咨询与建议

限定检索结果

文献类型

  • 4,486 篇 会议
  • 2,991 篇 期刊文献
  • 77 册 图书

馆藏范围

  • 7,554 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,694 篇 工学
    • 3,658 篇 计算机科学与技术...
    • 3,023 篇 软件工程
    • 1,249 篇 信息与通信工程
    • 679 篇 控制科学与工程
    • 606 篇 电气工程
    • 527 篇 生物工程
    • 392 篇 电子科学与技术(可...
    • 331 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 243 篇 安全科学与工程
    • 214 篇 光学工程
    • 179 篇 仪器科学与技术
    • 178 篇 动力工程及工程热...
    • 163 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,957 篇 理学
    • 1,054 篇 数学
    • 572 篇 生物学
    • 379 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 250 篇 系统科学
    • 165 篇 化学
  • 1,207 篇 管理学
    • 761 篇 管理科学与工程(可...
    • 507 篇 图书情报与档案管...
    • 372 篇 工商管理
  • 398 篇 法学
    • 256 篇 社会学
    • 151 篇 法学
  • 312 篇 医学
    • 254 篇 临床医学
    • 237 篇 基础医学(可授医学...
  • 162 篇 经济学
    • 162 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 25 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 262 篇 accuracy
  • 249 篇 deep learning
  • 226 篇 security
  • 207 篇 machine learning
  • 203 篇 feature extracti...
  • 195 篇 internet of thin...
  • 182 篇 authentication
  • 168 篇 computational mo...
  • 167 篇 training
  • 139 篇 privacy
  • 136 篇 protocols
  • 136 篇 cryptography
  • 135 篇 real-time system...
  • 121 篇 predictive model...
  • 120 篇 blockchain
  • 111 篇 artificial intel...
  • 105 篇 cloud computing
  • 102 篇 support vector m...
  • 96 篇 encryption
  • 95 篇 data privacy

机构

  • 235 篇 school of cyber ...
  • 193 篇 institute of inf...
  • 99 篇 school of cyber ...
  • 94 篇 school of cyber ...
  • 82 篇 college of cyber...
  • 63 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 51 篇 school of cyber ...
  • 44 篇 college of compu...
  • 41 篇 department of co...
  • 39 篇 school of inform...
  • 39 篇 school of comput...
  • 39 篇 school of cyber ...
  • 33 篇 peng cheng labor...
  • 32 篇 department of co...
  • 31 篇 school of comput...
  • 31 篇 department of co...

作者

  • 61 篇 choo kim-kwang r...
  • 40 篇 zhou pan
  • 39 篇 muhaidat sami
  • 37 篇 huang qingming
  • 35 篇 mohana
  • 30 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 23 篇 wang wei
  • 23 篇 cao xiaochun
  • 22 篇 weng jian
  • 21 篇 chen kai
  • 21 篇 hai jin
  • 20 篇 peng hao
  • 20 篇 ma jianfeng
  • 20 篇 liu yang
  • 20 篇 wang qian
  • 20 篇 bariah lina

语言

  • 6,327 篇 英文
  • 1,167 篇 其他
  • 67 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7554 条 记 录,以下是221-230 订阅
排序:
Intelligent Deep Learning Model for Securing KMS Through CSF Deviation Detection  13
Intelligent Deep Learning Model for Securing KMS Through CSF...
收藏 引用
13th International Conference on System Modeling and Advancement in Research Trends, SMART 2024
作者: Chauhan, Raj Ahmad, Shahnawaz Onyarin, Ogala Justin Kumar, Rajendra Noida Institute of Engineering and Technology Department of CSE-AIML Greater Noida India School of Computer Science Engineering and Technology Bennett University Greater Noida India University of Delta Cyber Security Department Delta State Nigeria Jamia Millia Islamia Department of Computer Science New Delhi India
Cloud computing has revolutionized data content stock and administration but concurrently it has increased the vulnerability factors especially Key Management System (KMS), which is crucial since it is used to protect... 详细信息
来源: 评论
An Enhanced Product Quality Evaluation using Hybrid LSTM-FCNN Model and GWO Algorithm for Social Media Sentiment Analysis  8
An Enhanced Product Quality Evaluation using Hybrid LSTM-FCN...
收藏 引用
8th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2024
作者: Raj Kumar, V.S. Kumaresan, T. Kanna, P. Rajesh Jagadeesan, S. Showmiya, P. Nithin, P. Bannari Amman Institute of Technology Department of Artificial Intelligence and Data Science Erode India Bannari Amman Institute of Technology Department of Computer Science and Engineering Erode India Nandha Engineering College Department of Computer Science and Engineering Erode India Nehru Institute of Technology Department of Computer Science - Cyber Security Coimbatore India Bannari Amman Institute of Technology Department of Artificial Intelligence and Machine Learning Erode India
Sentiment analysis is still in its developing era, and sometimes, struggles are faced in evaluating user sentiment due to the use of traditional models to analyze the relationship structures in social media interactio... 详细信息
来源: 评论
Fake News Detection Using Machine Learning Algorithm  2
Fake News Detection Using Machine Learning Algorithm
收藏 引用
2nd IEEE International Conference on Communication, security and Artificial Intelligence, ICCSAI 2023
作者: Narkhede, Apurva Patharkar, Devyani Chavan, Nekita Agrawal, Rahul Dhule, Chetan Iot Cyber Security G H Raisoni College of Engineering Department of Data Science Nagpur India
Fake news is a big concern since it spreads widely over social media and other media channels, creating significant social and national damage with devastating consequences. In order to address this issue, substantial... 详细信息
来源: 评论
Smart contract token-based privacy-preserving access control system for industrial Internet of Things
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 337-346页
作者: Weizheng Wang Huakun Huang Zhimeng Yin Thippa Reddy Gadekallu Mamoun Alazab Chunhua Su Department of Computer Science City University of Hong KongHong Kong SAR999077China Division of Computer Science University of AizuFukushima965-8580Japan School of Information Technology and Engineering Vellore Institute of TechnologyTamil NaduIndia College of Engineering IT and EnvironmentCharles Darwin UniversityAustralia School of Computer Science and Cyber Engineering Guangzhou UniversityChina
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily *** IIoT brings us much convenience,a series of security and scalability issues r... 详细信息
来源: 评论
Demand Response in Smart Grids: Challenges, Solutions, and security Implications  2
Demand Response in Smart Grids: Challenges, Solutions, and S...
收藏 引用
2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Abdelraouf, Hussien Gogolkiewicz, Ryker Kim, Nathaniel McCaughan, Nicholas Alanes, Joel Nadhaif, Ali Fouda, Mostafa M. Ibrahem, Mohamed I. Augusta University School of Computer and Cyber Sciences AugustaGA30912 United States George Mason University Cyber Security Engineering Department FairfaxVA United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States
This paper discusses demand response (DR) in the context of smart grids (SGs). DR is a method of controlling electricity consumption and production, usually for financial and security reasons. The topics covered inclu... 详细信息
来源: 评论
AI-driven Dynamic Workload Balancing for Real-time Applications on Cloud Infrastructure  7
AI-driven Dynamic Workload Balancing for Real-time Applicati...
收藏 引用
7th International Conference on Contemporary Computing and Informatics, IC3I 2024
作者: Sreeramulu, Madhusudhan Dasari Mohammed, Abdul Sajid Kalla, Dinesh Boddapati, Nagesh Natarajan, Yuvaraj American Express Department of Cyber Security United States University of the Cumberlands Department of School of Computer and Information Sciences KY United States Colorado Technical University Department of Computer Science CharlotteNC United States Microsoft Department of Computer Science CharlotteNC United States Sri Shakthi Institute of Engineering and Technology Department of Computer Science Engineering Tamil Nadu Coimbatore India
The specification provides a new, resource-efficient method of Dynamic Workload Balancing in AI-driven Real-time Applications over Cloud Infrastructure. The real-time application keeps processing data at high speeds, ... 详细信息
来源: 评论
Review of permission-based malware detection in Android
Review of permission-based malware detection in Android
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and security, ICABCS 2023
作者: Rawat, Nishant Amrita Singh, Avjeet Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India Center for Cyber Security and Cryptology Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India
A market study showed that an average of 70% of smartphone users use an android-based smartphone. The Android operating system draws numerous malware threats as a result of its popularity. The statistic reveals that 9... 详细信息
来源: 评论
Design of Smart Irrigation System Based on MLA
Design of Smart Irrigation System Based on MLA
收藏 引用
2023 IEEE World Conference on Applied Intelligence and Computing, AIC 2023
作者: Bobade, Gunjan Dhule, Chetan Khadilkar, Ritika Agrawal, Rahul Morris, Nekita Chavhan G H Rasioni College of Engineering IOT Cyber Security Department of Data Science Nagpur India
Agriculture has always been a fundamental aspectof Indian culture, making it the country's most efficient andimportant occupation. Over the years, smart and advanced techniques have been developed to optimize farm... 详细信息
来源: 评论
Detecting cross-site scripting attacks using machine learning: A systematic review
Detecting cross-site scripting attacks using machine learnin...
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and security, ICABCS 2023
作者: Baniya, D. Amrita Chaudhary, A. Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India Center for Cyber Security and Cryptology Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India
In today s age, many daily tasks are performed through the Internet using various web applications. While using the web application, the information and data are stored in the database of the network which can easily ... 详细信息
来源: 评论
An efficient data aggregation scheme with local differential privacy in smart grid
收藏 引用
Digital Communications and Networks 2022年 第3期8卷 333-342页
作者: Na Gai Kaiping Xue Bin Zhu Jiayu Yang Jianqing Liu Debiao He School of Cyber Science and Technology University of Science and Technology of ChinaHefeiAnhui230027China Department of Electronic Engineering and Information Science University of Science and Technology of ChinaHefeiAnhui230027China Department of Electrical and Computer Engineering University of Alabama in HuntsvilleHuntsvilleAL35899USA Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education School of Cyber Science and EngineeringWuhan UniversityWuhanBeihu430072China
By integrating the traditional power grid with information and communication technology, smart grid achieves dependable, efficient, and flexible grid data processing. The smart meters deployed on the user side of the ... 详细信息
来源: 评论