咨询与建议

限定检索结果

文献类型

  • 4,459 篇 会议
  • 3,002 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,712 篇 工学
    • 3,673 篇 计算机科学与技术...
    • 3,036 篇 软件工程
    • 1,254 篇 信息与通信工程
    • 684 篇 控制科学与工程
    • 613 篇 电气工程
    • 528 篇 生物工程
    • 394 篇 电子科学与技术(可...
    • 331 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 242 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
    • 164 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,964 篇 理学
    • 1,058 篇 数学
    • 573 篇 生物学
    • 379 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 249 篇 系统科学
    • 165 篇 化学
  • 1,214 篇 管理学
    • 762 篇 管理科学与工程(可...
    • 514 篇 图书情报与档案管...
    • 371 篇 工商管理
  • 399 篇 法学
    • 257 篇 社会学
    • 151 篇 法学
  • 317 篇 医学
    • 257 篇 临床医学
    • 238 篇 基础医学(可授医学...
  • 161 篇 经济学
    • 160 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 26 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 256 篇 accuracy
  • 246 篇 deep learning
  • 218 篇 security
  • 207 篇 machine learning
  • 197 篇 feature extracti...
  • 194 篇 internet of thin...
  • 182 篇 authentication
  • 171 篇 training
  • 164 篇 computational mo...
  • 140 篇 privacy
  • 137 篇 cryptography
  • 135 篇 real-time system...
  • 133 篇 protocols
  • 120 篇 blockchain
  • 118 篇 predictive model...
  • 105 篇 artificial intel...
  • 101 篇 support vector m...
  • 99 篇 cloud computing
  • 96 篇 data privacy
  • 92 篇 computer science

机构

  • 229 篇 school of cyber ...
  • 191 篇 institute of inf...
  • 96 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 80 篇 college of cyber...
  • 61 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 50 篇 school of cyber ...
  • 48 篇 college of compu...
  • 43 篇 school of cyber ...
  • 42 篇 school of comput...
  • 41 篇 department of co...
  • 40 篇 school of inform...
  • 35 篇 department of co...
  • 34 篇 state key labora...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 39 篇 muhaidat sami
  • 39 篇 zhou pan
  • 37 篇 huang qingming
  • 33 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 cao xiaochun
  • 21 篇 peng hao
  • 21 篇 ma jianfeng
  • 21 篇 liu yang
  • 21 篇 hai jin
  • 20 篇 dehghantanha ali
  • 20 篇 wang qian
  • 19 篇 guizani mohsen

语言

  • 6,827 篇 英文
  • 648 篇 其他
  • 68 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering - Cyber Security"
7539 条 记 录,以下是201-210 订阅
排序:
Red deer algorithm to detect the secret key of the monoalphabetic cryptosystem
收藏 引用
Soft Computing 2024年 第17-18期28卷 10569-10582页
作者: Jain, Ashish Bansal, Sulabh Das, Nripendra Narayan Gupta, Shyam Sunder Department of Information Technology School of Information Security and Data Science Manipal University Jaipur Jaipur303007 India Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Madhya Pradesh Gwalior474005 India
Encryption of a plaintext involves a secret key. The secret key of classical cryptosystems can be successfully determined by utilizing metaheuristic techniques. Monoalphabetic cryptosystem is one of the famous classic... 详细信息
来源: 评论
Machine Learning and Deep Learning Approaches for Fake News Detection: A Systematic Review of Techniques, Challenges, and Advancements
收藏 引用
IEEE Access 2025年 13卷 90433-90466页
作者: Bashaddadh, Omar Omar, Nazlia Mohd, Masnizah Khalid, Mohd Nor Akmal Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Centre for Artificial Intelligence Technology Bangi43600 Malaysia Seiyun University College of Computers Department of Computer Science Hadhramout Yemen Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Centre for Cyber Security Bangi43600 Malaysia
In response to the escalating threat of fake news on social media, this systematic literature review analyzes recent advancements in machine learning and deep learning approaches for its automated detection. Following... 详细信息
来源: 评论
Recognition of Facial Expressions and Emotions on the Face using the YOLOv5 Algorithm
Recognition of Facial Expressions and Emotions on the Face u...
收藏 引用
2023 International Workshop on Artificial Intelligence and Image Processing, IWAIIP 2023
作者: Gunawan, Alexander A. S. Kusnadi, Maximilianus Raymond Joseph, James Tristan Josan, William Edbert, Ivan Sebastian Bina Nusantara University School of Computer Science Computer Science Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Cyber Security Program Computer Science Department Jakarta11480 Indonesia
This study examines the significant influence of emotional states on individuals, recognizing that people are often confronted with numerous challenges and problems in their lives. Such challenges can give rise to fee... 详细信息
来源: 评论
A Survey Study of Social Media User Awareness Towards Personal Identifiable Information's Data security in Indonesian Millennial Generation  3
A Survey Study of Social Media User Awareness Towards Person...
收藏 引用
3rd International Conference on Electronic and Electrical engineering and Intelligent System, ICE3IS 2023
作者: Christie, Gabriel Alexander Ivan Trevan, Javier Achmad, Said Junior, Franz Adeta Nadia School of Computer Science Bina Nusantara University Cyber Security Program Computer Science Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
Online Social Network is a network communication platform where users have profiles that can be uniquely identified by the content sent. This content can be produced, consumed, and interacted with by other users. To c... 详细信息
来源: 评论
A stacked ensemble approach to detect cyber attacks based on feature selection techniques
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 316-331页
作者: Urmi, Wahida Ferdose Uddin, Mohammed Nasir Uddin, Md Ashraf Talukder, Md. Alamin Hasan, Md. Rahat Paul, Souvik Chanda, Moumita Ayoade, John Khraisat, Ansam Hossen, Rakib Imran, Faisal Department of Computer Science and Engineering Jagannath University Dhaka Bangladesh Department of Computer Science and Engineering International University of Business Agriculture and Technology Dhaka Bangladesh School of Information Technology Deakin University Waurn Ponds Campus Geelong Australia School of Information Technology Crown Institute of Higher Education 116 Pacific Highway North SydneyNSW2060 Australia Department of Cyber Security Bangabandhu Sheikh Mujibur Rahman Digital University Kaliakoir Gazipur1750 Bangladesh Department of Electrical and Computer Engineering University of Ottawa Canada
The exponential growth of data and increased reliance on interconnected systems have heightened the need for robust network security. cyber-Attack Detection Systems (CADS) are essential for identifying and mitigating ... 详细信息
来源: 评论
Performance Analysis on Web Development Programming Language (Javascript, Golang, PHP)
Performance Analysis on Web Development Programming Language...
收藏 引用
2023 International Conference on Information Technology and Computing, ICITCOM 2023
作者: Nabiil, Arkaan Makmur, Bintang Hermawan Wijaya, Reynard Wiratama Santoso Gunawan, Alexander Agung Edbert, Ivan Sebastian School of Computer Science Bina Nusantara University Cyber Security Program Computer Science Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
This paper aims to use an experimental approach to determine the best performing and most stable web programming languages for building a website. Through a comprehensive comparison of different languages such as Gola... 详细信息
来源: 评论
The Usage of Machine Learning on Penetration Testing Automation  3
The Usage of Machine Learning on Penetration Testing Automat...
收藏 引用
3rd International Conference on Electronic and Electrical engineering and Intelligent System, ICE3IS 2023
作者: Clintswood Lie, Delbert Giovanni Kuswandana, Lexiandy Nadia Achmad, Said Suhartono, Derwin School of Computer Science Bina Nusantara University Cyber Security Program Computer Science Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
Penetration testing is a method to assess the security within a network by performing or simulating a real-world cyber-attack on the network. It has been one of the best ways preferred by organizations to strengthen t... 详细信息
来源: 评论
An ensemble deep learning model for cyber threat hunting in industrial internet of things
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 101-110页
作者: Abbas Yazdinejad Mostafa Kazemi Reza M.Parizi Ali Dehghantanha Hadis Karimipour Cyber Science Lab School of Computer ScienceUniversity of GuelphOntarioCanada Department of Electrical Engineering Faculty of EngineeringShahed UniversityTehranIran College of Computing and Software Engineering Kennesaw State UniversityGAUSA School of Engineering University of GuelphOntarioCanada
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the... 详细信息
来源: 评论
Enhancing Anomaly Detection in Smart Water Metering Networks with LSTM-Autoencoder and Data Augmentation Techniques  4
Enhancing Anomaly Detection in Smart Water Metering Networks...
收藏 引用
4th International Multidisciplinary Information Technology and engineering Conference, IMITEC 2024
作者: Nelago Kanyama, Maria Bhunu Shava, Fungai Gamundani, Attlee M Hartmann, Andreas Namibia University of Science and Technology Department of Computer Science Windhoek Namibia Namibia University of Science and Technology Department of Cyber Security Windhoek Namibia Hydrology Institute of Groundwater Management Dresden Germany
Machine Learning (ML) based anomaly detection in Smart Water Metering Networks (SWMNs) and traditional water metering networks faces significant challenges, including small dataset sizes, unlabeled data, and class imb... 详细信息
来源: 评论
An Enhanced Product Quality Evaluation using Hybrid LSTM-FCNN Model and GWO Algorithm for Social Media Sentiment Analysis  8
An Enhanced Product Quality Evaluation using Hybrid LSTM-FCN...
收藏 引用
8th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2024
作者: Raj Kumar, V.S. Kumaresan, T. Kanna, P. Rajesh Jagadeesan, S. Showmiya, P. Nithin, P. Bannari Amman Institute of Technology Department of Artificial Intelligence and Data Science Erode India Bannari Amman Institute of Technology Department of Computer Science and Engineering Erode India Nandha Engineering College Department of Computer Science and Engineering Erode India Nehru Institute of Technology Department of Computer Science - Cyber Security Coimbatore India Bannari Amman Institute of Technology Department of Artificial Intelligence and Machine Learning Erode India
Sentiment analysis is still in its developing era, and sometimes, struggles are faced in evaluating user sentiment due to the use of traditional models to analyze the relationship structures in social media interactio... 详细信息
来源: 评论