咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,351 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,945 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,683 篇 工学
    • 2,818 篇 计算机科学与技术...
    • 2,331 篇 软件工程
    • 971 篇 信息与通信工程
    • 551 篇 控制科学与工程
    • 513 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 251 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,577 篇 理学
    • 830 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 263 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 130 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 229 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 185 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 blockchain
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 protocols
  • 89 篇 artificial intel...
  • 84 篇 convolutional ne...
  • 80 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 71 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of cy...
  • 38 篇 department of co...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 30 篇 university of bu...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 29 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 han zhu
  • 17 篇 naglaa f.soliman
  • 17 篇 jin hai
  • 16 篇 ma jianfeng

语言

  • 4,940 篇 英文
  • 948 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5945 条 记 录,以下是1201-1210 订阅
排序:
Modeling of Improved Solar Energy Installation for Efficient Power Systems
Modeling of Improved Solar Energy Installation for Efficient...
收藏 引用
International Conference on Advanced computer Information Technologies (ACIT)
作者: Viktor Satsyk Oleksandr Reshetylo Lyudmila Markina Nataliia Khrystynets Nataliia Bahniuk Yuliia Melnychuk Automation and Computer-Integrated Technologies Department Lutsk National Technical University Lutsk Ukraine Department of Automation and Computer-Integrated Technologies Lutsk National Technical University Lutsk Ukraine Computer Engineering and Cyber Security Department Lutsk National Technical University Lutsk Ukraine Department of Computer Engineering and Cyber Security Lutsk National Technical University Lutsk Ukraine Department of Digital Educational Technologies Lutsk National Technical University Lutsk Ukraine
in the article we develop modeling and creating a prototype of improved solar power plant for economical power supply systems for consumers which require simple autonomous inexpensive practical energy solutions. On th... 详细信息
来源: 评论
Specifications of Virtual Reminder System using Z
Specifications of Virtual Reminder System using Z
收藏 引用
International Conference on Emerging Technologies, ICET
作者: J aviria Naveed Irfan Ahmed Jabar Mahmood Khadija Batool Department of Computer Sciences University of Sialkot Sialkot Pakistan State Key Laboratory of Blockchain and Data Security School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University Hangzhou China
Formal Methods (FM) uses mathematical notations to precisely and accurately define specifications, which helps detect errors and inconsistencies in software development. For mathematical notations, a proper mathematic... 详细信息
来源: 评论
Analysis of Detection and Recognition of Human Face Using Support Vector Machine  1st
Analysis of Detection and Recognition of Human Face Using Su...
收藏 引用
1st International Conference on Artificial Intelligence of Things, ICAIoT 2023
作者: Hannan, Shaikh Abdul Pushparaj Ashfaque, Mohammed Waseem Lamba, Anil Kumar, Anil Computer Science and Information Technology AlBaha University AlBaha Saudi Arabia Electronics and Communication Engineering National Institute of Technical Teachers Training and Research Chandigarh India Computer Science and I.T. Dr. B.A.M. University Aurangabad India Cyber Security Technology Risk and Resilience Oversight American Express New York United States Government Millennium Polytechnic Himachal Pradesh Chamba India
Recently, Support Vector Machines (SVMs) have been suggested as an additional technique for design identification. In this study, a face detection framework with demeanor recognition utilizing Support Vector Machines ... 详细信息
来源: 评论
Computing on Surface: A Multi-Task Multi-Access Offloading Scheme in Maritime Edge Networks
Computing on Surface: A Multi-Task Multi-Access Offloading S...
收藏 引用
2024 International Conference on Cloud and Network Computing, ICCNC 2024
作者: Dai, Minghui Dou, Chenglong Wu, Yuan Qian, Liping Lin, Bin Su, Zhou Shen, Xuemin Sherman University of Macau State Key Laboratory of Internet of Things for Smart City China Zhuhai UM Science and Technology Research Institute Zhuhai China Zhejiang University of Technology College of Information Engineering Hangzhou China Dalian Maritime University Department of Communication Engineering Dalian China Xi'An Jiaotong University School of Cyber Science and Engineering Xi'an China University of Waterloo Department of Electrical and Computer Engineering Waterloo Canada
The recent development of unmanned aerial vehicles (UAVs) technology has been envisioned as a promising paradigm to cater for the growing maritime activities. However, the increasing growth of marine services poses ch... 详细信息
来源: 评论
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage
收藏 引用
Frontiers of computer Science 2022年 第6期16卷 103-121页
作者: Qingqing GAN Joseph K.LIU Xiaoming WANG Xingliang YUAN Shi-Feng SUN Daxin HUANG Cong ZUO Jianfeng WANG Guangzhou Key Laboratory of Multilingual Intelligent Processing School of Information Science and Technology/School of Cyber SecurityGuangdong University of Foreign StudiesGuangzhou510006China Department of Computer Science Jinan UniversityGuangzhou510632China Faculty of Information Technology Monash UniversityClayton3168Australia State Key Laboratory of Integrated Service Networks(ISN) Xidian UniversityXi’an710071China
Searchable symmetric encryption(SSE)has been introduced for secure outsourcing the encrypted database to cloud storage,while maintaining searchable *** various SSE schemes,most of them assume the server is honest but ... 详细信息
来源: 评论
Reliability of a Reconfigurable Network with Segment Switching
Reliability of a Reconfigurable Network with Segment Switchi...
收藏 引用
2023 Wave Electronics and its Application in Information and Telecommunication Systems, WECONF 2023
作者: Tu, Le Anh Bogatyrev, V.A. Abramova, E.A. ITMO University Faculty of Software Engineering and Computer Technology Saint Peterburg Russia Saint-Petersburg State University of Aerospace Instrumentation Department Information Systems Security Saint Petersburg Russia
The article proposes models of the structural reliability of a multipath routing network with the possibility of its reconfiguration when switching path segments. The models are focused on optimizing the placement of ... 详细信息
来源: 评论
An effective security assessment approach for Internet banking services via deep analysis of multimedia data
An effective security assessment approach for Internet banki...
收藏 引用
作者: Khattak, Sana Jan, Sadeeq Ahmad, Iftikhar Wadud, Zahid Khan, Fazal Qudus National Center for Cyber Security-UETP Department of Computer Science and IT University of Engineering and Technology Peshawar Pakistan Department of Computer Science and IT University of Engineering and Technology Peshawar Pakistan Department of Computer Systems Engineering University of Engineering and Technology Peshawar Pakistan Department of Information Technology FCIT King Abdulaziz University Jeddah Saudi Arabia
With the emergence of cyber technology, the biggest evolution has been observed in the use of Internet for financial purposes, in particular for the Internet banking sector. However, with the increase in the number of... 详细信息
来源: 评论
Sentiments Analysis using Machine Learning Algorithms  2
Sentiments Analysis using Machine Learning Algorithms
收藏 引用
2nd International Conference on Electronics and Renewable Systems, ICEARS 2023
作者: Joshi, Vivek Patel, Sanjay Agarwal, Radhika Arora, Himanshu Rashtriya Raksha University School of Information Technology Artificial Intelligence and Cyber Security Gujrat Gandhinagar India Nirma University Department of CSE Gujrat Ahmedabad India Maharaja Sawai Man Singh Vidyalaya Rajasthan Jaipur India Arya Institute of Engineering & Technology Department of CSE Rajasthan Jaipur India
The analysis of the sentiments can be determined if a piece of message or text or comment has a decent, negative or neutral feeling or sentiment. Analysis of sentiments is a subtype of natural language processing that... 详细信息
来源: 评论
Review of Recent Technologies for Tackling COVID-19
收藏 引用
SN computer Science 2021年 第6期2卷 1-27页
作者: Alharbi, Ayman Abdur Rahman, Md Department Of Computer Engineering College of Computer and Information systems Umm AL-Qura University Mecca Saudi Arabia Department of Cyber Security and Forensic Computing College of Computer and Cyber Sciences University of Prince Mugrin Madinah 41499 Saudi Arabia
The current pandemic caused by the COVID-19 virus requires more effort, experience, and science-sharing to overcome the damage caused by the pathogen. The fast and wide human-to-human transmission of the COVID-19 viru... 详细信息
来源: 评论
A Recent Review on IoT Based Techniques and Applications
A Recent Review on IoT Based Techniques and Applications
收藏 引用
Sustainable Computing and Integrated Communication in Changing Landscape of AI (ICSCAI), International Conference on
作者: Arjun Singh Sandeep Kumar Renu Bahuguna Mahesh Kumar Singh Nikhil Raj Department Of Computer Science and Engineering Greater Noida Institute of Technology Greater Noida India Department Of Electronics and Communication Engineering G.L. BAJAJ Institute of Technology & Management Greater Noida India Department Of Cyber Security COER University Roorkee India Department Of Computer Science and Engineering Dronacharya Group of Institutions Greater Noida India Department Of computer Science and Engineering Greater Noida Institute of Technology Greater Noida India
IoT known as Internet of Things is an advanced mechanics which has changed the way humans' smart devices, smart things, data, and information are connected throughout the world. IoT is a single concept of embeddin... 详细信息
来源: 评论