咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 129 篇 会议
  • 1 册 图书

馆藏范围

  • 299 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 147 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 56 篇 信息与通信工程
    • 43 篇 电气工程
    • 37 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 20 篇 生物医学工程(可授...
    • 19 篇 生物工程
    • 19 篇 安全科学与工程
    • 11 篇 机械工程
    • 10 篇 光学工程
    • 9 篇 网络空间安全
    • 7 篇 动力工程及工程热...
    • 7 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 5 篇 土木工程
  • 87 篇 理学
    • 54 篇 数学
    • 23 篇 生物学
    • 18 篇 统计学(可授理学、...
    • 13 篇 物理学
    • 13 篇 系统科学
    • 5 篇 化学
  • 60 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 26 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 19 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 11 篇 药学(可授医学、理...
  • 15 篇 法学
    • 10 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 3 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 13 篇 deep learning
  • 11 篇 blockchain
  • 10 篇 authentication
  • 9 篇 machine learning
  • 9 篇 security
  • 9 篇 training
  • 8 篇 internet of thin...
  • 8 篇 artificial intel...
  • 8 篇 privacy
  • 6 篇 semantics
  • 5 篇 feature extracti...
  • 5 篇 blockchains
  • 4 篇 access control
  • 4 篇 data privacy
  • 4 篇 optimization
  • 4 篇 smart contract
  • 4 篇 encryption
  • 4 篇 data models
  • 4 篇 forensics
  • 3 篇 intrusion detect...

机构

  • 9 篇 dept. of compute...
  • 8 篇 dept. of compute...
  • 8 篇 national yunlin ...
  • 8 篇 cyber security d...
  • 8 篇 computer enginee...
  • 7 篇 department of co...
  • 7 篇 school of cyber ...
  • 6 篇 department of co...
  • 6 篇 university of el...
  • 6 篇 sejong universit...
  • 5 篇 the university o...
  • 5 篇 protocol enginee...
  • 5 篇 school of comput...
  • 5 篇 sejong universit...
  • 5 篇 school of comput...
  • 5 篇 peng cheng labor...
  • 5 篇 beijing key labo...
  • 5 篇 school of comput...
  • 4 篇 ghana technology...
  • 4 篇 information secu...

作者

  • 15 篇 das ashok kumar
  • 14 篇 mahmood khalid
  • 12 篇 jong-hyouk lee
  • 11 篇 lee jong-hyouk
  • 9 篇 fan chun-i
  • 9 篇 gong chen
  • 8 篇 kim tai-hoon
  • 8 篇 hyoung-kyu song
  • 7 篇 bhattacharyya de...
  • 7 篇 cao xiaochun
  • 6 篇 young-gab kim
  • 6 篇 yang jian
  • 6 篇 kim young-gab
  • 6 篇 shamshad salman
  • 6 篇 xu qianqian
  • 5 篇 jihye kim
  • 5 篇 yang zhiyong
  • 5 篇 jaehyoung park
  • 5 篇 huang qingming
  • 5 篇 park jaehyoung

语言

  • 233 篇 英文
  • 62 篇 其他
  • 4 篇 中文
检索条件"机构=Department of Computer and Information Security & Convergence Engineering for Intelligent"
299 条 记 录,以下是1-10 订阅
排序:
AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 3371-3393页
作者: Juhwan Kim Baehoon Son Jihyeon Yu Joobeom Yun Department of Computer and Information Security and Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Republic of Korea
Digital forensics aims to uncover evidence of cybercrimes within compromised *** cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the compromised **... 详细信息
来源: 评论
Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3291-3315页
作者: Jihyeon Yu Juhwan Kim Youngwoo Lee Fayozbek Rustamov Joobeom Yun Department of Computer and Information Security and Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea Department of Computer and Information Security Sejong UniversitySeoul05006Korea
Internet of things(IoT)devices are being increasingly used in numerous ***,the low priority on security and various IoT types have made these devices vulnerable to *** prevent this,recent studies have analyzed firmwar... 详细信息
来源: 评论
Privacy Enhanced P2P Power Trading Using DID-Based Identity Verification in a Microgrid  1
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Lee, Taeyang Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul Korea Republic of
Smart meters play a crucial role in accurately measuring power usage and distribution data in microgrids. However, fine-grained data collection raises significant privacy concerns. To address this, it is essential to ... 详细信息
来源: 评论
Ransomware Classification Framework Using the Behavioral Performance Visualization of Execution Objects
收藏 引用
computers, Materials & Continua 2022年 第8期72卷 3401-3424页
作者: Jun-Seob Kim Ki-Woong Park Department of Computer and Information Security and Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea
A ransomware attack that interrupted the operation of Colonial Pipeline(a large *** pipeline company),showed that security threats by malware have become serious enough to affect industries and social infrastructure r... 详细信息
来源: 评论
ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach  1
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Kim, Jihye Park, Jaehyoung Lee, Jong-Hyouk Department of Computer and Information Security Sejong University Seoul05006 Korea Republic of Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul05006 Korea Republic of
In the 5G-Advanced and 6G era, the Open Radio Access Network (Open RAN) will support hardware and software interoperability between different vendors. The O-RAN Alliance, which leads the Open RAN initiative, has relea... 详细信息
来源: 评论
security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing  1
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Park, Jaehyoung Kim, Jihye Lee, Jong-Hyouk Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul05006 Korea Republic of Department of Computer and Information Security Sejong University Seoul05006 Korea Republic of
Starting with Software Defined Networking (SDN) and Network Functions Virtualization (NFV) technologies, network slicing is emerging as a critical technology in 5G-Advanced and 6G mobile communications to allocate log... 详细信息
来源: 评论
Trusted and Privacy-Preserving Billing System for Smart Grids
Trusted and Privacy-Preserving Billing System for Smart Grid...
收藏 引用
2025 IEEE International Conference on Big Data and Smart Computing, BigComp 2025
作者: Abduaziz, Kayumov Lee, Shincheol Shin, Ji Sun Sejong University Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Seoul05006 Korea Republic of Sejong University Department of Computer and Information Security Seoul05006 Korea Republic of
With the advent of smart meters in recent years, privacy has become one of the biggest concerns in smart grids. While privacy is achieved by designing smart grid services while maintaining the anonymous participation ... 详细信息
来源: 评论
A Method for De-Identification Analysis of Encrypted Video  9
A Method for De-Identification Analysis of Encrypted Video
收藏 引用
Joint 9th International Conference on Digital Arts, Media and Technology with 7th ECTI Northern Section Conference on Electrical, Electronics, computer and Telecommunications engineering, ECTI DAMT and NCON 2024
作者: Kim, Deok-Han Kim, Young-Gab Sejong University Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Seoul Korea Republic of
As the variety of video content increases, so does the likelihood of data breaches of sensitive personal information. Consequently, several video de-identification techniques have been developed to protect personal da... 详细信息
来源: 评论
A Self-Adaptive Framework for Responding to Uncertainty in Access Control Process with Deep Neural Networks  23
A Self-Adaptive Framework for Responding to Uncertainty in A...
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2024
作者: Park, Jihoon Kang, Giluk Kim, Young-Gab Sejong University Dept. of Computer and Information Security Convergence Engineering for Intelligent Drone Seoul Korea Republic of
The rapid increase in Internet of Things (IoT) devices and data across various domains (e.g., healthcare, smart cities, smart factories, and smart homes) has led to growing complexity in managing security policies to ... 详细信息
来源: 评论
RAG-based Cyber Threat Tracing Graph Modeling Method  23
RAG-based Cyber Threat Tracing Graph Modeling Method
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2024
作者: Jeon, Jong-Hee Koo, Jahoon Kim, Young-Gab Sejong University Seoul Security Engineering Lab. Dept. of Computer and Information Security Korea Republic of Sejong University Seoul Security Engineering Lab. Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Korea Republic of
Cyber-attacks have become increasingly complex and sophisticated, occurring frequently through various paths. Numerous attack techniques, such as ransomware, advanced persistent threat (APT) attacks, and viruses facil... 详细信息
来源: 评论