咨询与建议

限定检索结果

文献类型

  • 175 篇 期刊文献
  • 166 篇 会议
  • 7 册 图书

馆藏范围

  • 348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 230 篇 工学
    • 180 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 55 篇 信息与通信工程
    • 35 篇 电气工程
    • 30 篇 控制科学与工程
    • 23 篇 生物工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 电子科学与技术(可...
    • 13 篇 安全科学与工程
    • 13 篇 网络空间安全
    • 10 篇 机械工程
    • 10 篇 建筑学
    • 9 篇 交通运输工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 8 篇 土木工程
    • 7 篇 材料科学与工程(可...
  • 117 篇 理学
    • 73 篇 数学
    • 27 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 50 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 23 篇 法学
    • 14 篇 法学
    • 11 篇 社会学
  • 14 篇 医学
    • 13 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 artificial intel...
  • 7 篇 data privacy
  • 7 篇 security
  • 7 篇 blockchain
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 accuracy
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 jinan university...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...

作者

  • 13 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 7 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 susilo willy

语言

  • 328 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
348 条 记 录,以下是51-60 订阅
排序:
A "medium-field" multivariate public-key encryption scheme
A "medium-field" multivariate public-key encryption scheme
收藏 引用
Topics in Cryptology - CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006, Proceedings
作者: Wang, Lih-Chung Yang, Bo-Yin Hu, Yuh-Hua Lai, Feipei Department of Applied Mathematics National Donghua University Hualien Taiwan Department of Mathematics Tamkang University Tamsui Taiwan Taiwan Information Security Center Taipei Taiwan Department of Computer Science and Engineering National Taiwan University Taipei Taiwan
Electronic commerce fundamentally requires two different public-key cryptographical primitives, for key agreement and authentication. We present the new encryption scheme MFE, and provide a performance and security re... 详细信息
来源: 评论
Evaluating Cryptocurrency Market Risk on the Blockchain: An Empirical Study Using the ARMA-GARCH-VaR Model
IEEE Open Journal of the Computer Society
收藏 引用
IEEE Open Journal of the computer Society 2024年 5卷 83-94页
作者: Huang, Yongrong Wang, Huiqing Chen, Zhide Feng, Chen Zhu, Kexin Yang, Xu Yang, Wencheng Fujian Normal University School of Computer and Cyberspace Security Fuzhou350117 China Department of Information Engineering Fuzhou Polytechnic Fuzhou350108 China Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung80424 Taiwan College of Computer and Data Science Minjiang University Fuzhou350108 China School of Mathematics Physics and Computing University of Southern Queensland ToowoombaQLD4350 Australia
Cryptocurrency, a novel digital asset within the blockchain technology ecosystem, has recently garnered significant attention in the investment world. Despite its growing popularity, the inherent volatility and instab... 详细信息
来源: 评论
Cyber Deception System based on Monte Carlo Simulation in the Mobile Edge Computing (MEC)
Cyber Deception System based on Monte Carlo Simulation in th...
收藏 引用
2023 IEEE International Conference on computer, Information, and Telecommunication Systems, CITS 2023
作者: Kabdjou, Joelle Tagne, Elie Fute Rawat, Danda B. Acosta, Jaime Kamhoua, Charles University of Dschang Department of Mathematics and Computer Science Dschang Cameroon University of Buea Department of Computer Engineering Dschang Buea Cameroon Howard University Department of Electrical Engineering and Computer Science Washington United States Network Security Branch Devcom Army Research Laboratory Adelphi United States
The frequency of malicious activities by cyber attackers is on the rise, posing a significant challenge to counter cyber attacks in the Mobile Edge Computing (MEC) environment. The vulnerability of wireless networks, ... 详细信息
来源: 评论
Intersection-policy private mutual authentication from authorized private set intersection
收藏 引用
Science China(Information Sciences) 2020年 第2期63卷 116-130页
作者: Yamin WEN Fangguo ZHANG Huaxiong WANG Yinbin MIAO Zheng GONG School of Statistics and Mathematics Guangdong University of Finance and Economics State Key Laboratory of Cryptology School of Data and Computer Science Sun Yat-sen University Guangdong Key Laboratory of Information Security Sun Yat-sen University School of Physical and Mathematical Sciences Nanyang Technological University Department of Cyber Engineering Xidian University School of Computer South China Normal University
Private mutual authentication(PMA) enables two-way anonymous authentication between two users certified by the same trusted group authority. Most existing PMA schemes focus on acquiring a relatively onefold authentica... 详细信息
来源: 评论
Efficient escrow-free identity-based signature
Efficient escrow-free identity-based signature
收藏 引用
6th International Conference on Provable security, ProvSec 2012
作者: Zhang, Yunmei Liu, Joseph K. Huang, Xinyi Au, Man Ho Susilo, Willy School of Computer Science and Software Engineering University of Wollongong Australia Cryptography and Security Department Institute for Infocomm Research Singapore School of Mathematics and Computer Science Fujian Normal University Fuzhou Fujian China
The notion of identity-based signature scheme (IBS) has been proven useful in some scenarios where relying on the validity of the certificates is impractical. Nevertheless, one remaining inherent problem that hinders ... 详细信息
来源: 评论
The effect of evolutionary coupling on software defects: An industrial case study on a legacy system  14
The effect of evolutionary coupling on software defects: An ...
收藏 引用
8th ACM/IEEE International Symposium on Empirical Software engineering and Measurement, ESEM 2014
作者: Kirbas, Serkan Sen, Alper Caglayan, Bora Bener, Ayse Mahmutogullari, Rasim Department of Computer Engineering Bogazici University Istanbul Turkey Mathematics Mechanical and Industrial Engineering Ryerson University Toronto Canada Garanti Technology Architecture and Security Management Dept. Istanbul Turkey
Evolutionary coupling is defined as the implicit relationship between two or more software artifacts that are frequently changed together. In this study we investigate the effect of evolutionary coupling on defect pro... 详细信息
来源: 评论
COVID-19 Public Opinion and Emotion Monitoring System Based on Time Series Thermal New Word Mining
收藏 引用
computers, Materials & Continua 2020年 第9期64卷 1415-1434页
作者: Yixian Zhang Jieren Cheng Yifan Yang Haocheng Li Xinyi Zheng Xi Chen Boyi Liu Tenglong Ren Naixue Xiong School of Information and Communication Engineering Hainan UniversityHaikou570100China School of Computer Science and Cyberspace Security Hainan UniversityHaikou570100China University of Chinese Academy of Sciences Shenzhen518000China National University of Defense Technology Changsha410000China Department of Mathematics and Computer Science Northeastern State UniversityTahlequahUSA
With the spread and development of new epidemics,it is of great reference value to identify the changing trends of epidemics in public *** designed and implemented the COVID-19 public opinion monitoring system based o... 详细信息
来源: 评论
A privacy-preserving access control protocol for 6G supported intelligent UAV networks
收藏 引用
Vehicular Communications 2025年 54卷
作者: Mahmood, Khalid Shamshad, Salman Anisi, Mohammad Hossein Brighente, Alessandro Saleem, Muhammad Asad Das, Ashok Kumar School of Engineering and Computing University of Lancashire Preston PR1 2HE United Kingdom of Intelligent Data Science National Yunlin University of Science and Technology Douliu 64002 Taiwan Department of Software Engineering The University of Lahore Lahore 54590 Pakistan School of Computer Science and Electronic Engineering University of Essex Colchester CO4 3SQ United Kingdom Department of Mathematics and HIT research center Univ. of Padova Italy School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad 500032 India Department of Computer Science and Engineering College of Informatics Korea University Seoul 02841 South Korea
Due to their autonomous operation, high mobility, and real-time communication capabilities, 6G-supported Unmanned Aerial Vehicles (6G-UAVs) (i.e., drones) are increasingly being utilized to enhance data collection and... 详细信息
来源: 评论
Development of an Automated Method for Compiling a List of Protected Objects Based on a Special Classification of Information Assets in the Field of Information security
Development of an Automated Method for Compiling a List of P...
收藏 引用
2023 International Russian Smart Industry Conference, SmartIndustryCon 2023
作者: Manzhosov, A.V. Bolodurina, I.P. Dolgushev, N.A. Research Center Unity in Development Ekaterinburg Russia Orenburg State University Department of Applied Mathematics Orenburg Russia Orenburg State University Department of Computer Engineering and Information Security Orenburg Russia
This article reviewed the sources on the research topic, as a result of which it was determined that the research topic is discussed, relevant in the Russian and international agenda. A comparison of asset classificat... 详细信息
来源: 评论
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation
AGIR: Automating Cyber Threat Intelligence Reporting with Na...
收藏 引用
2023 IEEE International Conference on Big Data, BigData 2023
作者: Perrina, Filippo Marchiori, Francesco Conti, Mauro Verde, Nino Vincenzo University of Padova Department of Mathematics Padua Italy Delft University of Technology Faculty of Electrical Engineering Mathematics and Computer Science Delft Netherlands Leonardo Cyber&Security Leonardo S.p.A. Rome Italy
Cyber Threat Intelligence (CTI) reporting is pivotal in contemporary risk management strategies. As the volume of CTI reports continues to surge, the demand for automated tools to streamline report generation becomes ... 详细信息
来源: 评论