咨询与建议

限定检索结果

文献类型

  • 1,860 篇 会议
  • 1,222 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 3,124 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,025 篇 工学
    • 1,583 篇 计算机科学与技术...
    • 1,259 篇 软件工程
    • 585 篇 信息与通信工程
    • 305 篇 控制科学与工程
    • 237 篇 电气工程
    • 195 篇 生物工程
    • 180 篇 电子科学与技术(可...
    • 170 篇 网络空间安全
    • 125 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 112 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 79 篇 光学工程
    • 75 篇 动力工程及工程热...
    • 63 篇 交通运输工程
  • 812 篇 理学
    • 453 篇 数学
    • 212 篇 生物学
    • 163 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 61 篇 化学
  • 534 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 213 篇 图书情报与档案管...
    • 145 篇 工商管理
  • 139 篇 法学
    • 88 篇 社会学
  • 137 篇 医学
    • 112 篇 临床医学
    • 106 篇 基础医学(可授医学...
    • 61 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 58 篇 经济学
    • 57 篇 应用经济学
  • 29 篇 农学
  • 27 篇 军事学
  • 21 篇 文学
  • 19 篇 教育学
  • 10 篇 艺术学

主题

  • 103 篇 authentication
  • 103 篇 information secu...
  • 90 篇 security
  • 89 篇 internet of thin...
  • 89 篇 cryptography
  • 78 篇 deep learning
  • 78 篇 machine learning
  • 68 篇 accuracy
  • 66 篇 protocols
  • 59 篇 feature extracti...
  • 58 篇 privacy
  • 57 篇 training
  • 51 篇 computational mo...
  • 50 篇 blockchain
  • 48 篇 artificial intel...
  • 42 篇 computer science
  • 42 篇 computer securit...
  • 41 篇 encryption
  • 40 篇 servers
  • 40 篇 predictive model...

机构

  • 78 篇 school of cyber ...
  • 67 篇 institute of inf...
  • 55 篇 state key labora...
  • 45 篇 department of co...
  • 43 篇 department of co...
  • 40 篇 school of inform...
  • 40 篇 department of co...
  • 31 篇 department of in...
  • 30 篇 department of co...
  • 27 篇 department of el...
  • 27 篇 security enginee...
  • 26 篇 school of inform...
  • 20 篇 department of co...
  • 20 篇 center for secur...
  • 19 篇 university of ch...
  • 17 篇 school of comput...
  • 16 篇 department of cy...
  • 16 篇 department of el...
  • 16 篇 center for cyber...
  • 15 篇 key laboratory o...

作者

  • 41 篇 choo kim-kwang r...
  • 34 篇 das ashok kumar
  • 30 篇 walid el-shafai
  • 25 篇 kim-kwang raymon...
  • 20 篇 naglaa f.soliman
  • 19 篇 susilo willy
  • 19 篇 taher m. ghazal
  • 18 篇 ashok kumar das
  • 18 篇 mohammad kamrul ...
  • 17 篇 mahmood khalid
  • 17 篇 chen kai
  • 17 篇 kai chen
  • 17 篇 cao xiaochun
  • 17 篇 ghazal taher m.
  • 16 篇 guo yuanxiong
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 15 篇 gong yanmin
  • 15 篇 hasan mohammad k...
  • 15 篇 amjed abbas ahme...

语言

  • 2,871 篇 英文
  • 211 篇 其他
  • 43 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Engineering and Information Security"
3124 条 记 录,以下是21-30 订阅
排序:
A Privacy-Aware Provably Secure Smart Card Authentication Protocol Based on Physically Unclonable Functions
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 第4期21卷 2766-2778页
作者: Fan, Chun-I Karati, Arijit Wu, Shou-Li National Sun Yat-sen University Department of Computer Science and Engineering Information Security Research Center The Intelligent Electronic Commerce Research Center Kaohsiung804 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804 Taiwan
For many industrial applications, the smart card is a necessary safety component in user authentication. Smart cards provided to the users are used in open and public places, making them susceptible to physical and cl... 详细信息
来源: 评论
Survey on digital twins for Internet of Vehicles:Fundamentals,challenges,and opportunities
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 237-247页
作者: Jiajie Guo Muhammad Bilal Yuying Qiu Cheng Qian Xiaolong Xu Kim-Kwang Raymond Choo School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Engineering Hankuk University of Foreign StudiesGyeonggi-do17035South Korea Jiangsu Hydraulic Research Institute Nanjing210044China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly *** have been attem... 详细信息
来源: 评论
Log Preservation in Custody Dual Blockchain With Energy Regime and Obfuscation Shuffle
收藏 引用
IEEE Transactions on Network Science and engineering 2024年 第4期11卷 3495-3511页
作者: Chew, Chit-Jie Lee, Wei-Bin Chen, Tzu-Hao Lin, Iuon-Chang Lee, Jung-San Feng Chia University Department of Information Engineering and Computer Science Taichung407 Taiwan Hon Hai Research Institute Information Security Research Center Taipei236 Taiwan National Chung Hsing University Department of Management Information Systems Taichung402 Taiwan
The rise of cybercrime has led to an explosion of threats in recent years, resulting in the increasingly important of digital forensics. To achieve successful investigation and prosecution, the log preservation is a c... 详细信息
来源: 评论
A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 201-241页
作者: Naglaa F.Soliman Fatma E.Fadl-Allah Walid El-Shafai Mahmoud I.Aly Maali Alabdulhafith Fathi E.Abd El-Samie Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Electronics and Communications Faculty of EngineeringZagazig UniversityZagazig44519Egypt Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia ***-quality images require well-tuned communication *** Single C... 详细信息
来源: 评论
Internet of Things Intrusion Detection System Based on Convolutional Neural Network
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 2119-2135页
作者: Jie Yin Yuxuan Shi Wen Deng Chang Yin Tiannan Wang Yuchen Song Tianyao Li Yicheng Li Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjingChina
In recent years, the Internet of Things (IoT) technology has developedby leaps and bounds. However, the large and heterogeneous networkstructure of IoT brings high management costs. In particular, the low costof IoT d... 详细信息
来源: 评论
Forward Legal Anonymous Group Pairing-Onion Routing for Mobile Opportunistic Networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6595-6612页
作者: Zhu, Xiuzhen Lin, Limei Huang, Yanze Wang, Xiaoding Hsieh, Sun-Yuan Wu, Jie Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan Temple University Department of Computer and Information Science 1925 N. 12th St PhiladelphiaPA19122 United States
Mobile Opportunistic Networks (MONs) often experience frequent interruptions in end-to-end connections, which increases the likelihood of message loss during delivery and makes users more susceptible to various cyber ... 详细信息
来源: 评论
An Early Warning Model of Telecommunication Network Fraud Based on User Portrait
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1561-1576页
作者: Wen Deng Guangjun Liang Chenfei Yu Kefan Yao Chengrui Wang Xuan Zhang Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Department of Public Security of Jiangsu Province Key Laboratory of Digital ForensicsNanjingChina
With the frequent occurrence of telecommunications and networkfraud crimes in recent years, new frauds have emerged one after another whichhas caused huge losses to the people. However, due to the lack of an effective... 详细信息
来源: 评论
Feature Selection in Socio-Economic Analysis: A Multi-Method Approach for Accurate Predictive Outcomes
收藏 引用
International Journal of Crowd Science 2025年 第1期9卷 64-78页
作者: Al-Qerem, Ahmad Ali, Ali Mohd Jebreen, Issam Nabot, Ahmad Rajab, Mohammed Alauthman, Mohammad Aldweesh, Amjad Aburub, Faisal Alangari, Someah Alzgol, Musab Computer Science Department Faculty of Information Technology Zarqa University Zarqa13110 Jordan Communications and Computer Engineering Department Faculty of Engineering Al-Ahliyya Amman University Amman19328 Jordan University Headquarter University of Anbar Ramadi31001 Iraq Department of Information Security University of Petra Amman11196 Jordan College of Computing and Information Technology Shaqra University Shaqra11911 Saudi Arabia Department of Business Intelligence and Data Analytics University of Petra Amman11196 Jordan Computer Information Systems Department Faculty of Information Technology Isra University Amman11622 Jordan
Feature selection is a cornerstone in advancing the accuracy and efficiency of predictive models, particularly in nuanced domains like socio-economic analysis. This study explores nine distinct feature selection metho... 详细信息
来源: 评论
Endogenous security of FQn Networks: Adaptive System-Level Fault Self-Diagnosis
收藏 引用
IEEE Transactions on Reliability 2024年 第3期73卷 1659-1668页
作者: Lin, Yuhang Lin, Limei Huang, Yanze Xu, Li Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
Endogenous security has the ability to discover, eliminate, and solve internal security problems and hidden dangers within the network, and is a superior technology to ensure future network security. The t/k-diagnosis... 详细信息
来源: 评论
Enhancing visual clarity in hazy media: a comprehensive approach through preprocessing and feature fusion attention-based dehazing
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 18071-18093页
作者: Ayoub, Abeer El-Shafai, Walid El-Samie, Fathi E. Abd Hamad, Ehab K. I. Rabaie, El-Sayed M. Department of Electronics and Electrical Communication Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Electrical Engineering Department Faculty of Engineering Aswan University Aswan81542 Egypt
Particles in the atmosphere, such as dust and smoke, can cause visual clarity problems in both images and videos. Haze is the result of the interaction between airborne particles and light, which is scattered and atte... 详细信息
来源: 评论