咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 129 篇 会议
  • 1 册 图书

馆藏范围

  • 299 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 147 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 56 篇 信息与通信工程
    • 43 篇 电气工程
    • 37 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 20 篇 生物医学工程(可授...
    • 19 篇 生物工程
    • 19 篇 安全科学与工程
    • 11 篇 机械工程
    • 10 篇 光学工程
    • 9 篇 网络空间安全
    • 7 篇 动力工程及工程热...
    • 7 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 5 篇 土木工程
  • 87 篇 理学
    • 54 篇 数学
    • 23 篇 生物学
    • 18 篇 统计学(可授理学、...
    • 13 篇 物理学
    • 13 篇 系统科学
    • 5 篇 化学
  • 60 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 26 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 19 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 11 篇 药学(可授医学、理...
  • 15 篇 法学
    • 10 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 3 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 13 篇 deep learning
  • 11 篇 blockchain
  • 10 篇 authentication
  • 9 篇 machine learning
  • 9 篇 security
  • 9 篇 training
  • 8 篇 internet of thin...
  • 8 篇 artificial intel...
  • 8 篇 privacy
  • 6 篇 semantics
  • 5 篇 feature extracti...
  • 5 篇 blockchains
  • 4 篇 access control
  • 4 篇 data privacy
  • 4 篇 optimization
  • 4 篇 smart contract
  • 4 篇 encryption
  • 4 篇 data models
  • 4 篇 forensics
  • 3 篇 intrusion detect...

机构

  • 9 篇 dept. of compute...
  • 8 篇 dept. of compute...
  • 8 篇 national yunlin ...
  • 8 篇 cyber security d...
  • 8 篇 computer enginee...
  • 7 篇 department of co...
  • 7 篇 school of cyber ...
  • 6 篇 department of co...
  • 6 篇 university of el...
  • 6 篇 sejong universit...
  • 5 篇 the university o...
  • 5 篇 protocol enginee...
  • 5 篇 school of comput...
  • 5 篇 sejong universit...
  • 5 篇 school of comput...
  • 5 篇 peng cheng labor...
  • 5 篇 beijing key labo...
  • 5 篇 school of comput...
  • 4 篇 ghana technology...
  • 4 篇 information secu...

作者

  • 15 篇 das ashok kumar
  • 14 篇 mahmood khalid
  • 12 篇 jong-hyouk lee
  • 11 篇 lee jong-hyouk
  • 9 篇 fan chun-i
  • 9 篇 gong chen
  • 8 篇 kim tai-hoon
  • 8 篇 hyoung-kyu song
  • 7 篇 bhattacharyya de...
  • 7 篇 cao xiaochun
  • 6 篇 young-gab kim
  • 6 篇 yang jian
  • 6 篇 kim young-gab
  • 6 篇 shamshad salman
  • 6 篇 xu qianqian
  • 5 篇 jihye kim
  • 5 篇 yang zhiyong
  • 5 篇 jaehyoung park
  • 5 篇 huang qingming
  • 5 篇 park jaehyoung

语言

  • 233 篇 英文
  • 62 篇 其他
  • 4 篇 中文
检索条件"机构=Department of Computer and Information Security & Convergence Engineering for Intelligent"
299 条 记 录,以下是11-20 订阅
排序:
Simulation of an ARP Spoofing Attack on the E2 Interface in Open RAN  35
Simulation of an ARP Spoofing Attack on the E2 Interface in ...
收藏 引用
35th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2024
作者: Kim, Jihye Park, Jaehyoung Lee, Jong-Hyouk Sejong University Dept. of Computer and Information Security Seoul Korea Republic of Sejong University Dept. of Computer and Information Security & Convergence Engineering for Intelligent Drone Seoul Korea Republic of
In anticipation of the 5G-Advanced and 6G era, this paper explores Open RAN as an innovative solution to enhance the existing Radio Access Network (RAN) capabilities, particularly in managing the surge in mobile traff... 详细信息
来源: 评论
MV-Honeypot:security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms
收藏 引用
computer Modeling in engineering & Sciences 2024年 第10期141卷 655-669页
作者: Arpita Dinesh Sarang Mohsen Ali Alawami Ki-Woong Park SysCore Lab.(Convergence Engineering for Intelligent Drone) Sejong UniversitySeoul05006Republic of Korea Division of Computer Engineering Hankuk University of Foreign StudiesYongin-si17035Republic of Korea Department of Information Security Sejong UniversitySeoul05006Republic of Korea
Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various ***,the Avatar and Metaverse are being ... 详细信息
来源: 评论
A Self-Adaptive Access Control Framework Based on User Attributes Among Heterogeneous Internet of Things Platforms  9
A Self-Adaptive Access Control Framework Based on User Attri...
收藏 引用
Joint 9th International Conference on Digital Arts, Media and Technology with 7th ECTI Northern Section Conference on Electrical, Electronics, computer and Telecommunications engineering, ECTI DAMT and NCON 2024
作者: Park, Jihoon Koo, Jahoon Kim, Young-Gab Sejong University Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Seoul Korea Republic of Sejong University Dept. of Computer and Information Security Seoul Korea Republic of
Internet of Things (IoT) platforms are being actively designed to provide various services to users. However, most IoT platforms are developed in independent environments, causing difficulties in their interoperabilit... 详细信息
来源: 评论
Deep Learning Based Underground Sewer Defect Classification Using a Modified RegNet
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5451-5469页
作者: Yu Chen Sagar A.S.M.Sharifuzzaman Hangxiang Wang Yanfen Li L.Minh Dang Hyoung-Kyu Song Hyeonjoon Moon Department of Computer Science and Engineering Sejong UniversitySeoul05006Korea Department of Intelligent Mechatronics Engineering Sejong UniversitySeoul05006Korea Department of Information of Communication Engineering and Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea
The sewer system plays an important role in protecting rainfall and treating urban *** to the harsh internal environment and complex structure of the sewer,it is difficult to monitor the sewer *** are developing diffe... 详细信息
来源: 评论
Plotting OSS-Based Supply Chain Attack Strategies and the Defense Failure  1
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Sarang, Arpita Dinesh Choi, Sang-Hoon Park, Ki-Woong SysCore Lab Department of Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul05006 Korea Republic of SysCore Lab Sejong University Seoul05006 Korea Republic of Department of Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul05006 Korea Republic of
The supply chain attack, which targets open-source software, is currently the most discussed cyberattack. This is due to the recent open-source XZ utils and PyPI projects based attacks where the attackers employed sim... 详细信息
来源: 评论
Efficient Gauss-Seidel Precoding with Parallel Calculation in Massive MIMO Systems
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 491-504页
作者: Hyun-Sun Hwang Jae-Hyun Ro Chan-Yeob Park Young-Hwan You Hyoung-Kyu Song Department of Information and Communication Engineering Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea Department of Convergence Engineering for Intelligent Drone Sejong UniversitySeoul05006Korea Department of Computer Engineering Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea
A number of requirements for 5G mobile communication are satisfied by adopting multiple input multiple output(MIMO)*** inter user interference(IUI)which is an inevitable problem in MIMO systems becomes controllable wh... 详细信息
来源: 评论
Improved MIMO Signal Detection Based on DNN in MIMO-OFDM System
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 3625-3636页
作者: Jae-Hyun Ro Jong-Gyu Ha Woon-Sang Lee Young-Hwan You Hyoung-Kyu Song Department of Convergence Engineering for Intelligent Drone Sejong UniversitySeoul05006Korea Department of Information and Communication Engineering Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea Department of Computer Engineering Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea
This paper proposes the multiple-input multiple-output(MIMO)detection scheme by using the deep neural network(DNN)based ensemble machine learning for higher error performance in wireless communication *** the MIMO det... 详细信息
来源: 评论
Experimental Approach to Internal security Threats for 5G-Advanced Core Networks  35
Experimental Approach to Internal Security Threats for 5G-Ad...
收藏 引用
35th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2024
作者: Park, Jaehyoung Kim, Jihye Woo, Seungchan Park, Kyungmin Kim, Jonghyun Lee, Jong-Hyouk Sejong University Dept. of Computer and Information Security & Convergence Engineering for Intelligent Drone Seoul Korea Republic of Sejong University Dept. of Computer and Information Security Seoul Korea Republic of Sejong University Dept. of Computer and Information Security & Convergence Engineering for Metaverse Seoul Korea Republic of Electronics and Telecommunications Research Institute Daejeon Korea Republic of
As we embrace the dawn of the 5G era, the fusion of Software Defined Network (SDN) and Network Function Virtualization (NFV) technologies has heralded a new epoch in network architecture. This provides indispensable c... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Provably secure signature-based anonymous user authentication protocol in an Internet of Things-enabled intelligent precision agricultural environment
Provably secure signature-based anonymous user authenticatio...
收藏 引用
作者: Vangala, Anusha Das, Ashok Kumar Lee, Jong-Hyouk Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul Korea Republic of
User authentication is a promising security solution in which an external user having his/her mobile device can securely access the real-time information directly from the deployed smart devices in an Internet of Thin... 详细信息
来源: 评论