咨询与建议

限定检索结果

文献类型

  • 4,462 篇 会议
  • 3,037 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,577 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,747 篇 工学
    • 3,707 篇 计算机科学与技术...
    • 3,036 篇 软件工程
    • 1,267 篇 信息与通信工程
    • 710 篇 控制科学与工程
    • 622 篇 电气工程
    • 528 篇 生物工程
    • 400 篇 电子科学与技术(可...
    • 336 篇 网络空间安全
    • 294 篇 生物医学工程(可授...
    • 276 篇 机械工程
    • 248 篇 安全科学与工程
    • 215 篇 光学工程
    • 181 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
    • 171 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,975 篇 理学
    • 1,058 篇 数学
    • 578 篇 生物学
    • 381 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 251 篇 系统科学
    • 168 篇 化学
  • 1,224 篇 管理学
    • 770 篇 管理科学与工程(可...
    • 516 篇 图书情报与档案管...
    • 372 篇 工商管理
  • 398 篇 法学
    • 257 篇 社会学
    • 150 篇 法学
  • 315 篇 医学
    • 254 篇 临床医学
    • 235 篇 基础医学(可授医学...
  • 162 篇 经济学
    • 161 篇 应用经济学
  • 78 篇 农学
  • 59 篇 教育学
  • 58 篇 军事学
  • 26 篇 文学
  • 15 篇 艺术学
  • 1 篇 历史学

主题

  • 256 篇 accuracy
  • 250 篇 deep learning
  • 220 篇 security
  • 209 篇 machine learning
  • 197 篇 feature extracti...
  • 196 篇 internet of thin...
  • 180 篇 authentication
  • 169 篇 training
  • 165 篇 computational mo...
  • 141 篇 privacy
  • 137 篇 cryptography
  • 135 篇 real-time system...
  • 133 篇 protocols
  • 124 篇 blockchain
  • 118 篇 predictive model...
  • 107 篇 artificial intel...
  • 101 篇 support vector m...
  • 100 篇 cloud computing
  • 96 篇 data privacy
  • 93 篇 wireless sensor ...

机构

  • 229 篇 school of cyber ...
  • 190 篇 institute of inf...
  • 97 篇 school of cyber ...
  • 92 篇 school of cyber ...
  • 79 篇 college of cyber...
  • 60 篇 school of comput...
  • 60 篇 department of co...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 50 篇 school of cyber ...
  • 46 篇 college of compu...
  • 44 篇 school of cyber ...
  • 41 篇 department of co...
  • 41 篇 school of comput...
  • 40 篇 school of inform...
  • 32 篇 peng cheng labor...
  • 32 篇 state key labora...
  • 31 篇 school of comput...
  • 31 篇 southeast univer...

作者

  • 61 篇 choo kim-kwang r...
  • 39 篇 muhaidat sami
  • 39 篇 zhou pan
  • 37 篇 huang qingming
  • 33 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 26 篇 mohammad kamrul ...
  • 25 篇 hu shengshan
  • 25 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 hai jin
  • 21 篇 peng hao
  • 21 篇 ma jianfeng
  • 21 篇 cao xiaochun
  • 20 篇 liu yang
  • 20 篇 dehghantanha ali
  • 20 篇 wang qian
  • 19 篇 guizani mohsen

语言

  • 6,832 篇 英文
  • 680 篇 其他
  • 69 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering - Cyber Security"
7577 条 记 录,以下是111-120 订阅
排序:
Resource investment for DDoS attack resistant SDN: a practical assessment
收藏 引用
science China(Information sciences) 2023年 第7期66卷 112-129页
作者: Bin YUAN Fan ZHANG Jun WAN Huan ZHAO Shui YU Deqing ZOU Qiangsheng HUA Hai JIN School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Huazhong University of Science and Technology Research Institute School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science University of Technology Sydney
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi... 详细信息
来源: 评论
rafPS:A shapley-based visual analytics approach to interpret traffic
收藏 引用
Computational Visual Media 2024年 第6期10卷 1101-1119页
作者: Zezheng Feng Yifan Jiang Hongjun Wang Zipei Fan Yuxin Ma Shuang-Hua Yang Huamin Qu Xuan Song Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 18055China Department of Computer Science and Engineering Hong Kong University of Science and TechnologyHong KongChina Department of Computer Science University of ReadingBerkshire RG66AHUK Center for Spatial Information Science the University of TokyoTokyo 113-00331Japan Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Southern University of Science and TechnologyShenzhen 518055China
Recent achievements in deep learning(DL)have demonstrated its potential in predicting traffic *** predictions are beneficial for understanding the situation and making traffic control ***,most state-of-the-art DL mode... 详细信息
来源: 评论
Enhancing Wireless Sensor Network Data Collection through Aerial Unmanned Vehicles
Enhancing Wireless Sensor Network Data Collection through Ae...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Ali Alheeti, Khattab M. Najim, Ali Hamza Satar, Nurhizam Safie Mohd Aliesawi, Salah A. Hashim, Aisha Hassan Abdallah Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq Faculty of Engineering Department of Electrical and Computer Engineering International Islamic University Malaysia Selangor Malaysia
This study addresses the critical aspect of data collection within Wireless Sensor Networks (WSNs), which consist of autonomous, compact sensor devices deployed to monitor environmental conditions. These networks have... 详细信息
来源: 评论
Multi-Layer Perceptrons and Convolutional Neural Networks Based Side-Channel Attacks on AES Encryption
Multi-Layer Perceptrons and Convolutional Neural Networks Ba...
收藏 引用
2023 International Conference on engineering Technology and Technopreneurship, ICE2T 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Center for Cyber Security Faculty of Information Science and Technology Bangi 43600 Malaysia Department of Computer Techniques Engineering Baghdad Iraq
Side - channel attacks (SCA) exploit vulnerabilities introduced by insecure implementations in order to get information about the data that is being processed or the data itself via device leakages. The majority of mo... 详细信息
来源: 评论
Detecting Deepfake Videos using Face Recognition and Neural Networks  1
Detecting Deepfake Videos using Face Recognition and Neural ...
收藏 引用
1st IEEE International Conference on Cognitive Robotics and Intelligent Systems, ICC - ROBINS 2024
作者: Murugan, Muthu Aravind Mathu, T. Priya, S Jeba Karunya Institute of Technology and Sciences Computer Science and Engineering Coimbatore India Karunya Institute of Technology and Sciences Data Science and Cyber Security Coimbatore India
Deepfake videos created using advanced artificial intelligence techniques, pose a significant threat to digital media credibility. This project introduces a holistic strategy for identifying these videos, incorporatin... 详细信息
来源: 评论
Advancing Multiclass Emotion Recognition with CNN-RNN Architecture and Illuminating Module for Real-time Precision using Facial Expressions
Advancing Multiclass Emotion Recognition with CNN-RNN Archit...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering science, AMATHE 2024
作者: Prince, Simrith C. Babu, Nirmal Varghese Computer Science And Engineering Karunya Institute Of Technology And Sciences Coimbatore India Data Science And Cyber Security Karunya Institute Of Technology And Sciences Coimbatore India
Emotions, intrinsic to the human experience, serve as the catalyst for a groundbreaking technological innovation in multiclass emotion recognition through facial expressions. This study introduces a revolutionary syst... 详细信息
来源: 评论
A Super Learner Ensemble-based Intrusion Detection System to Mitigate Network Attacks  5
A Super Learner Ensemble-based Intrusion Detection System to...
收藏 引用
5th International Conference on Data Analytics for Business and Industry, ICDABI 2024
作者: Ajayi, Ojo John Sodiya, Adesina Simon Bagiwa, Mustapha Aminu Olowookere, Toluwase Ayobami Department of Cyber Security Abuja Nigeria Federal University of Agriculture Department of Computer Science Abeokuta Nigeria Ahmadu Bello University Department of Computer Science Zaria Nigeria Redeemer's University Department of Computer Science Ede Nigeria
Governments and corporate institutions are now mostly reliant on integrated digital infrastructures. These digital infrastructures are usually targets of cyber threats such as intrusion, for which intrusion detection ... 详细信息
来源: 评论
Unveiling the Nexus: Exploring the Societal Implications of AI-Driven cybersecurity and Data Analysis  13
Unveiling the Nexus: Exploring the Societal Implications of ...
收藏 引用
13th International Conference on System Modeling and Advancement in Research Trends, SMART 2024
作者: Arif, Mohd Ahmad, Shahnawaz Nazim, Mohd Ahmad, Javed Onyarin, Ogala Justin Galgotias University Department of Computer Science Engineering and Technology Greater Noida India School of Computer Science Engineering and Technology Bennett University Greater Noida India Noida Institute of Engineering and Technology Department of Computer Science Greater Noida India University of Delta Pmb Cyber Security Department Delta State Agbor2090 Nigeria
AI when integrated with cybersecurity and data analysis forms a new field that will have great impact on the society. The present research focuses on the social consequences of integrating AI for cybersecurity and big... 详细信息
来源: 评论
Crime Against Women in India: Statistical Analysis Using Linear Regression  2
Crime Against Women in India: Statistical Analysis Using Lin...
收藏 引用
2nd International Conference on Advanced Computing and Communication Technologies, ICACCTech 2024
作者: Mim, Zarin Tasnim Paul, Rittika Foysal, Mollah Md Tohfa, Fairuz Nowshin Mahi, Shah Abrar Bangalore India Bangalore India B-Tech of Computer Science and Engineering East Delta University Chattagram Bangladesh B-Tech of Computer Science and Engineering-Cyber Security Chandigarh University Delhi India
The crime reports of offenses occurring against women all over India are increasing day by day. It has become one of today's most concerning socio-economic and cultural issues. Crime against women hampers the over... 详细信息
来源: 评论
Breast Cancer Detection using Domain-Adversarial Training (DANN) with Invariant Risk Minimization (IRM) Hybrid Approach  3
Breast Cancer Detection using Domain-Adversarial Training (D...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Akash, K.V. Daniel, Esther Seetha, S. Durga, S. Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Cmr Institute of Technology Department of Information Science & Engineering India Amrita Vishwa Vidyapeetham Tifac Core in Cyber Security Amrita School of Engineering India
The breast cancer detection performs a key function in the health care network. The precise and early detection of cancer in the breast could aid to save life of the sufferer. The traditional machine learning methods ... 详细信息
来源: 评论