咨询与建议

限定检索结果

文献类型

  • 4,459 篇 会议
  • 3,002 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,712 篇 工学
    • 3,673 篇 计算机科学与技术...
    • 3,036 篇 软件工程
    • 1,254 篇 信息与通信工程
    • 684 篇 控制科学与工程
    • 613 篇 电气工程
    • 528 篇 生物工程
    • 394 篇 电子科学与技术(可...
    • 331 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 242 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
    • 164 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,964 篇 理学
    • 1,058 篇 数学
    • 573 篇 生物学
    • 379 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 249 篇 系统科学
    • 165 篇 化学
  • 1,214 篇 管理学
    • 762 篇 管理科学与工程(可...
    • 514 篇 图书情报与档案管...
    • 371 篇 工商管理
  • 399 篇 法学
    • 257 篇 社会学
    • 151 篇 法学
  • 317 篇 医学
    • 257 篇 临床医学
    • 238 篇 基础医学(可授医学...
  • 161 篇 经济学
    • 160 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 26 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 256 篇 accuracy
  • 246 篇 deep learning
  • 218 篇 security
  • 207 篇 machine learning
  • 197 篇 feature extracti...
  • 194 篇 internet of thin...
  • 182 篇 authentication
  • 171 篇 training
  • 164 篇 computational mo...
  • 140 篇 privacy
  • 137 篇 cryptography
  • 135 篇 real-time system...
  • 133 篇 protocols
  • 120 篇 blockchain
  • 118 篇 predictive model...
  • 105 篇 artificial intel...
  • 101 篇 support vector m...
  • 99 篇 cloud computing
  • 96 篇 data privacy
  • 92 篇 computer science

机构

  • 229 篇 school of cyber ...
  • 191 篇 institute of inf...
  • 96 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 80 篇 college of cyber...
  • 61 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 50 篇 school of cyber ...
  • 48 篇 college of compu...
  • 43 篇 school of cyber ...
  • 42 篇 school of comput...
  • 41 篇 department of co...
  • 40 篇 school of inform...
  • 35 篇 department of co...
  • 34 篇 state key labora...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 39 篇 muhaidat sami
  • 39 篇 zhou pan
  • 37 篇 huang qingming
  • 33 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 cao xiaochun
  • 21 篇 peng hao
  • 21 篇 ma jianfeng
  • 21 篇 liu yang
  • 21 篇 hai jin
  • 20 篇 dehghantanha ali
  • 20 篇 wang qian
  • 19 篇 guizani mohsen

语言

  • 6,827 篇 英文
  • 648 篇 其他
  • 68 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7539 条 记 录,以下是51-60 订阅
排序:
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
Machine Learning for Threat Detection
Machine Learning for Threat Detection
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Sutanto, Dustin Fransisca, Febri Liem, Steven Chowanda, Andry Muliono, Yohan Izdihar, Zahra Nabila School of Computer Science Cyber Security Program Computer Science Department Bina Nusantara Jakarta Indonesia School of Computer Science Computer Science Program Computer Science Department Bina Nusantara Jakarta Indonesia
These days almost all people in the world use the Internet as the internet is constantly evolving. cyber attack scale are increased thanks to cybercriminals that have become sophisticated in employing threats. Since t... 详细信息
来源: 评论
Forward Legal Anonymous Group Pairing-Onion Routing for Mobile Opportunistic Networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第07期24卷 6595-6612页
作者: Zhu, Xiuzhen Lin, Limei Huang, Yanze Wang, Xiaoding Hsieh, Sun-Yuan Wu, Jie Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan Temple University Department of Computer and Information Science 1925 N. 12th St PhiladelphiaPA19122 United States
Mobile Opportunistic Networks (MONs) often experience frequent interruptions in end-to-end connections, which increases the likelihood of message loss during delivery and makes users more susceptible to various cyber ... 详细信息
来源: 评论
security Challenges and Issues in Cloud Computing
Security Challenges and Issues in Cloud Computing
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Zakiyyah, Rika Permana, Daniel Valenecio, Devan Chowanda, Andry Muliono, Yohan Izdihar, Zahra Nabila Cyber Security Program Computer Science Department School of Computer Science Bina Nusantara Jakarta Indonesia Computer Science Program Computer Science Department School of Computer Science Bina Nusantara Jakarta Indonesia
Managing data has changed significantly because of cloud computing, which offers scalabe, flexible and reasonably priced solutions to enterprises and to people as well such as Amazon, Google, and Microsoft expanding t... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph Networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
Strategies for Building and Maintaining Secure Web Applications  5
Strategies for Building and Maintaining Secure Web Applicati...
收藏 引用
5th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2024
作者: Sathiyapriyan, C. Manikandan, B. Gokul, S. Satheesh, Rewin Nivetha, S. Leelavathy, S. Aarupadai Veedu Institute of Technology Cyber Security Department of Computer Science and Engineering Chennai603104 India Aarupadai Veedu Institute of Technology Department of Computer Science and Engineering Chennai603104 India Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai600119 India
Ensuring the security of web applications is paramount in safeguarding sensitive data and maintaining user trust. This study presents a comprehensive overview of strategies for building and maintaining secure web appl... 详细信息
来源: 评论
Advancing Stance Detection of Political Fan Pages: A Multimodal Approach  24
Advancing Stance Detection of Political Fan Pages: A Multimo...
收藏 引用
33rd Companion of the ACM World Wide Web Conference, WWW 2023
作者: Kuo, Kuan-Hung Wang, Ming-Hung Kao, Hung-Yu Dai, Yu-Chen National Chung Cheng University Department of Computer Science and Information Engineering Chiayi Taiwan National Institute of Cyber Security Taipei Taiwan
The evolution of political campaigns is evident with the ascent of social media. Ideological beliefs are increasingly disseminated through political-affiliated fan pages. The interaction between politicians and the ge... 详细信息
来源: 评论
Omni Contextual Aggregation Networks for High-Fidelity Image Inpainting
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年 第6期35卷 6129-6144页
作者: Peng, Jinjia Li, Mengkai Wang, Bingyan Wang, Huibing Hebei University School of Cyber Security and Computer Hebei China Hebei Machine Vision Engineering Research Center China Dalian Maritime University College of Information Science and Technology Liaoning China
Image inpainting aims to restore a realistic image from a damaged or incomplete version. Although Transformer-based methods have achieved impressive results by modeling long-range dependencies, the inherent quadratic ... 详细信息
来源: 评论
A MULTIMODAL FRAMEWORK FOR SATIRE VS. SARCASM DETECTION  15
A MULTIMODAL FRAMEWORK FOR SATIRE VS. SARCASM DETECTION
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Goyal, Devansh Mishra, Santosh Kumar Rai, Vikash Kumar Department of Computer Science and Engineering RGIPT Jais Amethi India School of Cyber Security and Digital Forensics NFSU Goa Goa India
Sarcasm and satire are common ways to communicate complicated ideas with humor and irony, both expressing criticism or mockery. Detecting sarcasm vs. satire in real life can foster better communication by understandin... 详细信息
来源: 评论
Cowrie SSH Honeypot: Architecture, Improvements and Data Visualization  23
Cowrie SSH Honeypot: Architecture, Improvements and Data Vis...
收藏 引用
23rd RoEduNet Conference: Networking in Education and Research, RoEduNet 2024
作者: Nastase, Vlad-Iulius Mihailescu, Maria-Elena Weisz, Sergiu Dagilis, Lukas Vytautas Mihai, Darius Carabas, Mihai University POLITEHNICA Bucharest Bucharest Department of Computer Science Romania NRD Cyber Security Vilnius Lithuania
As the competition between threat actors and defenders in the security landscape continues, honeypot deployments become more common as a source of threat intelligence. Yet, documentation for these systems is usually s... 详细信息
来源: 评论