咨询与建议

限定检索结果

文献类型

  • 311 篇 会议
  • 240 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 569 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 359 篇 工学
    • 298 篇 计算机科学与技术...
    • 252 篇 软件工程
    • 111 篇 信息与通信工程
    • 58 篇 控制科学与工程
    • 51 篇 电气工程
    • 47 篇 生物工程
    • 23 篇 网络空间安全
    • 22 篇 安全科学与工程
    • 21 篇 电子科学与技术(可...
    • 17 篇 动力工程及工程热...
    • 16 篇 生物医学工程(可授...
    • 15 篇 交通运输工程
    • 14 篇 机械工程
    • 12 篇 仪器科学与技术
    • 10 篇 光学工程
    • 10 篇 航空宇航科学与技...
  • 150 篇 理学
    • 80 篇 数学
    • 49 篇 生物学
    • 31 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 19 篇 系统科学
  • 102 篇 管理学
    • 69 篇 管理科学与工程(可...
    • 43 篇 工商管理
    • 36 篇 图书情报与档案管...
  • 43 篇 法学
    • 24 篇 社会学
    • 20 篇 法学
  • 31 篇 医学
    • 24 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 16 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 9 篇 教育学
  • 3 篇 农学
  • 3 篇 军事学
  • 3 篇 艺术学

主题

  • 32 篇 internet of thin...
  • 18 篇 security
  • 18 篇 blockchain
  • 18 篇 accuracy
  • 16 篇 deep learning
  • 15 篇 machine learning
  • 13 篇 artificial intel...
  • 11 篇 computational in...
  • 11 篇 authentication
  • 11 篇 federated learni...
  • 10 篇 real-time system...
  • 10 篇 privacy
  • 9 篇 intrusion detect...
  • 9 篇 reliability
  • 9 篇 computational mo...
  • 8 篇 computer communi...
  • 8 篇 optimization
  • 8 篇 wireless sensor ...
  • 8 篇 feature extracti...
  • 8 篇 encryption

机构

  • 16 篇 cyber security s...
  • 10 篇 school of comput...
  • 10 篇 department of in...
  • 9 篇 center for cyber...
  • 9 篇 department of in...
  • 8 篇 department of co...
  • 8 篇 computer network...
  • 8 篇 department of in...
  • 8 篇 school of cyber ...
  • 7 篇 school of comput...
  • 7 篇 center for cyber...
  • 7 篇 institute of inf...
  • 7 篇 universiti keban...
  • 7 篇 center for cyber...
  • 7 篇 department of in...
  • 7 篇 department of el...
  • 7 篇 department of co...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 6 篇 department of co...

作者

  • 58 篇 choo kim-kwang r...
  • 36 篇 kim-kwang raymon...
  • 16 篇 guo yuanxiong
  • 15 篇 gong yanmin
  • 12 篇 dehghantanha ali
  • 10 篇 ghazal taher m.
  • 9 篇 parizi reza m.
  • 9 篇 yuanxiong guo
  • 9 篇 babun leonardo
  • 9 篇 george k. karagi...
  • 9 篇 rios anthony
  • 9 篇 taher m. ghazal
  • 8 篇 ali hamza najim
  • 8 篇 khattab m. ali a...
  • 8 篇 conti mauro
  • 8 篇 nurhizam safie m...
  • 8 篇 acar abbas
  • 8 篇 najim ali hamza
  • 8 篇 uluagac a. selcu...
  • 8 篇 xu zheng

语言

  • 514 篇 英文
  • 51 篇 其他
  • 4 篇 中文
检索条件"机构=Department of Computer Systems Networks and Cyber Security"
569 条 记 录,以下是21-30 订阅
排序:
GAN-Based Anomaly Intrusion Detection for Industrial Controller System  1
收藏 引用
World Conference on Information systems for Business Management, ISBM 2023
作者: Riya V. Raj Sangeetha, V. Amritha, P.P. TIFAC-CORE in Cyber Security Amrita School of Engineering Coimbatore Amrita Vishwa Vidyapeetham Coimbatore India Department of Computer Science and Information Systems BITS Pilani Pilani India
Industrial controller system (ICS) is becoming more and more important in daily lives. In recent years, ICS has become more frequent targets of cyberattacks. In addition to the system, the environment is also signific... 详细信息
来源: 评论
Towards a User-Friendly Web Application Firewall  11
Towards a User-Friendly Web Application Firewall
收藏 引用
11th IEEE International Conference on Intelligent Computing and Information systems, ICICIS 2023
作者: Omar, Fatima Ahmed, Dalia Elnakib, Omar Ahmed, Mohamed Farhan, Nada Hindy, Hanan Abdel-Hamid, Mahmoud Badawi, Yehia Ain Shams University Faculty of Computer and Information Science Cyber Security Department Cairo Egypt Ain Shams University Faculty of Computer and Information Science Computer Systems Department Cairo Egypt Ain Shams University Faculty of Computer and Information Science Cyber Security Department Giza Egypt Ain Shams University Faculty of Computer and Information Science Computer Science Department Cairo Egypt
Web Application Firewall (WAF) systems play a vital role in protecting web applications from various security vulnerabilities. However, existing WAF solutions are often costly and complex to configure, limiting their ... 详细信息
来源: 评论
A Review of Key Elements for Underwater Wireless Sensor networks
A Review of Key Elements for Underwater Wireless Sensor Netw...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Al-Dulaimi, Aymen Mohammed Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Aliesawi, Salah A. Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq
Underwater Wireless Sensor networks (UWSNs) are emerging and have huge prospects since they have various applications in oceanography, environmental monitoring, and underwater communication. These networks contain low... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
Novel Feature Extractor Framework in Conjunction with Supervised Three Class-XGBoost Algorithm for Osteosarcoma Detection from Whole Slide Medical Histopathology Images
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3337-3353页
作者: Tanzila Saba Muhammad Mujahid Shaha Al-Otaibi Noor Ayesha Amjad Rehman Khan Artificial Intelligence&Data Analytics Lab College of Computer&Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Center of Excellence in Cyber Security(CYBEX) Prince Sultan UniversityRiyadh11586Saudi Arabia
Osteosarcomas are malignant neoplasms derived from undifferentiated osteogenic mesenchymal cells. It causes severe and permanent damage to human tissue and has a high mortality rate. The condition has the capacity to ... 详细信息
来源: 评论
A Novel Deep Learning Framework for Contraband Items Recognition in Smart City Applications  2nd
A Novel Deep Learning Framework for Contraband Items Recogni...
收藏 引用
2nd International Conference on Sustainability: Developments and Innovations, ICSDI 2024
作者: Khalid, Shehzad Ahmed, Zubair Noor, Ayesha Sedik, Ahmed Asif, Waqar Department of Computer Engineering Bahria University Islamabad Pakistan Smart Systems Engineering Laboratory College of Engineering Prince Sultan University Riyadh Saudi Arabia Computer Science and Cyber Security University of West London London United Kingdom
Ensuring safety and security is paramount in today’s complex environment, and the effective detection of contraband items plays a pivotal role in achieving this objective. Contraband items, ranging from illegal subst... 详细信息
来源: 评论
Backslash map: An Automated Vulnerability Scanner  11
Backslash map: An Automated Vulnerability Scanner
收藏 引用
11th IEEE International Conference on Intelligent Computing and Information systems, ICICIS 2023
作者: Alian, Alshaimaa Abo Sobhy, Bishoy Nasser, Marina Hani, Lydia Ain Shams University Faculty of Computer and Information Sciences Information Systems Department Cairo Egypt Ain Shams University Faculty of Computer and Information Sciences Cyber Security Department Cairo Egypt
Web application vulnerability detection is critical to cybersecurity. Web applications are vulnerable to attacks from a variety of sources, with varying degrees of scale and complexity. Therefore, it becomes essential... 详细信息
来源: 评论
Channel Aging-Aware LSTM-Based Channel Prediction for Satellite Communications
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2024年 第3期6卷 183-187页
作者: Abbasi, Omid Kaddoum, Georges Carleton University Non-Terrestrial Networks Lab Department of Systems and Computer Engineering OttawaONK1S 5B6 Canada Université du Québec École de Technologie Supérieure Department of Electrical Engineering MontrealQCH3C 1K3 Canada Lebanese American University Cyber Security Systems and Applied Ai Research Center Beirut2801 Lebanon
Satellite communication systems encounter channel aging issues due to the substantial distance that separates users and satellites. In such systems, the estimated channel state at a given time slot reflects the channe... 详细信息
来源: 评论
Smart Water-Powered Renewable Energy System with IoT Integration
Smart Water-Powered Renewable Energy System with IoT Integra...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Ibraheem, Ahmed Salman Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq Department of Computer Technical Engineering Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
An advanced hybrid renewable energy collecting and storage system prototype that utilizes water flow as its primary power source. Additionally, the system incorporates an energy monitoring system based on the Internet... 详细信息
来源: 评论
Empirical Evaluations of Machine Learning Effectiveness in Detecting Web Application Attacks  7th
Empirical Evaluations of Machine Learning Effectiveness in...
收藏 引用
7th EAI International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures, EAI FABULOUS 2023
作者: Ismail, Muhusina Alrabaee, Saed Harous, Saad Choo, Kim-Kwang Raymond Department of Information Systems and Security CIT United Arab Emirates University Al Ain United Arab Emirates Department of Computer Science College of Computing and Informatics University of Sharjah Sharjah United Arab Emirates Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Web applications remain a significant attack vector for cybercriminals seeking to exploit application vulnerabilities and gain unauthorized access to privileged data. In this research, we evaluate the efficacy of eigh... 详细信息
来源: 评论