篇 教育学
  • 4 篇 文学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 38 篇 deep learning
  • 38 篇 accuracy
  • 33 篇 internet of thin...
  • 33 篇 machine learning
  • 23 篇 feature extracti...
  • 23 篇 convolutional ne...
  • 20 篇 computational mo...
  • 20 篇 real-time system...
  • 20 篇 security
  • 19 篇 cybersecurity
  • 19 篇 artificial intel...
  • 17 篇 training
  • 15 篇 reliability
  • 15 篇 authentication
  • 15 篇 predictive model...
  • 14 篇 support vector m...
  • 13 篇 cloud computing
  • 13 篇 data models
  • 12 篇 malware
  • 12 篇 software

机构

  • 15 篇 department of el...
  • 15 篇 department of co...
  • 14 篇 university of bu...
  • 14 篇 zarqa university...
  • 11 篇 department of cy...
  • 11 篇 zarqa university...
  • 9 篇 computer technic...
  • 8 篇 department of cy...
  • 8 篇 the islamic univ...
  • 8 篇 department of co...
  • 7 篇 department of cy...
  • 7 篇 school of cybers...
  • 7 篇 medical instrume...
  • 7 篇 medical instrume...
  • 7 篇 center for artif...
  • 6 篇 department of co...
  • 6 篇 cybersecurity ce...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 cybersecurity la...

作者

  • 15 篇 ghassan samara
  • 15 篇 samara ghassan
  • 12 篇 domingo-ferrer j...
  • 10 篇 ali elrashidi
  • 10 篇 danda b. rawat
  • 10 篇 elrashidi ali
  • 9 篇 sánchez david
  • 8 篇 mohammad shahada...
  • 8 篇 afaneh suha
  • 8 篇 tanjim mahmud
  • 8 篇 aljaidi mohammad
  • 8 篇 bashar mustafa
  • 8 篇 galeb basim
  • 8 篇 mohammad aljaidi
  • 8 篇 lerga jonatan
  • 8 篇 suha afaneh
  • 7 篇 karl andersson
  • 7 篇 obaidat mohammad...
  • 7 篇 al-hilali aqeel ...
  • 6 篇 mohammad rasmi a...

语言

  • 609 篇 英文
  • 133 篇 其他
  • 2 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Engineering and Cybersecurity"
745 条 记 录,以下是11-20 订阅
排序:
Enhanced Convolutional Neural Network for Sign Character Recognition with Mixed Pooling and Mish Activation Function
Enhanced Convolutional Neural Network for Sign Character Rec...
收藏 引用
2024 IEEE International Conference on Intelligent Systems and Advanced Applications, ICISAA 2024
作者: Sur, Hritajit Mandal, Gourab Das, Koushik Nandia, Apurba Das, Avik Kumar Ghosh, Arijeet Institute of Engineering and Management University of Engineering and Management Cybersecurity & Blockchain Technology Department of Computer Science Engineering Kolkata India
Communication is an essential part of our daily lives, especially for deaf and dumb people who face difficulty in communicating with others. This paper introduces a method of using sign languages, i.e., to convert var... 详细信息
来源: 评论
Spark workflow task scheduling with deadline and privacy constraints in hybrid cloud networks
收藏 引用
Soft Computing 2025年 第2期29卷 783-801页
作者: Rajput, Kamran Yaseen Xiaoping, Li Lakhan, Abdullah School of Computer Science and Engineering Southeast University Nanjing China School of Economics Innovations and Technology Kristiania University College Oslo Norway Department of Cybersecurity Dawood University of Engineering and Technology Karachi Pakistan
The increasing adoption of hybrid clouds in organizations stems from their ability to bolster private cloud resources with additional public cloud capacity when required. However, scheduling distributed applications, ... 详细信息
来源: 评论
Redundant Transmission Control Algorithm for Information-Centric Vehicular IoT Networks
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 2217-2234页
作者: Abdur Rashid Sangi Satish Anamalamudi Mohammed SAlkatheiri Murali Krishna Enduri Anil Carie Mohammed AAlqarni Department of Computer Science College of Science and TechnologyWenzhou-Kean UniversityWenzhou325060China Department of Computer Science Engineering SRM University APAmaravati522502India Department of Cybersecurity College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia
Vehicular Adhoc Networks(VANETs)enable vehicles to act as mobile nodes that can fetch,share,and disseminate information about vehicle safety,emergency events,warning messages,and passenger ***,the continuous dissemina... 详细信息
来源: 评论
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1901-1918页
作者: Ahmad O.Aseeri Sajjad Hussain Chauhdary Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science Texas Tech UniversityLubbockUSA
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** ... 详细信息
来源: 评论
Analyzing and Responding to the Spread of COVID-19  4
Analyzing and Responding to the Spread of COVID-19
收藏 引用
4th IEEE International Conference on Smart Information Systems and Technologies, SIST 2024
作者: Meiramkhanov, Temirlan Bogdan, Savitskiy Yerbol, Irgaliyev Department of Intelligence Systems and Cybersecurity Astana IT University Astana Kazakhstan Department of Computer Engineering Astana IT University Astana Kazakhstan
Our study delves into the intricate relationship between socio-economic factors and the outcomes of the COVID-19 pandemic. Through comprehensive data analysis and visualization techniques, we scrutinize the disparitie... 详细信息
来源: 评论
Modeling Hybrid Feature-Based Phishing Websites Detection Using Machine Learning Techniques
收藏 引用
Annals of Data Science 2024年 第1期11卷 217-242页
作者: Das Guptta, Sumitra Shahriar, Khandaker Tayef Alqahtani, Hamed Alsalman, Dheyaaldin Sarker, Iqbal H. Department of Computer Science and Engineering Chittagong University of Engineering & ampTechnology Chittagong4349 Bangladesh Unit of Cybersecurity Department of Computer Science Center of Artificial Intelligence King Khalid University Abha Saudi Arabia School of Engineering Computing and Informatics Dar Al-Hekma University Jeddah Saudi Arabia
In this paper, we mainly present a machine learning based approach to detect real-time phishing websites by taking into account URL and hyperlink based hybrid features to achieve high accuracy without relying on any t... 详细信息
来源: 评论
Topological Evaluation of Certain computer Networks by Contraharmonic-Quadratic Indices
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3795-3810页
作者: Ahmed M.Alghamdi Khalid Hamid Muhammad Waseem Iqbal M.Usman Ashraf Abdullah Alshahrani Adel Alshamrani Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and Engineering at University of JeddahJeddah21493Saudi Arabia
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of P... 详细信息
来源: 评论
Privacy practices of popular websites in Saudi Arabia
收藏 引用
Journal of Umm Al-Qura University for engineering and Architecture 2025年 第1期16卷 19-29页
作者: Alhazmi, Ahmed Daghistani, Anas Department of Cybersecurity Umm Al-Qura University Makkah Saudi Arabia Department of Computer and Network Engineering Umm Al-Qura University Makkah Saudi Arabia
Preserving users’ privacy while exploring the Internet is a continuous challenge. Regulations such as GDPR, CCPA, and PDPL have been introduced to counter privacy-invasive trends. This paper introduces a framework fo... 详细信息
来源: 评论
Predicting Student Behavior Using a Neutrosophic Deep Learning Model
收藏 引用
Neutrosophic Sets and Systems 2025年 76卷 288-310页
作者: Shitaya, Ahmed Mohamed Wahed, Mohamed El Syed Abd El Khalek, Saied Helemy Ismail, Amr Shams, Mahmoud Y. Salama, A.A. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Computer Science Faculty of computer and information sciences Suez Canal University Egypt Department. of Communication and Computer Engineering Air Defense University Egypt Department of Cybersecurity College of Engineering and Information Technology Buraydah Private Colleges Buraydah51418 Saudi Arabia Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt
We developed an information system using an object-oriented programming language and a distributed database (DDB) consisting of multiple interconnected databases across a computer network, managed by a distributed dat... 详细信息
来源: 评论
Leveraging power consumption for anomaly detection on IoT devices in smart homes
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第10期14卷 14045-14056页
作者: Nimmy, K. Dilraj, M. Sankaran, Sriram Achuthan, Krishnashree Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Amritapuri India Center for Cybersecurity Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri India
Anomaly detection in smart homes is paramount in the prevailing information age as smart devices remain susceptible to sophisticated cyber-attacks. Hackers exploit vulnerabilities such as weak passwords and insecure, ... 详细信息
来源: 评论