咨询与建议

限定检索结果

文献类型

  • 176 篇 期刊文献
  • 166 篇 会议
  • 7 册 图书

馆藏范围

  • 349 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 184 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 38 篇 电气工程
    • 32 篇 控制科学与工程
    • 23 篇 生物工程
    • 15 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 12 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 119 篇 理学
    • 74 篇 数学
    • 27 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 14 篇 医学
    • 13 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 artificial intel...
  • 7 篇 data privacy
  • 7 篇 security
  • 7 篇 blockchain
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 accuracy
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 jinan university...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...

作者

  • 13 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 7 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 susilo willy

语言

  • 329 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
349 条 记 录,以下是111-120 订阅
排序:
A security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones
收藏 引用
IEEE Internet of Things Journal 2024年 第12期11卷 22301-22309页
作者: Mahmood, Khalid Ghaffar, Zahid Farooq, Muhammad Yahya, Khalid Das, Ashok Kumar Chaudhry, Shehzad Ashraf National Yunlin University Of Science And Technology Graduate School Of Intelligent Data Science Douliu64002 Taiwan National Yunlin University Of Science And Technology Graduate School Of Engineering Science And Technology Douliu64002 Taiwan Abu Dhabi University Department Of Mathematics And Statistics College Of Arts And Sciences Abu Dhabi United Arab Emirates Istanbul Gelisim University Department Of Electrical And Electronics Engineering Istanbul34310 Turkey Sabratah University Department Of Electrical Engineering Faculty Of Engineering Regdalen Libya Center For Security Theory And Algorithmic Research Hyderabad500 032 India Abu Dhabi University Department Of Computer Science And Information Technology College Of Engineering Abu Dhabi United Arab Emirates Nisantasi University Faculty Of Engineering And Architecture Department Of Software Engineering Istanbul34398 Turkey
The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling them to participate in a connected network. In IoD infrastructure, drones communicate not only among themselves but also with... 详细信息
来源: 评论
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
收藏 引用
International Journal of security and Networks 2010年 第1期5卷 35-44页
作者: Xu, Li Chen, Sisheng Huang, Xinyi Mu, Yi Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 China Department of Mathematics and Computer Science FuQing Branch Fujian Normal University FuQing 350300 China School of Computer Science and Software Engineering Center for Computer and Information Security Research University of Wollongong NSW 2522 Australia
Wireless ad hoc networks, especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad ho... 详细信息
来源: 评论
DataPAL: Data Protection and Authorization Lifecycle framework  6
DataPAL: Data Protection and Authorization Lifecycle framewo...
收藏 引用
6th South-East Europe Design Automation, computer engineering, computer Networks and Social Media Conference, SEEDA-CECNSM 2021
作者: Bandopadhyay, Subhajit Dimitrakos, Theo Diaz, Yair Hariri, Ali Dilshener, Tezcan la Marra, Antonio Rosetti, Alessandro German Research Center Huawei Technologies Duesseldorf GmbH Munich Germany School of Computing University of Kent Canterbury United Kingdom European Business School University Munich Germany IT All Software Solutions Munich Germany Security Forge Pisa Italy Department of Computer Science and Information Engineering University of Trento Trento Italy Institute for Cyber Security School of Mathematics Computer Science and Engineering City University of London London United Kingdom
This paper introduces a new model for handling data privacy throughout data lifecycle via the introduction of a policy profile using the Abbreviated Language For Authorization (ALFA) policy language. Our approach exte... 详细信息
来源: 评论
Component Fault Diagnosability of Hierarchical Cubic Networks
收藏 引用
ACM Transactions on Design Automation of Electronic Systems 2021年 第3期28卷 1-19页
作者: Huang, Yanze Wen, Kui Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fujian University of Technology No. 3 Xueyuan Road Fujian Fuzhou China College of Computer and Cyber Security Fujian Normal University No. 8 Xuefu South Road Fujian Fuzhou350117 China Department of Computer Science and Information Engineering National Cheng Kung University No. 1 University Road Tainan70101 Taiwan
The fault diagnosability of a network indicates the self-diagnosis ability of the network, thus it is an important measure of robustness of the network. As a neoteric feature for measuring fault diagnosability, the r-... 详细信息
来源: 评论
A sharp condition for exact support recovery of sparse signals with orthogonal matching pursuit
A sharp condition for exact support recovery of sparse signa...
收藏 引用
2016 IEEE International Symposium on Information Theory, ISIT 2016
作者: Wen, Jinming Zhou, Zhengchun Wang, Jian Tang, Xiaohu Mo, Qun College of Information Engineering Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China ENS de Lyon LIP Lyon69007 France School of Mathematics Southwest Jiaotong University Chengdu610031 China Dept. of Electrical and Computer Engineering Seoul National University Seoul151742 Korea Republic of Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu610031 China Department of Mathematics Zhejiang University Hangzhou310027 China
Support recovery of sparse signals from noisy measurements with orthogonal matching pursuit (OMP) has been extensively studied in the literature. In this paper, we show that for any K-sparse signal x, if the sensing m... 详细信息
来源: 评论
A signature based architecture for Trojan detection  9
A signature based architecture for Trojan detection
收藏 引用
9th Workshop on Embedded Systems security, WESS 2014
作者: Gbade-Alabi, Aderinola Keezer, David Mooney, Vincent Poschmann, Axel Y. Stöttinger, Marc Divekar, Kshitij School of Electrical and Computer Engineering Georgia Institute of Technology AtlantaGA United States NXP Semiconductors Innovation Center Crypto and Security Hamburg Germany Temasek Laboratories Nanyang Technological University Singapore Singapore Department of Mathematics Nanyang Technological University Singapore
Trust in the integrated circuit (IC) fabrication industry is an ongoing concern given the trend towards "fabless" design and associated use of third-parties for fabrication. A Hardware Trojan (HT) introduced... 详细信息
来源: 评论
Two-Layer SVM, Towards Deep Statistical Learning  1
Two-Layer SVM, Towards Deep Statistical Learning
收藏 引用
1st International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2022
作者: Kazemi, Alireza Boostani, Reza Odeh, Mahmoud Al-Mousa, Mohammad Rasmi Shiraz University Shiraz Faculty of Science Mathematics Department Fars Iran Electrical and Computer Engineering School Shiraz University Shiraz CSEandIT Dept. Fars Iran Zarqa University Department of Management Information System Jordan Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan
Support Vector Machine (SVM) is originally a binary large-margin classifier emerged from the concept of structural risk minimization. Multiple solutions such as one-versus-one and one-versus-all have been proposed for... 详细信息
来源: 评论
An adaptive system for detecting malicious queries in web attacks
收藏 引用
Science China(Information Sciences) 2018年 第3期61卷 175-190页
作者: Ying DONG Yuqing ZHANG Hua MA Qianru WU Qixu LIU Kai WANG Wenjie WANG National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences School of Mathematics and Statistics Xidian University Security Department Alibaba Group Zhanlu Laboratory Tencent Incorporation
Web request query strings(queries), which pass parameters to a referenced resource, are always manipulated by attackers to retrieve sensitive data and even take full control of victim web servers and web applications.... 详细信息
来源: 评论
Bending of a circular flexible plate taking into account the initial curvature  49
Bending of a circular flexible plate taking into account the...
收藏 引用
49th International Conference on Vibroengineering
作者: Mamatova, G.U. Sugirbekova, A.K. Bekaulov, N.M. Department of Chemical Physics and Materials Science Al-Farabi Kazakh National University Almaty050040 Kazakhstan Department of Chair of Mathematics Physics and Informatics Teaching Methods Abai Kazakh National Pedagogical University Almaty050010 Kazakhstan Department of Computer Engineering and Information Security International IT University Almaty050000 Kazakhstan
In this article, an analytical solution of the problem of bending a round plate with an initial curvature is obtained. A round plate with an initial curvature as a structural element is widely used, the calculation of... 详细信息
来源: 评论
Set Stabilization of Large-Scale Stochastic Boolean Networks:A Distributed Control Strategy
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第3期11卷 806-808页
作者: Lin Lin Jinde Cao Jianquan Lu Leszek Rutkowski the Department of Mechanical Engineering the University of Hong KongHong Kong China the School of Mathematics Southeast UniversityNanjing 210096China IEEE the School of Mathematics and the Frontiers Science Center for Mobile Information Communication and Security Southeast UniversityNanjing 210096China the School of Mathematics the Southeast UniversityNanjing 210096 the School of Electronic Information and Electrical Engineering Chengdu UniversityChengdu 610106China the Systems Research Institute of the Polish Academy of Sciences Warsaw 01-447 the Institute of Computer Science AGH University of Science and TechnologyKraków 30-059 the Information Technology Institute University of Social SciencesŁódź90-113Poland
Dear Editor,This letter deals with the set stabilization of stochastic Boolean control networks(SBCNs)by the pinning control strategy,which is to realize the full control for systems by imposing control inputs on a fr... 详细信息
来源: 评论