咨询与建议

限定检索结果

文献类型

  • 4,486 篇 会议
  • 2,991 篇 期刊文献
  • 77 册 图书

馆藏范围

  • 7,554 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,694 篇 工学
    • 3,658 篇 计算机科学与技术...
    • 3,023 篇 软件工程
    • 1,249 篇 信息与通信工程
    • 679 篇 控制科学与工程
    • 606 篇 电气工程
    • 527 篇 生物工程
    • 392 篇 电子科学与技术(可...
    • 331 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 243 篇 安全科学与工程
    • 214 篇 光学工程
    • 179 篇 仪器科学与技术
    • 178 篇 动力工程及工程热...
    • 163 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,957 篇 理学
    • 1,054 篇 数学
    • 572 篇 生物学
    • 379 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 250 篇 系统科学
    • 165 篇 化学
  • 1,207 篇 管理学
    • 761 篇 管理科学与工程(可...
    • 507 篇 图书情报与档案管...
    • 372 篇 工商管理
  • 398 篇 法学
    • 256 篇 社会学
    • 151 篇 法学
  • 312 篇 医学
    • 254 篇 临床医学
    • 237 篇 基础医学(可授医学...
  • 162 篇 经济学
    • 162 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 25 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 262 篇 accuracy
  • 249 篇 deep learning
  • 226 篇 security
  • 207 篇 machine learning
  • 203 篇 feature extracti...
  • 195 篇 internet of thin...
  • 182 篇 authentication
  • 168 篇 computational mo...
  • 167 篇 training
  • 139 篇 privacy
  • 136 篇 protocols
  • 136 篇 cryptography
  • 135 篇 real-time system...
  • 121 篇 predictive model...
  • 120 篇 blockchain
  • 111 篇 artificial intel...
  • 105 篇 cloud computing
  • 102 篇 support vector m...
  • 96 篇 encryption
  • 95 篇 data privacy

机构

  • 235 篇 school of cyber ...
  • 193 篇 institute of inf...
  • 99 篇 school of cyber ...
  • 94 篇 school of cyber ...
  • 82 篇 college of cyber...
  • 63 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 51 篇 school of cyber ...
  • 44 篇 college of compu...
  • 41 篇 department of co...
  • 39 篇 school of inform...
  • 39 篇 school of comput...
  • 39 篇 school of cyber ...
  • 33 篇 peng cheng labor...
  • 32 篇 department of co...
  • 31 篇 school of comput...
  • 31 篇 department of co...

作者

  • 61 篇 choo kim-kwang r...
  • 40 篇 zhou pan
  • 39 篇 muhaidat sami
  • 37 篇 huang qingming
  • 35 篇 mohana
  • 30 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 23 篇 wang wei
  • 23 篇 cao xiaochun
  • 22 篇 weng jian
  • 21 篇 chen kai
  • 21 篇 hai jin
  • 20 篇 peng hao
  • 20 篇 ma jianfeng
  • 20 篇 liu yang
  • 20 篇 wang qian
  • 20 篇 bariah lina

语言

  • 6,327 篇 英文
  • 1,167 篇 其他
  • 67 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7554 条 记 录,以下是201-210 订阅
排序:
BSKCN and BSAML: blind signatures from the module lattice and the asymmetric module lattice
收藏 引用
Frontiers of computer science 2023年 第6期17卷 175-177页
作者: Xiaofan LIU Wei REN Kim-Kwang Raymond CHOO School of Computer Science China University of GeosciencesWuhan 430074China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX 78249-0631USA
1 Introduction Blind signature allows a user to obtain the signature of a message from a signer without revealing the information of the message,as well as defending against *** recent years,there have been increased ... 详细信息
来源: 评论
EG-Four: An Embedded GPU-Based Efficient ECC Cryptography Accelerator for Edge Computing
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第6期19卷 7291-7300页
作者: Dong, Jiankuo Zhang, Pinchang Sun, Kaisheng Xiao, Fu Zheng, Fangyu Lin, Jingqiang Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China Chinese Academy of Sciences State Key Laboratory of Information Security Institute of Information Engineering Beijing100007 China University of Science and Technology of China School of Cyber Security Hefei123456 China
With the continuous development of Industry 4.0 technology, the embedded devices in Industrial Internet of Things (IIoT) are showing explosive growth, and large-scale cyber attacks or related security incidents contin... 详细信息
来源: 评论
Implementing Vision Transformer to Model Emotions Recognition from Facial Expressions  4
Implementing Vision Transformer to Model Emotions Recognitio...
收藏 引用
4th International Conference on Artificial Intelligence and Data sciences, AiDAS 2023
作者: Chowanda, Andry Nadia Diana School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Cyber Security Program Computer Science Department Jakarta11480 Indonesia
Emotions are essential to social interaction between interlocutors. It provides essential meaning to social interaction. It is important to recognise emotions along with verbal cues to fully understand the true meanin... 详细信息
来源: 评论
Study of Cross-Site Request Forgery on Web-Based Application: Exploitations and Preventions  8
Study of Cross-Site Request Forgery on Web-Based Application...
收藏 引用
8th International Conference on computer science and Computational Intelligence, ICCSCI 2023
作者: Siahaan, Crisdeo Nuel Rufisanto, Mario Nolasco, Raymond Achmad, Said Siahaan, Chrisando Ryan Pardomuan Cyber Security Program Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia
Cross-Site Request Forgery (CSRF) is a prominent web exploit that continues to pose significant security risks, even on highly ranked websites. This research focuses on identifying the underlying vulnerability, unders... 详细信息
来源: 评论
Privacy-Preserving and Traceable Functional Encryption for Inner Product In Cloud Computing
收藏 引用
IEEE Transactions on Cloud Computing 2025年 第2期13卷 667-679页
作者: Qiu, Muyao Han, Jinguang Hao, Feng Sun, Chao Wu, Ge Southeast University School of Cyber Science and Engineering Nanjing210096 China Nanjing210096 China University of Warwick Department of Computer Science CoventryCV4 7AL United Kingdom
Cloud computing is a distributed infrastructure that centralizes server resources on a platform in order to provide services over the internet. Traditional public-key encryption protects data confidentiality in cloud ... 详细信息
来源: 评论
Development of Smart Lights to Reduce Electricity Usage by Using Fuzzy Logic  1
Development of Smart Lights to Reduce Electricity Usage by U...
收藏 引用
1st IEEE International Conference on Smart Technology, ICE-SMARTec 2023
作者: Djayapranata, Daniel Thetrasakti, Renaldy Arnaldo Theodora, Regina Gunawan, Alexander Agung Santoso Edbert, Ivan Sebastian School of Computer Science Bina Nusantara University Cyber Security Program Computer Science Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
In wealthy nations, the demand for electrical energy is steadily increasing, despite the scarcity of available resources. Considering that individuals spend approximately 80% of their lives indoors, it is imperative t... 详细信息
来源: 评论
Phishing Attack Awareness Among College Students  3
Phishing Attack Awareness Among College Students
收藏 引用
3rd International Conference on Electronic and Electrical engineering and Intelligent System, ICE3IS 2023
作者: Kenneth, Alvin Hayashi, Bernard Bryan Lionardi, Jason Richie, Stevanus Achmad, Said Junior, Franz Adeta Nadia School of Computer Science Bina Nusantara University Cyber Security Program Computer Science Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
Phishing is a form of cyber-attack that uses social engineering techniques to trick individuals into providing sensitive information or clicking on malicious links, often through email or text messages. Social enginee... 详细信息
来源: 评论
Red deer algorithm to detect the secret key of the monoalphabetic cryptosystem
收藏 引用
Soft Computing 2024年 第17-18期28卷 10569-10582页
作者: Jain, Ashish Bansal, Sulabh Das, Nripendra Narayan Gupta, Shyam Sunder Department of Information Technology School of Information Security and Data Science Manipal University Jaipur Jaipur303007 India Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Madhya Pradesh Gwalior474005 India
Encryption of a plaintext involves a secret key. The secret key of classical cryptosystems can be successfully determined by utilizing metaheuristic techniques. Monoalphabetic cryptosystem is one of the famous classic... 详细信息
来源: 评论
Performance Analysis on Web Development Programming Language (Javascript, Golang, PHP)
Performance Analysis on Web Development Programming Language...
收藏 引用
2023 International Conference on Information Technology and Computing, ICITCOM 2023
作者: Nabiil, Arkaan Makmur, Bintang Hermawan Wijaya, Reynard Wiratama Santoso Gunawan, Alexander Agung Edbert, Ivan Sebastian School of Computer Science Bina Nusantara University Cyber Security Program Computer Science Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
This paper aims to use an experimental approach to determine the best performing and most stable web programming languages for building a website. Through a comprehensive comparison of different languages such as Gola... 详细信息
来源: 评论
cyber security in Smart Cities and Its Challenges: A Systematic Literature Review  3
Cyber Security in Smart Cities and Its Challenges: A Systema...
收藏 引用
3rd International Conference on Electronic and Electrical engineering and Intelligent System, ICE3IS 2023
作者: Ruatta, Benedicto Theodore Piekarsa, Gabriel Jonatan Christian, Jeremia Edbert, Ivan Sebastian Gunawan, Alexander Agung Santoso School of Computer Science Bina Nusantara University Cyber Security Program Computer Science Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
At this time, the development of information and communication technology has mostly been used maximally to improve the quality of life of citizens around the world. The benefits that are obtained make some cities evo... 详细信息
来源: 评论