咨询与建议

限定检索结果

文献类型

  • 97 篇 会议
  • 68 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 167 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 83 篇 工学
    • 57 篇 计算机科学与技术...
    • 47 篇 软件工程
    • 27 篇 电气工程
    • 23 篇 电子科学与技术(可...
    • 19 篇 信息与通信工程
    • 10 篇 光学工程
    • 9 篇 仪器科学与技术
    • 9 篇 控制科学与工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 生物工程
    • 6 篇 机械工程
    • 6 篇 安全科学与工程
    • 4 篇 冶金工程
    • 4 篇 化学工程与技术
    • 4 篇 生物医学工程(可授...
    • 3 篇 动力工程及工程热...
    • 3 篇 网络空间安全
  • 54 篇 理学
    • 31 篇 数学
    • 23 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 7 篇 生物学
    • 5 篇 系统科学
    • 4 篇 化学
  • 21 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 9 篇 工商管理
    • 7 篇 图书情报与档案管...
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 5 篇 法学
    • 3 篇 法学
  • 5 篇 医学
    • 5 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 2 篇 农学
  • 1 篇 教育学

主题

  • 18 篇 optical fiber ne...
  • 17 篇 passive optical ...
  • 13 篇 optical fiber su...
  • 11 篇 optical network ...
  • 9 篇 optical fiber de...
  • 9 篇 optical fiber te...
  • 7 篇 condition monito...
  • 6 篇 optical fibers
  • 6 篇 fiber to the x
  • 6 篇 fault detection
  • 6 篇 optical switches
  • 5 篇 fault tolerance
  • 5 篇 remote monitorin...
  • 5 篇 monitoring
  • 5 篇 central office
  • 5 篇 hardware
  • 5 篇 protection
  • 4 篇 fault diagnosis
  • 4 篇 computer archite...
  • 4 篇 optical transmit...

机构

  • 7 篇 department of el...
  • 4 篇 college of compu...
  • 4 篇 the network secu...
  • 4 篇 research center ...
  • 4 篇 electrical and s...
  • 4 篇 school of inform...
  • 4 篇 department of co...
  • 3 篇 institute for in...
  • 3 篇 cyber and networ...
  • 3 篇 center for intel...
  • 3 篇 the electrical a...
  • 3 篇 school of cybers...
  • 3 篇 department of mu...
  • 3 篇 department of in...
  • 3 篇 department of in...
  • 3 篇 school of automa...
  • 3 篇 spectrum technol...
  • 3 篇 spectrum technol...
  • 3 篇 computer & netwo...
  • 2 篇 software school ...

作者

  • 25 篇 mohammad syuhaim...
  • 22 篇 kasmiran jumari
  • 13 篇 aswir premadi
  • 11 篇 ab-rahman mohamm...
  • 11 篇 ng boon chuan
  • 8 篇 jumari kasmiran
  • 8 篇 niu luyao
  • 8 篇 clark andrew
  • 7 篇 luyao niu
  • 7 篇 andrew clark
  • 7 篇 poovendran radha
  • 6 篇 choo kim-kwang r...
  • 6 篇 radha poovendran
  • 6 篇 boonchuan ng
  • 5 篇 ng boonchuan
  • 5 篇 liu ximeng
  • 4 篇 premadi aswir
  • 4 篇 weng jian
  • 4 篇 siti asma che az...
  • 3 篇 mahmoud m. badr

语言

  • 157 篇 英文
  • 8 篇 其他
  • 2 篇 中文
检索条件"机构=Department of Computer Security and Network Systems"
167 条 记 录,以下是11-20 订阅
排序:
Ensemble-Based Approach for Efficient Intrusion Detection in network Traffic
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 2499-2517页
作者: Ammar Almomani Iman Akour Ahmed M.Manasrah Omar Almomani Mohammad Alauthman Esra’a Abdullah Amaal Al Shwait Razan Al Sharaa School of Computing Skyline University CollegeUniversity City of SharjahP.O.Box 1797SharjahUnited Arab Emirates IT-Department-Al-Huson University College Al-Balqa Applied UniversityP.O.Box 50IrbidJordan Information Systems Department College of Computing&InformaticsUniversity of SharjahUnited Arab Emirates Comp.Info Sciences(CIS)Division Higher Colleges of TechnologySharjahUnited Arab Emirates Computer Sciences Department Yarmouk UniversityIrbidJordan Computer Network and Information Systems Department The World Islamic Sciences and Education UniversityAmman11947Jordan Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan
The exponential growth of Internet and network usage has neces-sitated heightened security measures to protect against data and network ***,executed through network packets,pose a significant challenge for firewalls t... 详细信息
来源: 评论
IoT-Based Smart Beehive Monitoring System
IoT-Based Smart Beehive Monitoring System
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: Nisal Liyanage Chamindra Attanayaka Tarinya Perera Daniru Neilkumara Isuru Sri Bandara Lakshman Chandrasiri Department of Computer Science and Data Science NSBM Green University Town Homagama Sri Lanka Department of Computer Security and Network Systems NSBM Green University Town Homagama Sri Lanka Department of Electrical Electronic and Systems Engineering NSBM Green University Town Homagama Sri Lanka
In recent years, there has been an alarming decline in bee populations both globally and in Sri Lanka, severely impacting ecosystems and agriculture worldwide. Traditional methods in Sri Lankan beekeeping are often ti... 详细信息
来源: 评论
MEAT: Median-Ensemble Adversarial Training for Improving Robustness and Generalization
MEAT: Median-Ensemble Adversarial Training for Improving Rob...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhaozhe Hu Jia-Li Yin Bin Chen Luojun Lin Bo-Hao Chen Ximeng Liu Fujian Province Key Laboratory of Information Security and Network Systems Fuzhou China College of Computer Science and Big Data Fuzhou University Fuzhou China Department of Computer Science and Engineering Yuan Ze University Taiwan
Self-ensemble adversarial training methods improve model robustness by ensembling models at different training epochs, such as model weight averaging (WA). However, previous research has shown that self-ensemble defen...
来源: 评论
An Android Malware Detection Approach Based on Static Feature Analysis Using Machine Learning Algorithms
收藏 引用
Procedia computer Science 2022年 201卷 653-658页
作者: Ahmed S. Shatnawi Qussai Yassen Abdulrahman Yateem Department of Computer Information Systems Jordan University of Since and Technology Irbid Jordan Department of Network and Security Engineering Jordan University of Since and Technology Irbid Jordan
In the past decade, mobile devices became necessary for modern civilization and contributed directly to its development stages in defining mobile information access. Nonetheless, along with these rapid developments in... 详细信息
来源: 评论
MEAT: MEDIAN-ENSEMBLE ADVERSARIAL TRAINING FOR IMPROVING ROBUSTNESS AND GENERALIZATION
arXiv
收藏 引用
arXiv 2024年
作者: Hu, Zhaozhe Yin, Jia-Li Chen, Bin Lin, Luojun Chen, Bo-Hao Liu, Ximeng Fujian Province Key Laboratory of Information Security and Network Systems Fuzhou350108 China College of Computer Science and Big Data Fuzhou University Fuzhou350108 China Department of Computer Science and Engineering Yuan Ze University Taiwan
Self-ensemble adversarial training methods improve model robustness by ensembling models at different training epochs, such as model weight averaging (WA). However, previous research has shown that self-ensemble defen... 详细信息
来源: 评论
Fault Tolerant Neural Control Barrier Functions for Robotic systems under Sensor Faults and Attacks
Fault Tolerant Neural Control Barrier Functions for Robotic ...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Hongchao Zhang Luyao Niu Andrew Clark Radha Poovendran Electrical and Systems Engineering Department McKelvey School of Engineering Washington University in St. Louis St. Louis MO Department of Electrical and Computer Engineering Network Security Lab University of Washington Seattle WA
Safety is a fundamental requirement of many robotic systems. Control barrier function (CBF)-based approaches have been proposed to guarantee the safety of robotic systems. However, the effectiveness of these approache... 详细信息
来源: 评论
Federated Online/Offline Remote Data Inspection for Distributed Edge Computing
arXiv
收藏 引用
arXiv 2023年
作者: Ali, Mohammad Liu, Ximeng The Department of Mathematics and Computer Science Amirkabir University of Technology Tehran Iran The Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou350108 China
In edge computing environments, app vendors can cache their data to be shared with their users in many geographically distributed edge servers. However, the cached data is particularly vulnerable to several intentiona... 详细信息
来源: 评论
A fully decentralized auditing approach for edge computing: A Game-Theoretic Perspective
arXiv
收藏 引用
arXiv 2023年
作者: Seyedi, Zahra Rahmati, Farhad Ali, Mohammad Liu, Ximeng Department of Mathematics and Computer Science Amirkabir University of Technology Tehran Iran Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou350108 China
Edge storage presents a viable data storage alternative for application vendors (AV), offering benefits such as reduced bandwidth overhead and latency compared to cloud storage. However, data cached in edge computing ... 详细信息
来源: 评论
Comparative Analysis between Supervised and Anomaly Detectors Against Electricity Theft Zero-Day Attacks
Comparative Analysis between Supervised and Anomaly Detector...
收藏 引用
Telecommunications Conference (ITC-Egypt), International
作者: Mahmoud M. Badr Mohamed Baza Amar Rasheed Hisham Kholidy Sherif Abdelfattah Tarannum Shaila Zaman Department of Network and Computer Security SUNY Polytechnic Institute Utica NY USA Department of Computer Science College of Charleston Charleston SC USA Department of Computer Science Sam Houston State University Huntsville TX USA Department of Computer Science and Information Systems Bradley University IL USA Department of Computer and Information Science SUNY Polytechnic Institute Utica NY USA
Smart power grids are vulnerable to electricity theft cyber-attacks, where malicious consumers hack their smart meters (SMs) to down-scale electricity usage readings before reporting them to electric utility companies... 详细信息
来源: 评论
A Compositional Resilience Index for Computationally Efficient Safety Analysis of Interconnected systems  62
A Compositional Resilience Index for Computationally Efficie...
收藏 引用
62nd IEEE Conference on Decision and Control, CDC 2023
作者: Niu, Luyao Maruf, Abdullah Al Clark, Andrew Mertoguno, J. Sukarno Poovendran, Radha University of Washington Network Security Lab Department of Electrical and Computer Engineering SeattleWA98195-2500 United States California State University Department of Electrical and Computer Engineering Los AngelesCA90032 United States McKelvey School of Engineering Washington University in St. Louis Electrical and Systems Engineering Department St. LouisMO63130 United States School of Cybersecurity and Privacy Georgia Institute of Technology AtlantaGA30332 United States
Interconnected systems such as power systems and chemical processes are often required to satisfy safety properties in the presence of faults and attacks. Verifying safety of these systems, however, is computationally...
来源: 评论