咨询与建议

限定检索结果

文献类型

  • 311 篇 会议
  • 242 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 571 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 361 篇 工学
    • 301 篇 计算机科学与技术...
    • 252 篇 软件工程
    • 112 篇 信息与通信工程
    • 59 篇 控制科学与工程
    • 51 篇 电气工程
    • 47 篇 生物工程
    • 24 篇 电子科学与技术(可...
    • 23 篇 网络空间安全
    • 22 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 17 篇 生物医学工程(可授...
    • 15 篇 交通运输工程
    • 14 篇 机械工程
    • 12 篇 仪器科学与技术
    • 11 篇 光学工程
    • 10 篇 航空宇航科学与技...
  • 152 篇 理学
    • 81 篇 数学
    • 49 篇 生物学
    • 32 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 19 篇 系统科学
  • 102 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 43 篇 工商管理
    • 35 篇 图书情报与档案管...
  • 41 篇 法学
    • 24 篇 社会学
    • 18 篇 法学
  • 30 篇 医学
    • 23 篇 临床医学
    • 22 篇 基础医学(可授医学...
    • 15 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 9 篇 教育学
  • 3 篇 农学
  • 3 篇 军事学
  • 3 篇 艺术学

主题

  • 32 篇 internet of thin...
  • 18 篇 security
  • 18 篇 blockchain
  • 18 篇 accuracy
  • 16 篇 deep learning
  • 15 篇 machine learning
  • 13 篇 artificial intel...
  • 12 篇 federated learni...
  • 11 篇 computational in...
  • 11 篇 authentication
  • 10 篇 real-time system...
  • 10 篇 privacy
  • 9 篇 intrusion detect...
  • 9 篇 reliability
  • 9 篇 computational mo...
  • 8 篇 computer communi...
  • 8 篇 optimization
  • 8 篇 wireless sensor ...
  • 8 篇 feature extracti...
  • 8 篇 encryption

机构

  • 16 篇 cyber security s...
  • 10 篇 school of comput...
  • 10 篇 department of in...
  • 9 篇 center for cyber...
  • 9 篇 department of in...
  • 8 篇 department of co...
  • 8 篇 computer network...
  • 8 篇 department of in...
  • 8 篇 school of cyber ...
  • 7 篇 school of comput...
  • 7 篇 center for cyber...
  • 7 篇 institute of inf...
  • 7 篇 universiti keban...
  • 7 篇 center for cyber...
  • 7 篇 department of in...
  • 7 篇 department of el...
  • 7 篇 department of co...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 6 篇 department of co...

作者

  • 58 篇 choo kim-kwang r...
  • 36 篇 kim-kwang raymon...
  • 16 篇 guo yuanxiong
  • 15 篇 gong yanmin
  • 12 篇 dehghantanha ali
  • 9 篇 parizi reza m.
  • 9 篇 yuanxiong guo
  • 9 篇 babun leonardo
  • 9 篇 george k. karagi...
  • 9 篇 rios anthony
  • 9 篇 taher m. ghazal
  • 9 篇 ghazal taher m.
  • 8 篇 ali hamza najim
  • 8 篇 khattab m. ali a...
  • 8 篇 conti mauro
  • 8 篇 nurhizam safie m...
  • 8 篇 acar abbas
  • 8 篇 najim ali hamza
  • 8 篇 uluagac a. selcu...
  • 8 篇 xu zheng

语言

  • 515 篇 英文
  • 52 篇 其他
  • 4 篇 中文
检索条件"机构=Department of Computer Systems Networks and Cyber Security"
571 条 记 录,以下是1-10 订阅
排序:
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
LCEFL: A Lightweight Contribution Evaluation Approach for Federated Learning
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6643-6657页
作者: Guo, Jingjing Li, Jiaxing Liu, Zhiquan Xiong, Yupeng Ma, Yong Vasilakos, Athanasios V. Li, Xinghua Ma, Jianfeng Xidian University School of Cyber Engineering Xi’an710071 China Jinan University College of Cyber Security Guangzhou510632 China Jiangxi Normal University Department of Computer Science and Technology Nanchang330022 China Department of Networks and Communications College of Computer Science and Information Technology Dammam31441 Saudi Arabia Grimstad4879 Norway
The prerequisite for implementing incentive mechanisms and reliable participant selection schemes in federated learning is to obtain the contribution of each participant. Available evaluation methods for participant c... 详细信息
来源: 评论
An Unmanned Aerial Vehicle as a Multi-State System  16
An Unmanned Aerial Vehicle as a Multi-State System
收藏 引用
16th IEEE International Conference on Advanced Trends in Radioelectronics, Telecommunications and computer Engineering, TCSET 2022
作者: Kliushnikov, Ihor Kharchenko, Vyacheslav Fesenko, Herman Department of Computer Systems Networks and Cyber Security National Aerospace University 'KhAI' Kharkiv Ukraine
An unmanned aerial vehicle (UAV) is considered as a multi-state system (MSS). The results of the decomposition of the UAV into degradable and non-degradable components are presented. The reliability models of UAV as M... 详细信息
来源: 评论
Reliability Models of Multi-state UAV-based Monitoring systems: Mission Efficiency Degradation Issues
Reliability Models of Multi-state UAV-based Monitoring Syste...
收藏 引用
2023 International Conference on Information and Digital Technologies, IDT 2023
作者: Kliushnikov, Ihor Kharchenko, Vyacheslav Fesenko, Herman Zaitseva, Elena Levashenko, Vitaly Networks and Cyber Security National Aerospace University KhAI Department of Computer Systems Kharkiv Ukraine University of Zilina Faculty of Management Science and Informatics Zilina Slovakia
General classification of multi-state UAV-based monitoring systems (MsUMSs) in view of types of used main and redundant unmanned aerial vehicles (UAVs), automatic battery maintenance stations (ABMSs), and mission effi... 详细信息
来源: 评论
Navigating the Waves: IoT Border Alert System for Maritime Safety
Navigating the Waves: IoT Border Alert System for Maritime S...
收藏 引用
2024 International Conference on Advances in Computing Research on Science Engineering and Technology, ACROSET 2024
作者: Koppaka, Ajay Aravindh, P. Aneesh, M. Valsan, Vipina Amrita Vishwa Vidyapeetham Centre for Cyber Security Systems & Networks Amritapuri India Amrita Vishwa Vidyapeetham Department of Electrical and Electronics Engineering Amritapuri India
The safety of fishermen navigating maritime borders is a pressing concern exacerbated by frequent unintentional border crossings that often lead to confrontations with foreign coast guards. The development of an Inter... 详细信息
来源: 评论
Enhancing Traffic Safety: An Automated License Plate Recognition System for Effective Law Enforcement
Enhancing Traffic Safety: An Automated License Plate Recogni...
收藏 引用
2024 International Conference on Advances in Computing Research on Science Engineering and Technology, ACROSET 2024
作者: Harish, Sam Mg Aksharasree, S. Deepak, S.G. Mamatha, S. Valsan, Vipina Amrita Vishwa Vidyapeetham Center for Cyber Security Systems & Networks Amritapuri India Amrita Vishwa Vidyapeetham Department of Electrical and Electronics Engineering Amritapuri India
In recent years, the number of accidents has been increased due to unsafe driving that has become a global concern. In India, 90% of road accidents had been reported in 2021 due to speeding, overtaking and rash drivin... 详细信息
来源: 评论
Securing Sustainable Energy Trading: An RSA-Encrypted IoT Solution for Smart Meter Data Transmission
Securing Sustainable Energy Trading: An RSA-Encrypted IoT So...
收藏 引用
2024 International Conference on Computational Intelligence and Computing Applications, ICCICA 2024
作者: Valsan, Vipina Keerthan, K.K. Devnath, N.S. Ajithkumar, Anirudh Sasikumar, Adarsh Amrita Vishwa Vidyapeetham Department Of Electrical And Electronics Engineering Amritapuri India Amrita Vishwa Vidyapeetham Center For Cyber Security Systems & Networks Amritapuri India
Smart grids have been replacing conventional energy grids in recent years and are deemed the next generation of today's power infrastructure distribution. However, due to the digitization of the energy grid framew... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
A Digital Evidences Preservation Framework for a Logic Based Smart Contract
收藏 引用
Informatica (Slovenia) 2023年 第8期47卷 141-152页
作者: Wala’a, Al-Omari Sabri, Khair Eddin Obeid, Nadim Department of Cyber Security College of Computer Sciences and Informatics Amman Arab University Amman Jordan Department of Computer Information Systems King Abdullah II School for Information Technology The University of Jordan Amman Jordan
Recently, smart contracts were introduced as a necessity to automatically execute specific operations within blockchain systems. The popularity and diversity of blockchain systems attracted intensive attentions from a... 详细信息
来源: 评论
Energy-Aware Reliable Routing with Blockchain security for Heterogeneous Wireless Sensor networks  5th
Energy-Aware Reliable Routing with Blockchain Security for H...
收藏 引用
5th International Conference on Advances in Information Communication Technology and Computing, AICTC 2024
作者: Swapna, M.P. Ramkumar, J. Karthikeyan, R. Center for Cyber Security Systems and Networks Amrita Vishwa Vidyapeetham Kollam Amritapuri India Department of Information Technology & Cognitive Systems Sri Krishna Arts & Science College Coimbatore India Department of Computer Technology Sri Krishna Adithya College of Arts and Science Coimbatore India
Wireless sensor networks, the dynamic networks with spatially dispersed sensors are used indispensably in a wide range of applications. Heterogeneous wireless sensor networks represent a collection of sensor nodes of ... 详细信息
来源: 评论