咨询与建议

限定检索结果

文献类型

  • 4,486 篇 会议
  • 3,010 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,574 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,696 篇 工学
    • 3,660 篇 计算机科学与技术...
    • 3,026 篇 软件工程
    • 1,252 篇 信息与通信工程
    • 681 篇 控制科学与工程
    • 608 篇 电气工程
    • 527 篇 生物工程
    • 392 篇 电子科学与技术(可...
    • 333 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 243 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 178 篇 动力工程及工程热...
    • 163 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,959 篇 理学
    • 1,055 篇 数学
    • 572 篇 生物学
    • 379 篇 物理学
    • 340 篇 统计学(可授理学、...
    • 250 篇 系统科学
    • 165 篇 化学
  • 1,207 篇 管理学
    • 761 篇 管理科学与工程(可...
    • 507 篇 图书情报与档案管...
    • 372 篇 工商管理
  • 398 篇 法学
    • 256 篇 社会学
    • 151 篇 法学
  • 314 篇 医学
    • 255 篇 临床医学
    • 237 篇 基础医学(可授医学...
  • 163 篇 经济学
    • 162 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 25 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 265 篇 accuracy
  • 249 篇 deep learning
  • 226 篇 security
  • 207 篇 machine learning
  • 202 篇 feature extracti...
  • 195 篇 internet of thin...
  • 182 篇 authentication
  • 173 篇 training
  • 168 篇 computational mo...
  • 143 篇 privacy
  • 138 篇 cryptography
  • 135 篇 real-time system...
  • 135 篇 protocols
  • 122 篇 blockchain
  • 121 篇 predictive model...
  • 111 篇 artificial intel...
  • 102 篇 support vector m...
  • 101 篇 cloud computing
  • 96 篇 encryption
  • 95 篇 data privacy

机构

  • 232 篇 school of cyber ...
  • 194 篇 institute of inf...
  • 99 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 83 篇 college of cyber...
  • 62 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 51 篇 school of cyber ...
  • 46 篇 college of compu...
  • 43 篇 school of cyber ...
  • 41 篇 department of co...
  • 41 篇 school of comput...
  • 39 篇 school of inform...
  • 34 篇 state key labora...
  • 33 篇 department of co...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 40 篇 zhou pan
  • 39 篇 muhaidat sami
  • 37 篇 huang qingming
  • 34 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 chen kai
  • 21 篇 cao xiaochun
  • 20 篇 peng hao
  • 20 篇 ma jianfeng
  • 20 篇 liu yang
  • 20 篇 wang qian
  • 20 篇 hai jin
  • 19 篇 dehghantanha ali

语言

  • 6,346 篇 英文
  • 1,168 篇 其他
  • 67 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7574 条 记 录,以下是211-220 订阅
排序:
A stacked ensemble approach to detect cyber attacks based on feature selection techniques
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 316-331页
作者: Urmi, Wahida Ferdose Uddin, Mohammed Nasir Uddin, Md Ashraf Talukder, Md. Alamin Hasan, Md. Rahat Paul, Souvik Chanda, Moumita Ayoade, John Khraisat, Ansam Hossen, Rakib Imran, Faisal Department of Computer Science and Engineering Jagannath University Dhaka Bangladesh Department of Computer Science and Engineering International University of Business Agriculture and Technology Dhaka Bangladesh School of Information Technology Deakin University Waurn Ponds Campus Geelong Australia School of Information Technology Crown Institute of Higher Education 116 Pacific Highway North SydneyNSW2060 Australia Department of Cyber Security Bangabandhu Sheikh Mujibur Rahman Digital University Kaliakoir Gazipur1750 Bangladesh Department of Electrical and Computer Engineering University of Ottawa Canada
The exponential growth of data and increased reliance on interconnected systems have heightened the need for robust network security. cyber-Attack Detection Systems (CADS) are essential for identifying and mitigating ... 详细信息
来源: 评论
The Usage of Machine Learning on Penetration Testing Automation  3
The Usage of Machine Learning on Penetration Testing Automat...
收藏 引用
3rd International Conference on Electronic and Electrical engineering and Intelligent System, ICE3IS 2023
作者: Clintswood Lie, Delbert Giovanni Kuswandana, Lexiandy Nadia Achmad, Said Suhartono, Derwin School of Computer Science Bina Nusantara University Cyber Security Program Computer Science Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
Penetration testing is a method to assess the security within a network by performing or simulating a real-world cyber-attack on the network. It has been one of the best ways preferred by organizations to strengthen t... 详细信息
来源: 评论
An ensemble deep learning model for cyber threat hunting in industrial internet of things
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 101-110页
作者: Abbas Yazdinejad Mostafa Kazemi Reza M.Parizi Ali Dehghantanha Hadis Karimipour Cyber Science Lab School of Computer ScienceUniversity of GuelphOntarioCanada Department of Electrical Engineering Faculty of EngineeringShahed UniversityTehranIran College of Computing and Software Engineering Kennesaw State UniversityGAUSA School of Engineering University of GuelphOntarioCanada
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the... 详细信息
来源: 评论
Enhancing Anomaly Detection in Smart Water Metering Networks with LSTM-Autoencoder and Data Augmentation Techniques  4
Enhancing Anomaly Detection in Smart Water Metering Networks...
收藏 引用
4th International Multidisciplinary Information Technology and engineering Conference, IMITEC 2024
作者: Nelago Kanyama, Maria Bhunu Shava, Fungai Gamundani, Attlee M Hartmann, Andreas Namibia University of Science and Technology Department of Computer Science Windhoek Namibia Namibia University of Science and Technology Department of Cyber Security Windhoek Namibia Hydrology Institute of Groundwater Management Dresden Germany
Machine Learning (ML) based anomaly detection in Smart Water Metering Networks (SWMNs) and traditional water metering networks faces significant challenges, including small dataset sizes, unlabeled data, and class imb... 详细信息
来源: 评论
cyber security in Smart Cities and Its Challenges: A Systematic Literature Review  3
Cyber Security in Smart Cities and Its Challenges: A Systema...
收藏 引用
3rd International Conference on Electronic and Electrical engineering and Intelligent System, ICE3IS 2023
作者: Ruatta, Benedicto Theodore Piekarsa, Gabriel Jonatan Christian, Jeremia Edbert, Ivan Sebastian Gunawan, Alexander Agung Santoso School of Computer Science Bina Nusantara University Cyber Security Program Computer Science Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
At this time, the development of information and communication technology has mostly been used maximally to improve the quality of life of citizens around the world. The benefits that are obtained make some cities evo... 详细信息
来源: 评论
An Enhanced Product Quality Evaluation using Hybrid LSTM-FCNN Model and GWO Algorithm for Social Media Sentiment Analysis  8
An Enhanced Product Quality Evaluation using Hybrid LSTM-FCN...
收藏 引用
8th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2024
作者: Raj Kumar, V.S. Kumaresan, T. Kanna, P. Rajesh Jagadeesan, S. Showmiya, P. Nithin, P. Bannari Amman Institute of Technology Department of Artificial Intelligence and Data Science Erode India Bannari Amman Institute of Technology Department of Computer Science and Engineering Erode India Nandha Engineering College Department of Computer Science and Engineering Erode India Nehru Institute of Technology Department of Computer Science - Cyber Security Coimbatore India Bannari Amman Institute of Technology Department of Artificial Intelligence and Machine Learning Erode India
Sentiment analysis is still in its developing era, and sometimes, struggles are faced in evaluating user sentiment due to the use of traditional models to analyze the relationship structures in social media interactio... 详细信息
来源: 评论
Phishing Attack Awareness Among College Students  3
Phishing Attack Awareness Among College Students
收藏 引用
3rd International Conference on Electronic and Electrical engineering and Intelligent System, ICE3IS 2023
作者: Kenneth, Alvin Hayashi, Bernard Bryan Lionardi, Jason Richie, Stevanus Achmad, Said Junior, Franz Adeta Nadia School of Computer Science Bina Nusantara University Cyber Security Program Computer Science Department Jakarta11480 Indonesia School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
Phishing is a form of cyber-attack that uses social engineering techniques to trick individuals into providing sensitive information or clicking on malicious links, often through email or text messages. Social enginee... 详细信息
来源: 评论
Smart contract token-based privacy-preserving access control system for industrial Internet of Things
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 337-346页
作者: Weizheng Wang Huakun Huang Zhimeng Yin Thippa Reddy Gadekallu Mamoun Alazab Chunhua Su Department of Computer Science City University of Hong KongHong Kong SAR999077China Division of Computer Science University of AizuFukushima965-8580Japan School of Information Technology and Engineering Vellore Institute of TechnologyTamil NaduIndia College of Engineering IT and EnvironmentCharles Darwin UniversityAustralia School of Computer Science and Cyber Engineering Guangzhou UniversityChina
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily *** IIoT brings us much convenience,a series of security and scalability issues r... 详细信息
来源: 评论
Demand Response in Smart Grids: Challenges, Solutions, and security Implications  2
Demand Response in Smart Grids: Challenges, Solutions, and S...
收藏 引用
2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Abdelraouf, Hussien Gogolkiewicz, Ryker Kim, Nathaniel McCaughan, Nicholas Alanes, Joel Nadhaif, Ali Fouda, Mostafa M. Ibrahem, Mohamed I. Augusta University School of Computer and Cyber Sciences AugustaGA30912 United States George Mason University Cyber Security Engineering Department FairfaxVA United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States
This paper discusses demand response (DR) in the context of smart grids (SGs). DR is a method of controlling electricity consumption and production, usually for financial and security reasons. The topics covered inclu... 详细信息
来源: 评论
Intelligent Deep Learning Model for Securing KMS Through CSF Deviation Detection  13
Intelligent Deep Learning Model for Securing KMS Through CSF...
收藏 引用
13th International Conference on System Modeling and Advancement in Research Trends, SMART 2024
作者: Chauhan, Raj Ahmad, Shahnawaz Onyarin, Ogala Justin Kumar, Rajendra Noida Institute of Engineering and Technology Department of CSE-AIML Greater Noida India School of Computer Science Engineering and Technology Bennett University Greater Noida India University of Delta Cyber Security Department Delta State Nigeria Jamia Millia Islamia Department of Computer Science New Delhi India
Cloud computing has revolutionized data content stock and administration but concurrently it has increased the vulnerability factors especially Key Management System (KMS), which is crucial since it is used to protect... 详细信息
来源: 评论