咨询与建议

限定检索结果

文献类型

  • 311 篇 会议
  • 240 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 569 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 359 篇 工学
    • 298 篇 计算机科学与技术...
    • 252 篇 软件工程
    • 111 篇 信息与通信工程
    • 58 篇 控制科学与工程
    • 51 篇 电气工程
    • 47 篇 生物工程
    • 23 篇 网络空间安全
    • 22 篇 安全科学与工程
    • 21 篇 电子科学与技术(可...
    • 17 篇 动力工程及工程热...
    • 16 篇 生物医学工程(可授...
    • 15 篇 交通运输工程
    • 14 篇 机械工程
    • 12 篇 仪器科学与技术
    • 10 篇 光学工程
    • 10 篇 航空宇航科学与技...
  • 150 篇 理学
    • 80 篇 数学
    • 49 篇 生物学
    • 31 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 19 篇 系统科学
  • 102 篇 管理学
    • 69 篇 管理科学与工程(可...
    • 43 篇 工商管理
    • 36 篇 图书情报与档案管...
  • 43 篇 法学
    • 24 篇 社会学
    • 20 篇 法学
  • 31 篇 医学
    • 24 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 16 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 9 篇 教育学
  • 3 篇 农学
  • 3 篇 军事学
  • 3 篇 艺术学

主题

  • 32 篇 internet of thin...
  • 18 篇 security
  • 18 篇 blockchain
  • 18 篇 accuracy
  • 16 篇 deep learning
  • 15 篇 machine learning
  • 13 篇 artificial intel...
  • 11 篇 computational in...
  • 11 篇 authentication
  • 11 篇 federated learni...
  • 10 篇 real-time system...
  • 10 篇 privacy
  • 9 篇 intrusion detect...
  • 9 篇 reliability
  • 9 篇 computational mo...
  • 8 篇 computer communi...
  • 8 篇 optimization
  • 8 篇 wireless sensor ...
  • 8 篇 feature extracti...
  • 8 篇 encryption

机构

  • 16 篇 cyber security s...
  • 10 篇 school of comput...
  • 10 篇 department of in...
  • 9 篇 center for cyber...
  • 9 篇 department of in...
  • 8 篇 department of co...
  • 8 篇 computer network...
  • 8 篇 department of in...
  • 8 篇 school of cyber ...
  • 7 篇 school of comput...
  • 7 篇 center for cyber...
  • 7 篇 institute of inf...
  • 7 篇 universiti keban...
  • 7 篇 center for cyber...
  • 7 篇 department of in...
  • 7 篇 department of el...
  • 7 篇 department of co...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 6 篇 department of co...

作者

  • 58 篇 choo kim-kwang r...
  • 36 篇 kim-kwang raymon...
  • 16 篇 guo yuanxiong
  • 15 篇 gong yanmin
  • 12 篇 dehghantanha ali
  • 10 篇 ghazal taher m.
  • 9 篇 parizi reza m.
  • 9 篇 yuanxiong guo
  • 9 篇 babun leonardo
  • 9 篇 george k. karagi...
  • 9 篇 rios anthony
  • 9 篇 taher m. ghazal
  • 8 篇 ali hamza najim
  • 8 篇 khattab m. ali a...
  • 8 篇 conti mauro
  • 8 篇 nurhizam safie m...
  • 8 篇 acar abbas
  • 8 篇 najim ali hamza
  • 8 篇 uluagac a. selcu...
  • 8 篇 xu zheng

语言

  • 514 篇 英文
  • 51 篇 其他
  • 4 篇 中文
检索条件"机构=Department of Computer Systems Networks and Cyber Security"
569 条 记 录,以下是31-40 订阅
排序:
Improving VANET Localization Performance with Data Verification: Challenges and Solutions
Improving VANET Localization Performance with Data Verificat...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Kadhim, Aqeel Kamil Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisa Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
In VANETs, the important and effective applications of vehicle localization include safety and communication applications. Thus, it is difficult to get very accurate localization in the dynamic and often very fluctuat... 详细信息
来源: 评论
Performance Analysis of Energy and Secure Efficient Routing for Wireless Sensor networks
Performance Analysis of Energy and Secure Efficient Routing ...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Hussein, Zainab Mohammed Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Wireless Sensor networks (WSNs) are essential for various applications, but their architecture makes them vulnerable to attacks. While traditional security methods like authentication and encryption offer some protect... 详细信息
来源: 评论
Applied Aspects of Polyharmonic Functions for security and Reliability of Data Transmission  8
Applied Aspects of Polyharmonic Functions for Security and R...
收藏 引用
8th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2024
作者: Laptiev, Oleksandr Sobchuk, Andrii Ryzhov, Anton Perehuda, Oleh Tsygansvska, Iryna Kopytko, Serhii Taras Shevchenko National University of Kyiv Faculty of information technology Department of Cyber Security and Information Protection Kyiv Ukraine State University of Information and Communication Technologies Department of Information and Cyber Security Kyiv Ukraine Taras Shevchenko National University of Kyiv Faculty of Mechanics and Mathematics Department of General Mathematics Kyiv Ukraine Taras Shevchenko National University of Kyiv Faculty of Mechanics and Mathematics Department of Algebra and Computer Mathematics Kyiv Ukraine Lviv Polytechnic National University Department of Information Systems and Networks Lviv Ukraine
At present, when armed conflicts have intensified, and especially against the background of Russia's armed aggression against Ukraine, a new era of development of high-precision means of protection and weapons has... 详细信息
来源: 评论
The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments  29
The Truth Shall Set Thee Free: Enabling Practical Forensic C...
收藏 引用
29th Annual Network and Distributed System security Symposium, NDSS 2022
作者: Babun, Leonardo Sikder, Amit Kumar Acar, Abbas Uluagac, A. Selcuk Cyber-Physical Systems Security Lab Department of Electrical & Computer Engineering Florida International University United States
In smart environments such as smart homes and offices, the interaction between devices, users, and apps generate abundant data. Such data contain valuable forensic information about events and activities occurring in ... 详细信息
来源: 评论
Securing Electronic Health Records (EHR) from Tampering Using Blockchain  30th
Securing Electronic Health Records (EHR) from Tampering Usin...
收藏 引用
Advances in systems Engineering - Proceedings of the 30th International Conference on systems Engineering, ICSEng 2023
作者: Al-Omrani, Ebtihal Nazzal Humayun, Mamoona Master of Cyber Security College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia Department of Information Systems College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia
Electronic health records EHRs are digital representations of a patient’s medical history, and authorized healthcare professionals can access and share health-related data from them. EHRs provide a number of advantag... 详细信息
来源: 评论
IoT-Enhanced Gesture Recognition System for Healthcare Applications
IoT-Enhanced Gesture Recognition System for Healthcare Appli...
收藏 引用
2024 International Telecommunications Conference, ITC-Egypt 2024
作者: Krithika, L.B. Nallakaruppan, M.K. Baza, Mohamed Badr, Mahmoud Deora, Yuvraj Singh School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India College of Charleston Deparment of Computer Science CharlestonSC United States Polytechnic Institute Department of Networks and Computer Security UticaNY12201 United States
In response to the prevalent language barriers in medical settings, this paper proposes an innovative solution leveraging gesture recognition technology. Through the integration of deep learning models and Internet of... 详细信息
来源: 评论
Weather Satellite Tracking with RTL-SDR: NOAA 15 Image Reception and Signal Decoding  2
Weather Satellite Tracking with RTL-SDR: NOAA 15 Image Recep...
收藏 引用
2nd International Conference on cyber Resilience, ICCR 2024
作者: Waseem, Ahsan Kamil, Mohd Azhan Umar Bhardwaj, Abhisehek Razim, Abdul Qadeer, Mohammed Abdul Ghazal, Taher M. Aligarh Muslim University Department Of Electrical Engineering Aligarh India Aligarh Muslim University Department Of Computer Engineering Aligarh India Stony Brook University Department Of Electrical And Computer Engineering New York United States Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
This study examines the growing number of satellites, this paper explores the importance of satellite tracking and highlights NOAA-15 for information transmission and weather monitoring. It offers a low-cost configura... 详细信息
来源: 评论
Segmenting foreground objects in a multi-modal background using modified Z-score
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第2期15卷 1213-1227页
作者: Choudhury, Suman Kumar Sa, Pankaj Kumar Choo, Kim-Kwang Raymond Bakshi, Sambit Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela India Department of Information Systems and Cyber Security The University of Texas at San Antonio San AntonioTX78249 United States School of Information Technology and Mathematical Sciences University of South Australia AdelaideSA5095 Australia
This article presents a background subtraction method to detect moving objects across a stationary camera view. A hybrid pixel representation is presented to minimize the effect of shadow illumination. A non-recursive... 详细信息
来源: 评论
Measuring Geographic Performance Disparities of Offensive Language Classifiers  29
Measuring Geographic Performance Disparities of Offensive La...
收藏 引用
29th International Conference on Computational Linguistics, COLING 2022
作者: Lwowski, Brandon Rad, Paul Rios, Anthony Department of Information Systems and Cyber Security United States Department of Computer Science University of Texas San Antonio United States
Text classifiers are applied at scale in the form of one-size-fits-all solutions. Nevertheless, many studies show that classifiers are biased regarding different languages and dialects. When measuring and discovering ... 详细信息
来源: 评论
Empowering Smart Homes with Fog Computing for IoT Connectivity
Empowering Smart Homes with Fog Computing for IoT Connectivi...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Mahdi, Ali Jafer Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq AI-Zahraa University for Women Department of Scientific Affairs Bangi43600 Malaysia College of Computer and Information Technology University of Anbar Computer Networking Systems Department Anbar Iraq Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Innovative grid technology leverages Information and Communication Technology (ICT) to enhance energy efficiency and mitigate losses. This paper introduces a 'novel three-tier hierarchical framework for smart home... 详细信息
来源: 评论