咨询与建议

限定检索结果

文献类型

  • 1,834 篇 会议
  • 1,194 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 3,070 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,983 篇 工学
    • 1,549 篇 计算机科学与技术...
    • 1,242 篇 软件工程
    • 568 篇 信息与通信工程
    • 285 篇 控制科学与工程
    • 223 篇 电气工程
    • 195 篇 生物工程
    • 175 篇 电子科学与技术(可...
    • 164 篇 网络空间安全
    • 125 篇 生物医学工程(可授...
    • 111 篇 安全科学与工程
    • 110 篇 机械工程
    • 80 篇 仪器科学与技术
    • 75 篇 光学工程
    • 73 篇 动力工程及工程热...
    • 61 篇 交通运输工程
  • 801 篇 理学
    • 449 篇 数学
    • 211 篇 生物学
    • 159 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 58 篇 化学
  • 522 篇 管理学
    • 331 篇 管理科学与工程(可...
    • 209 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 138 篇 法学
    • 87 篇 社会学
  • 135 篇 医学
    • 111 篇 临床医学
    • 104 篇 基础医学(可授医学...
    • 59 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 58 篇 经济学
    • 57 篇 应用经济学
  • 29 篇 军事学
  • 28 篇 农学
  • 21 篇 文学
  • 19 篇 教育学
  • 10 篇 艺术学

主题

  • 102 篇 information secu...
  • 100 篇 authentication
  • 89 篇 security
  • 88 篇 internet of thin...
  • 88 篇 cryptography
  • 76 篇 machine learning
  • 73 篇 deep learning
  • 66 篇 accuracy
  • 65 篇 protocols
  • 58 篇 feature extracti...
  • 58 篇 privacy
  • 55 篇 training
  • 49 篇 computational mo...
  • 48 篇 artificial intel...
  • 47 篇 blockchain
  • 42 篇 computer securit...
  • 41 篇 computer science
  • 41 篇 encryption
  • 40 篇 predictive model...
  • 39 篇 servers

机构

  • 75 篇 school of cyber ...
  • 65 篇 institute of inf...
  • 54 篇 state key labora...
  • 45 篇 department of co...
  • 43 篇 department of co...
  • 40 篇 school of inform...
  • 36 篇 department of co...
  • 31 篇 department of in...
  • 30 篇 department of co...
  • 27 篇 department of el...
  • 27 篇 security enginee...
  • 26 篇 school of inform...
  • 19 篇 department of co...
  • 19 篇 university of ch...
  • 19 篇 center for secur...
  • 17 篇 school of comput...
  • 16 篇 department of cy...
  • 16 篇 department of el...
  • 15 篇 key laboratory o...
  • 15 篇 guangxi key lab ...

作者

  • 40 篇 choo kim-kwang r...
  • 34 篇 das ashok kumar
  • 30 篇 walid el-shafai
  • 24 篇 kim-kwang raymon...
  • 20 篇 naglaa f.soliman
  • 20 篇 taher m. ghazal
  • 19 篇 susilo willy
  • 18 篇 mohammad kamrul ...
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 chen kai
  • 17 篇 kai chen
  • 16 篇 guo yuanxiong
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 16 篇 cao xiaochun
  • 16 篇 ghazal taher m.
  • 15 篇 gong yanmin
  • 15 篇 amjed abbas ahme...
  • 14 篇 hasan mohammad k...

语言

  • 2,905 篇 英文
  • 123 篇 其他
  • 40 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Engineering and Information Security"
3070 条 记 录,以下是1-10 订阅
排序:
Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3291-3315页
作者: Jihyeon Yu Juhwan Kim Youngwoo Lee Fayozbek Rustamov Joobeom Yun Department of Computer and Information Security and Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea Department of Computer and Information Security Sejong UniversitySeoul05006Korea
Internet of things(IoT)devices are being increasingly used in numerous ***,the low priority on security and various IoT types have made these devices vulnerable to *** prevent this,recent studies have analyzed firmwar... 详细信息
来源: 评论
IWTW:A Framework for IoWT Cyber Threat Analysis
收藏 引用
computer Modeling in engineering & Sciences 2024年 第11期141卷 1575-1622页
作者: GyuHyun Jeon Hojun Jin Ju Hyeon Lee Seungho Jeon Jung Taek Seo Department of Information Security Gachon UniversitySeongnam13120Republic of Korea Department of Computer Engineering(Smart Security) Gachon UniversitySeongnam13120Republic of Korea
The Internet of Wearable Things(IoWT)or Wearable Internet of Things(WIoT)is a new paradigm that combines IoT and wearable *** in IoT technology have enabled the miniaturization of sensors embedded in wearable devices ... 详细信息
来源: 评论
Encrypted Cyberattack Detection System over Encrypted IoT Traffic Based onStatistical Intelligence
收藏 引用
computer Modeling in engineering & Sciences 2024年 第11期141卷 1519-1549页
作者: Il Hwan Ji Ju Hyeon Lee Seungho Jeon Jung Taek Seo Department of Information Security Gachon UniversitySeongnam13120Republic of Korea Department of Computer Engineering(Smart Security) Gachon UniversitySeongnam13120Republic of Korea
In the early days of IoT’s introduction, it was challenging to introduce encryption communication due to the lackof performance of each component, such as computing resources like CPUs and batteries, to encrypt and d... 详细信息
来源: 评论
AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 3371-3393页
作者: Juhwan Kim Baehoon Son Jihyeon Yu Joobeom Yun Department of Computer and Information Security and Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Republic of Korea
Digital forensics aims to uncover evidence of cybercrimes within compromised *** cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the compromised **... 详细信息
来源: 评论
TRE-DSP: A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 455-464页
作者: Yousheng Zhou Rundong Peng Yuanni Liu Pandi Vijayakumar Brij Gupta College of Computer Science and Technology Chongqing University of Posts and Telecommunications College of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Department of Computer Science and Engineering University College of Engineering Department of Computer Engineering National Institute of Technology Kurukshetra
With the popularity of the Internet of Vehicles(IoV), a large amount of data is being generated every day. How to securely share data between the IoV operator and various value-added service providers becomes one of t... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Global Spatial-Temporal information Encoder-Decoder Based Action Segmentation in Untrimmed Video
收藏 引用
Tsinghua Science and Technology 2025年 第1期30卷 290-302页
作者: Yichao Liu Yiyang Sun Zhide Chen Chen Feng Kexin Zhu Department of Computer and Cyberspace Security Fujian Normal UniversityFuzhou 350007China Department of Information Engineering Sun Yat-sen UniversityKaohsiung 80424China
Action segmentation has made significant progress,but segmenting and recognizing actions from untrimmed long videos remains a challenging *** state-of-the-art methods focus on designing models based on temporal ***,th... 详细信息
来源: 评论
ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach  25th
ARP Spoofing Mitigation for the E2 Interface in Open RAN:...
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Kim, Jihye Park, Jaehyoung Lee, Jong-Hyouk Department of Computer and Information Security Sejong University Seoul05006 Korea Republic of Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul05006 Korea Republic of
In the 5G-Advanced and 6G era, the Open Radio Access Network (Open RAN) will support hardware and software interoperability between different vendors. The O-RAN Alliance, which leads the Open RAN initiative, has relea... 详细信息
来源: 评论
security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing  25th
Security Function for 5G-Advanced and 6G: Malicious UE Det...
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Park, Jaehyoung Kim, Jihye Lee, Jong-Hyouk Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul05006 Korea Republic of Department of Computer and Information Security Sejong University Seoul05006 Korea Republic of
Starting with Software Defined Networking (SDN) and Network Functions Virtualization (NFV) technologies, network slicing is emerging as a critical technology in 5G-Advanced and 6G mobile communications to allocate log... 详细信息
来源: 评论
Enhancing Federated Feature Selection through Synthetic Data and Zero Trust Integration
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2126-2140页
作者: Madathil, Nisha Thorakkattu Alrabaee, Saed Belkacem, Abdelkader Nasreddine United Arab Emirates University College of IT Department of Information Systems and Security United Arab Emirates United Arab Emirates University College of IT Information Systems and Security department United Arab Emirates UAE University Computer and Network Engineering Department Al Ain United Arab Emirates
Federated Learning (FL) allows healthcare organizations to train models using diverse datasets while maintaining patient confidentiality collaboratively. While promising, FL faces challenges in optimizing model accura... 详细信息
来源: 评论