咨询与建议

限定检索结果

文献类型

  • 4,462 篇 会议
  • 3,037 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,577 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,747 篇 工学
    • 3,707 篇 计算机科学与技术...
    • 3,036 篇 软件工程
    • 1,267 篇 信息与通信工程
    • 710 篇 控制科学与工程
    • 622 篇 电气工程
    • 528 篇 生物工程
    • 400 篇 电子科学与技术(可...
    • 336 篇 网络空间安全
    • 294 篇 生物医学工程(可授...
    • 276 篇 机械工程
    • 248 篇 安全科学与工程
    • 215 篇 光学工程
    • 181 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
    • 171 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,975 篇 理学
    • 1,058 篇 数学
    • 578 篇 生物学
    • 381 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 251 篇 系统科学
    • 168 篇 化学
  • 1,224 篇 管理学
    • 770 篇 管理科学与工程(可...
    • 516 篇 图书情报与档案管...
    • 372 篇 工商管理
  • 398 篇 法学
    • 257 篇 社会学
    • 150 篇 法学
  • 315 篇 医学
    • 254 篇 临床医学
    • 235 篇 基础医学(可授医学...
  • 162 篇 经济学
    • 161 篇 应用经济学
  • 78 篇 农学
  • 59 篇 教育学
  • 58 篇 军事学
  • 26 篇 文学
  • 15 篇 艺术学
  • 1 篇 历史学

主题

  • 256 篇 accuracy
  • 250 篇 deep learning
  • 220 篇 security
  • 209 篇 machine learning
  • 197 篇 feature extracti...
  • 196 篇 internet of thin...
  • 180 篇 authentication
  • 169 篇 training
  • 165 篇 computational mo...
  • 141 篇 privacy
  • 137 篇 cryptography
  • 135 篇 real-time system...
  • 133 篇 protocols
  • 124 篇 blockchain
  • 118 篇 predictive model...
  • 107 篇 artificial intel...
  • 101 篇 support vector m...
  • 100 篇 cloud computing
  • 96 篇 data privacy
  • 93 篇 wireless sensor ...

机构

  • 229 篇 school of cyber ...
  • 190 篇 institute of inf...
  • 97 篇 school of cyber ...
  • 92 篇 school of cyber ...
  • 79 篇 college of cyber...
  • 60 篇 school of comput...
  • 60 篇 department of co...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 50 篇 school of cyber ...
  • 46 篇 college of compu...
  • 44 篇 school of cyber ...
  • 41 篇 department of co...
  • 41 篇 school of comput...
  • 40 篇 school of inform...
  • 32 篇 peng cheng labor...
  • 32 篇 state key labora...
  • 31 篇 school of comput...
  • 31 篇 southeast univer...

作者

  • 61 篇 choo kim-kwang r...
  • 39 篇 muhaidat sami
  • 39 篇 zhou pan
  • 37 篇 huang qingming
  • 33 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 26 篇 mohammad kamrul ...
  • 25 篇 hu shengshan
  • 25 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 hai jin
  • 21 篇 peng hao
  • 21 篇 ma jianfeng
  • 21 篇 cao xiaochun
  • 20 篇 liu yang
  • 20 篇 dehghantanha ali
  • 20 篇 wang qian
  • 19 篇 guizani mohsen

语言

  • 6,832 篇 英文
  • 680 篇 其他
  • 69 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering - Cyber Security"
7577 条 记 录,以下是91-100 订阅
排序:
RCDS:a right-confirmable data-sharing model based on symbol mapping coding and blockchain
收藏 引用
Frontiers of Information Technology & Electronic engineering 2023年 第8期24卷 1194-1213页
作者: Liang WANG Shunjiu HUANG Lina ZUO Jun LI Wenyuan LIU School of Cyber Security and Computer Hebei UniversityBaoding071000China Xiong’an Intelligent City Innovation Federation Xiong’an071700China School of Information Science and Engineering Yanshan UniversityQinhuangdao066000China
The problem of data right confirmation is a long-term bottleneck in data *** methods for confirming data rights lack credibility owing to poor supervision,and work only with specific data types because of their techni... 详细信息
来源: 评论
Framework for Cloud-Based Data Management in Autonomous Vehicles
Framework for Cloud-Based Data Management in Autonomous Vehi...
收藏 引用
2025 IEEE International Students' Conference on Electrical, Electronics and computer science, SCEECS 2025
作者: Pallapothu, Harshith Gopi Krishna, G. Sunil, Digvijay Teja Yadav, S. Nagasundari, S. Pes University Dept. of Computer Science & Engineering Bengaluru India Research Center for Information Security Forensics and Cyber Resilience Pes University Dept. of Computer Science & Engineering Bengaluru India
The increasing adoption of autonomous vehicles has driven the need for robust data management solutions that support real-time operations and ensure vehicle safety and efficiency. This work introduces a cloud-based fr... 详细信息
来源: 评论
Fortifying Smart Grids: A Holistic Assessment Strategy against cyber Attacks and Physical Threats for Intelligent Electronic Devices
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2579-2609页
作者: Yangrong Chen June Li Yu Xia Ruiwen Zhang Lingling Li Xiaoyu Li Lin Ge School of Computer Science Zhengzhou University of AeronauticsZhengzhou450046China Henan Xin’an Century Technology Co. Ltd.Henan Data Security Engineering Technology Research CenterZhengzhou450046China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan430072China
Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control *** the context of the heightened security c... 详细信息
来源: 评论
Enhanced Deep Learning Approaches for Robust Darknet Traffic Classification  3
Enhanced Deep Learning Approaches for Robust Darknet Traffic...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Etyang, Felix Pavithran, Pramod Mwendwa, Gideon Mandela, Ngaira Hillary, Musiime School of Engineering Cochin University of Science & Technology Department of Computer Science Cochin India School of Cyber Security and Digital Forensics National Forensics Sciences University Gandhinagar India School of Cyber Security and Digital Forensics National Forensics Sciences University Jinja Uganda
The classification of darknet traffic remains a pivotal task in modern cybersecurity efforts, necessitating advanced analytical techniques to address malicious activities pre-emptively. This study introduces and compa... 详细信息
来源: 评论
Extraction of Actionable Threat Intelligence from Dark Web Data  5
Extraction of Actionable Threat Intelligence from Dark Web D...
收藏 引用
5th International Conference on Control, Communication and Computing, ICCC 2023
作者: Varghese, Varsha Mahalakshmi, S. Senthilkumar, K.B. ER&DCI Institute of Technology Cyber Forensics and Information Security Department of Computer Science & Engineering Thiruvananthapuram India Cyber Security Group Centre for Development of Advanced Computing Thiruvananthapuram India
Darknet has emerged as an excellent platform for cybercriminals to conduct various illicit activities such as operating a fully functional crypto-currency-based marketplace or maintaining a highly anonymous communicat... 详细信息
来源: 评论
Performance Analysis of Energy and Secure Efficient Routing for Wireless Sensor Networks
Performance Analysis of Energy and Secure Efficient Routing ...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Hussein, Zainab Mohammed Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Wireless Sensor Networks (WSNs) are essential for various applications, but their architecture makes them vulnerable to attacks. While traditional security methods like authentication and encryption offer some protect... 详细信息
来源: 评论
Internet of Things Intrusion Detection System Based on Convolutional Neural Network
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 2119-2135页
作者: Jie Yin Yuxuan Shi Wen Deng Chang Yin Tiannan Wang Yuchen Song Tianyao Li Yicheng Li Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjingChina
In recent years, the Internet of Things (IoT) technology has developedby leaps and bounds. However, the large and heterogeneous networkstructure of IoT brings high management costs. In particular, the low costof IoT d... 详细信息
来源: 评论
A Review on Crop Yield Prediction using Deep Learning  8
A Review on Crop Yield Prediction using Deep Learning
收藏 引用
8th International Conference on Inventive Systems and Control, ICISC 202
作者: Verma, Sheily Singh, Shubham CUC-Ulster University Department of Computer Science/ Cyber Security Doha Qatar Era Smith Technology Noida India
The integration of cutting-edge technology into agricultural practices has catalyzed a transformative shift in global agriculture. This research study focuses on the revolutionary impact of deep learning approaches on... 详细信息
来源: 评论
An Early Warning Model of Telecommunication Network Fraud Based on User Portrait
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1561-1576页
作者: Wen Deng Guangjun Liang Chenfei Yu Kefan Yao Chengrui Wang Xuan Zhang Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Department of Public Security of Jiangsu Province Key Laboratory of Digital ForensicsNanjingChina
With the frequent occurrence of telecommunications and networkfraud crimes in recent years, new frauds have emerged one after another whichhas caused huge losses to the people. However, due to the lack of an effective... 详细信息
来源: 评论
Novel Architecture of security Orchestration, Automation and Response in Internet of Blended Environment
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 199-223页
作者: Minkyung Lee Julian Jang-Jaccard Jin Kwak ISAA Lab Department of Cyber SecurityAjou UniversitySuwon16499Korea Department of Computer Science and Information Technology Massey UniversityAuckland0745New Zealand Department of Cyber Security Ajou UniversitySuwon16499Korea
New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent *** technologies are used in diverse environments,such... 详细信息
来源: 评论