咨询与建议

限定检索结果

文献类型

  • 1,860 篇 会议
  • 1,222 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 3,124 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,025 篇 工学
    • 1,583 篇 计算机科学与技术...
    • 1,259 篇 软件工程
    • 585 篇 信息与通信工程
    • 305 篇 控制科学与工程
    • 237 篇 电气工程
    • 195 篇 生物工程
    • 180 篇 电子科学与技术(可...
    • 170 篇 网络空间安全
    • 125 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 112 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 79 篇 光学工程
    • 75 篇 动力工程及工程热...
    • 63 篇 交通运输工程
  • 812 篇 理学
    • 453 篇 数学
    • 212 篇 生物学
    • 163 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 61 篇 化学
  • 534 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 213 篇 图书情报与档案管...
    • 145 篇 工商管理
  • 139 篇 法学
    • 88 篇 社会学
  • 137 篇 医学
    • 112 篇 临床医学
    • 106 篇 基础医学(可授医学...
    • 61 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 58 篇 经济学
    • 57 篇 应用经济学
  • 29 篇 农学
  • 27 篇 军事学
  • 21 篇 文学
  • 19 篇 教育学
  • 10 篇 艺术学

主题

  • 103 篇 authentication
  • 103 篇 information secu...
  • 90 篇 security
  • 89 篇 internet of thin...
  • 89 篇 cryptography
  • 78 篇 deep learning
  • 78 篇 machine learning
  • 68 篇 accuracy
  • 66 篇 protocols
  • 59 篇 feature extracti...
  • 58 篇 privacy
  • 57 篇 training
  • 51 篇 computational mo...
  • 50 篇 blockchain
  • 48 篇 artificial intel...
  • 42 篇 computer science
  • 42 篇 computer securit...
  • 41 篇 encryption
  • 40 篇 servers
  • 40 篇 predictive model...

机构

  • 78 篇 school of cyber ...
  • 67 篇 institute of inf...
  • 55 篇 state key labora...
  • 45 篇 department of co...
  • 43 篇 department of co...
  • 40 篇 school of inform...
  • 40 篇 department of co...
  • 31 篇 department of in...
  • 30 篇 department of co...
  • 27 篇 department of el...
  • 27 篇 security enginee...
  • 26 篇 school of inform...
  • 20 篇 department of co...
  • 20 篇 center for secur...
  • 19 篇 university of ch...
  • 17 篇 school of comput...
  • 16 篇 department of cy...
  • 16 篇 department of el...
  • 16 篇 center for cyber...
  • 15 篇 key laboratory o...

作者

  • 41 篇 choo kim-kwang r...
  • 34 篇 das ashok kumar
  • 30 篇 walid el-shafai
  • 25 篇 kim-kwang raymon...
  • 20 篇 naglaa f.soliman
  • 19 篇 susilo willy
  • 19 篇 taher m. ghazal
  • 18 篇 ashok kumar das
  • 18 篇 mohammad kamrul ...
  • 17 篇 mahmood khalid
  • 17 篇 chen kai
  • 17 篇 kai chen
  • 17 篇 cao xiaochun
  • 17 篇 ghazal taher m.
  • 16 篇 guo yuanxiong
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 15 篇 gong yanmin
  • 15 篇 hasan mohammad k...
  • 15 篇 amjed abbas ahme...

语言

  • 2,871 篇 英文
  • 211 篇 其他
  • 43 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Engineering and Information Security"
3124 条 记 录,以下是41-50 订阅
排序:
Improving VANET Localization Performance with Data Verification: Challenges and Solutions
Improving VANET Localization Performance with Data Verificat...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Kadhim, Aqeel Kamil Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisa Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
In VANETs, the important and effective applications of vehicle localization include safety and communication applications. Thus, it is difficult to get very accurate localization in the dynamic and often very fluctuat... 详细信息
来源: 评论
Proposed 3D chaos-based medical image cryptosystem for secure cloud-IoMT eHealth communication services
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第1期15卷 1-28页
作者: El-Shafai, Walid Khallaf, Fatma El-Rabaie, El-Sayed M. El-Samie, Fathi E. Abd Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Electrical Engineering Faculty of Engineering Ahram Canadian University Giza 6th October City Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh84428 Saudi Arabia
Medical image encryption is a mandatory process in various healthcare, Internet of Medical Things (IoMT) and cloud services. This paper provides a robust cryptosystem based on a 3D chaotic map for the medical image en... 详细信息
来源: 评论
Video and image quality improvement using an enhanced optimized dehazing technique
收藏 引用
Multimedia Tools and Applications 2024年 1-19页
作者: Ayoub, Abeer El-Shafai, Walid El-Samie, Fathi E. Abd Hamad, Ehab K. I. EL-Rabaie, El-Sayed M. Electrical Engineering Department Faculty of Engineering Aswan University Aswan81542 Egypt Department of Electronics and Electrical Communication Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
The detrimental effects of atmospheric haze frequently plague outdoor imagery. This phenomenon arises from the scattering of light by minute particles within the ambient environment surrounding the scene to be im... 详细信息
来源: 评论
A Review of Key Elements for Underwater Wireless Sensor Networks
A Review of Key Elements for Underwater Wireless Sensor Netw...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Al-Dulaimi, Aymen Mohammed Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Aliesawi, Salah A. Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq
Underwater Wireless Sensor Networks (UWSNs) are emerging and have huge prospects since they have various applications in oceanography, environmental monitoring, and underwater communication. These networks contain low... 详细信息
来源: 评论
Enhancing Organizational Performance: Synergy of Cyber-Physical Systems, Cloud Services, and Crowdsensing
收藏 引用
International Journal of Crowd Science 2025年 第1期9卷 44-55页
作者: Al-Qerem, Ahmad Ali, Ali Mohd Nabot, Ahmad Jebreen, Issam Alauthman, Mohammad Alangari, Someah Aburub, Faisal Aldweesh, Amjad Computer Science Department Faculty of Information Technology Zarqa University Zarqa13110 Jordan Communications and Computer Engineering Department Faculty of Engineering Al-Ahliyya Amman University Amman19328 Jordan Department of Information Security University of Petra Amman11196 Jordan Department of Computer Science College of Science and Humanities Dawadmi Shaqra University Shaqra11911 Saudi Arabia Department of Business Intelligence and Data Analytics University of Petra Amman11196 Jordan College of Computing and Information Technology Shaqra University Shaqra11911 Saudi Arabia
In the contemporary business landscape, software has evolved into a strategic asset crucial for organizations seeking sustainable competitive advantage. The imperative of ensuring software quality becomes evident as l... 详细信息
来源: 评论
Deep Learning Based Efficient Crowd Counting System
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 4001-4020页
作者: Waleed Khalid Al-Ghanem Emad Ul Haq Qazi Muhammad Hamza Faheem Syed Shah Amanullah Quadri Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Centre of Excellence in Cybercrime and Digital Forensics Naif Arab University for Security SciencesRiyadh14812Saudi Arabia Center of Excellence for Information Assurance(COEIA) King Saud UniversityRiyadh12372Saudi Arabia
Estimation of crowd count is becoming crucial nowadays,as it can help in security surveillance,crowd monitoring,and management for different *** is challenging to determine the approximate crowd size from an image of ... 详细信息
来源: 评论
Performance Analysis of Energy and Secure Efficient Routing for Wireless Sensor Networks
Performance Analysis of Energy and Secure Efficient Routing ...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Hussein, Zainab Mohammed Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Wireless Sensor Networks (WSNs) are essential for various applications, but their architecture makes them vulnerable to attacks. While traditional security methods like authentication and encryption offer some protect... 详细信息
来源: 评论
Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System
收藏 引用
computer Modeling in engineering & Sciences 2024年 第10期141卷 671-688页
作者: Youngho Park Su Jin Shin Sang Uk Shin Electronics and Information Communications Research Center Pukyong National UniversityBusan48513Republic of Korea Department of Information Security Graduate SchoolPukyong National UniversityBusan48513Republic of Korea Division of Computer Engineering Pukyong National UniversityBusan48513Republic of Korea
Data trading enables data owners and data requesters to sell and purchase *** the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of ***,to reduce the on-chain s... 详细信息
来源: 评论
Blockchain-Based Secure and Fair IoT Data Trading System with Bilateral Authorization
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 1871-1890页
作者: Youngho Park Mi Hyeon Jeon Sang Uk Shin Electronics and Information Communications Research Center Pukyong National UniversityBusanKorea Department of Information Security Graduate SchoolPukyong National UniversityBusanKorea Division of Computer Engineering Pukyong National UniversityBusanKorea
These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling ***,online data trading poses challenges in terms of security and fairness because... 详细信息
来源: 评论
IoMT-Based Healthcare Framework for Ambient Assisted Living Using a Convolutional Neural Network
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6867-6878页
作者: Waleed T.Al-Sit Nidal A.Al-Dmour Taher M.Ghazal Ghassan F.Issa Department of Computer Engineering Mutah UniversityAl-KarakJordanHigher Colleges of TechnologyDubaiUAE Department of Computer Engineering College of EngineeringMutah UniversityJordan School of Information Technology Skyline University CollegeUniversity City SharjahSharjahUAE Center for Cyber Security Faculty of Information Science and TechnologyUKM43600BangiSelangorMalaysia
In the age of universal computing,human life is becoming smarter owing to the recent developments in the Internet of Medical Things(IoMT),wearable sensors,and telecommunication innovations,which provide more effective... 详细信息
来源: 评论