咨询与建议

限定检索结果

文献类型

  • 344 篇 会议
  • 214 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 561 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 373 篇 工学
    • 204 篇 计算机科学与技术...
    • 174 篇 信息与通信工程
    • 152 篇 软件工程
    • 113 篇 电子科学与技术(可...
    • 65 篇 电气工程
    • 42 篇 控制科学与工程
    • 39 篇 光学工程
    • 34 篇 仪器科学与技术
    • 28 篇 机械工程
    • 23 篇 动力工程及工程热...
    • 18 篇 生物工程
    • 17 篇 材料科学与工程(可...
    • 17 篇 航空宇航科学与技...
    • 16 篇 生物医学工程(可授...
    • 15 篇 网络空间安全
    • 11 篇 交通运输工程
    • 9 篇 安全科学与工程
  • 166 篇 理学
    • 91 篇 数学
    • 55 篇 物理学
    • 36 篇 统计学(可授理学、...
    • 19 篇 生物学
    • 16 篇 系统科学
    • 8 篇 大气科学
  • 72 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 27 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 16 篇 法学
    • 10 篇 社会学
  • 15 篇 医学
    • 9 篇 基础医学(可授医学...
    • 9 篇 临床医学
    • 9 篇 公共卫生与预防医...
  • 6 篇 经济学
  • 6 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 21 篇 protocols
  • 17 篇 computer network...
  • 15 篇 internet of thin...
  • 15 篇 throughput
  • 15 篇 resource managem...
  • 14 篇 computer science
  • 14 篇 quality of servi...
  • 12 篇 signal to noise ...
  • 12 篇 optical fiber ne...
  • 12 篇 security
  • 11 篇 energy efficienc...
  • 10 篇 interference
  • 9 篇 bandwidth
  • 9 篇 intelligent netw...
  • 9 篇 computational mo...
  • 9 篇 costs
  • 9 篇 receivers
  • 9 篇 mobile communica...
  • 8 篇 routing
  • 8 篇 network topology

机构

  • 21 篇 frontiers scienc...
  • 19 篇 peng cheng labor...
  • 17 篇 department of el...
  • 12 篇 research center ...
  • 11 篇 state key labora...
  • 10 篇 pcl research cen...
  • 10 篇 state key labora...
  • 9 篇 national mobile ...
  • 9 篇 peking universit...
  • 7 篇 state key labora...
  • 7 篇 state key labora...
  • 6 篇 department of el...
  • 5 篇 the department o...
  • 5 篇 school of electr...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 the college of c...
  • 5 篇 state key labora...
  • 5 篇 the department o...
  • 4 篇 institute of com...

作者

  • 21 篇 wang xingjun
  • 21 篇 shu haowen
  • 17 篇 bowers john e.
  • 16 篇 xingjun wang
  • 15 篇 chang lin
  • 14 篇 haowen shu
  • 13 篇 xie weiqiang
  • 12 篇 yu shaohua
  • 12 篇 shen bitao
  • 9 篇 lin chang
  • 9 篇 de meer hermann
  • 9 篇 blumenthal danie...
  • 8 篇 zhang xuguang
  • 8 篇 chen ruixuan
  • 8 篇 tao zihan
  • 8 篇 weiqiang xie
  • 7 篇 jin ming
  • 7 篇 john e. bowers
  • 7 篇 han zhu
  • 7 篇 bitao shen

语言

  • 495 篇 英文
  • 58 篇 其他
  • 8 篇 中文
检索条件"机构=Department of Computer Networks and Computer Communications"
561 条 记 录,以下是21-30 订阅
排序:
Novel Path Counting-Based Method for Fractal Dimension Estimation of the Ultra-Dense networks
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 561-572页
作者: Farid Nahli Alexander Paramonov Naglaa F.Soliman Hussah Nasser AlEisa Reem Alkanhel Ammar Muthanna Abdelhamied A.Ateya Department of Telecommunication Networks and Data Transmission The Bonch-Bruevich Saint-Petersburg State University of TelecommunicationsSaint Petersburg193232Russia Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia Department of Electronics and Communications Engineering Zagazig UniversityZagazig44519SharqiaEgypt
Next-generation networks,including the Internet of Things(IoT),fifth-generation cellular systems(5G),and sixth-generation cellular systems(6G),suf-fer from the dramatic increase of the number of deployed *** puts high ... 详细信息
来源: 评论
Analytical Study of Local Repair Attack on RPL-Based 6LoWPAN networks in Internet of Things  7
Analytical Study of Local Repair Attack on RPL-Based 6LoWPAN...
收藏 引用
7th International Conference on Future networks and Distributed Systems, ICFNDS 2023
作者: Albinali, Hussah Alghofaili, Rakan Azzedin, Farag Information & Computer Science Department Kfupm Dhahran Saudi Arabia Networks & Communications Department Iau Saudi Arabia Technical Services Saudi Aramco Dhahran Saudi Arabia
RPL was developed as a routing protocol in low-power and lossy network contexts to connect many applications using IP-based communication. However, RPL has been exploited to launch several attacks, including local rep... 详细信息
来源: 评论
Optimal Deep Learning Driven Intrusion Detection in SDN-Enabled IoT Environment
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6587-6604页
作者: Mohammed Maray Haya Mesfer Alshahrani Khalid A.Alissa Najm Alotaibi Abdulbaset Gaddah AliMeree Mahmoud Othman Manar Ahmed Hamza Department of Information Systems College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia SAUDI ARAMCO Cybersecurity Chair Networks and Communications DepartmentCollege of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Prince Saud AlFaisal Institute for Diplomatic Studies RiyadhSaudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science Warwick UniversityCovetryUK Department of Computer Science Faculty of Computers and Information TechnologyFuture University in Egypt New Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
In recent years,wireless networks are widely used in different *** phenomenon has increased the number of Internet of Things(IoT)devices and their *** IoT has numerous advantages,the commonly-used IoT devices are expo... 详细信息
来源: 评论
A Systematic Literature Review on Digital Forensic Investigation on Android Devices
收藏 引用
Procedia computer Science 2024年 235卷 1332-1352页
作者: Almaha Almuqren Hanan Alsuwaelim M M Hafizur Rahman Adamu A. Ibrahim Department of Computer Networks and Communications King Faisal University Saudi Arabia Department of Computer Science KICT International Islamic University Malaysia (IIUM) Kuala Lumpur Malaysia.
Mobile forensics, particularly in the Android ecosystem, is a rapidly evolving field that demands continuous advancements to address the growing complexity and diversity of mobile devices. This article emphasizes the ... 详细信息
来源: 评论
Reliable and Efficient Data Collection in UAV based IoT networks
收藏 引用
IEEE communications Surveys and Tutorials 2025年
作者: Poorvi, Joshi Kalita, Alakesh Gurusamy, Mohan National University of Singapore Communications and Networks Lab Department of Electrical and Computer Engineering Singapore Dhanbad Mathematics and Computing Department India
IoT involves sensors for monitoring and wireless networks for efficient communication. However, resource-constrained IoT devices and limitations in existing wireless technologies hinder its full potential. Integrating... 详细信息
来源: 评论
Performance Framework for Virtual Machine Migration in Cloud Computing
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6289-6305页
作者: Tahir Alyas Taher M.Ghazal Badria Sulaiman Alfurhood Munir Ahmad Ossma Ali Thawabeh Khalid Alissa Qaiser Abbas Department of Computer Science Lahore Garrison UniversityLahore54000Pakistan School of Information Technology Skyline University CollegeUniversity City SharjahSharjah1797UAE Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebansaan Malaysia(UKM)Bangi43600SelangorMalaysia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversitySaudi Arabia School of Computer Science National College of Business Administration&EconomicsLahore54000Pakistan Dean of Student Affairs Skyline University CollegeUniversity City SharjahSharjah1797UAE Networks and Communications Department College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Faculty of Computer and Information Systems Islamic University Madinah Madinah42351Saudi Arabia
In the cloud environment,the transfer of data from one cloud server to another cloud server is called *** can be delivered in various ways,from one data centre to *** research aims to increase the migration performanc... 详细信息
来源: 评论
Testing and Exploiting Tools to Improve OWASP Top Ten Security Vulnerabilities Detection  14
Testing and Exploiting Tools to Improve OWASP Top Ten Securi...
收藏 引用
14th IEEE International Conference on Computational Intelligence and Communication networks, CICN 2022
作者: Aljabri, Malak Aldossary, Maryam Al-Homeed, Noor Alhetelah, Bushra Althubiany, Malek Alotaibi, Ohoud Alsaqer, Sara Saudi Aramco Cybersecurity Chair College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University Networks and Communications Department Dammam Saudi Arabia College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University Networks and Communications Department Dammam Saudi Arabia
In many different sorts of businesses, including public and private, government, critical infrastructures, etc., web apps have grown recently. Therefore, securing web applications is a major concern to protect busines... 详细信息
来源: 评论
Comparison of IoT Architectures Based on the Seven Essential Characteristics
Comparison of IoT Architectures Based on the Seven Essential...
收藏 引用
Sciences and Techniques of Automatic Control and computer Engineering MI-STA, IEEE International Maghreb Meeting of the Conference on
作者: Saleh Hussein Al-Awami Mohammed Mahfud Al-Aty Mousa Faraj Al-Najar Department of Data Communications and Computer Networks University of Benghazi Benghazi Libya
The Internet of Things (IoT) is expected to become one of the major technological hubs in the coming years by connecting smart physical objects and enabling a variety of applications to enable smart decision-making. T...
来源: 评论
In-depth Analysis of Interior Gateway Protocols in a Large-scale Enterprise Topologies
In-depth Analysis of Interior Gateway Protocols in a Large-s...
收藏 引用
Sciences and Techniques of Automatic Control and computer Engineering MI-STA, IEEE International Maghreb Meeting of the Conference on
作者: Saleh Hussein Al-Awami Ali Tahir Abu Raas Emad Awadh Ben Srity Department of Data Communications and Computer Networks University of Benghazi Benghazi Libya
Interior gateway protocols are among the routing protocols with the fastest expanding usage in networking technologies because they provide features that enable these algorithms to communicate together in a standard a...
来源: 评论
Event-driven bi-fidelity control for efficient and reliable robotic manipulation
收藏 引用
Results in Engineering 2025年 26卷
作者: Alsaade, Fawaz W. Al-zahrani, Mohammed S. Alsaadi, Fuad E. Department of Computer Science College of Computer Sciences and Information Technology King Faisal University Al-Ahsa31982 Saudi Arabia Department of Computer Networks and Communications College of Computer Sciences and Information Technology King Faisal University Al-Ahsa31982 Saudi Arabia Communication Systems and Networks Research Group Department of Electrical and Computer Engineering Faculty of Engineering King Abdulaziz University Jeddah Saudi Arabia
This paper proposes a novel bi-fidelity control framework for robotic manipulators that integrates a high-fidelity model predictive control (MPC) scheme with a low-fidelity Long Short-Term Memory (LSTM) neural network... 详细信息
来源: 评论