咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,351 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,945 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,683 篇 工学
    • 2,818 篇 计算机科学与技术...
    • 2,331 篇 软件工程
    • 971 篇 信息与通信工程
    • 551 篇 控制科学与工程
    • 513 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 251 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,577 篇 理学
    • 830 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 263 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 130 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 229 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 185 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 blockchain
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 protocols
  • 89 篇 artificial intel...
  • 84 篇 convolutional ne...
  • 80 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 71 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of cy...
  • 38 篇 department of co...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 30 篇 university of bu...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 29 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 han zhu
  • 17 篇 naglaa f.soliman
  • 17 篇 jin hai
  • 16 篇 ma jianfeng

语言

  • 4,940 篇 英文
  • 948 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5945 条 记 录,以下是1331-1340 订阅
排序:
Modeling and Optimization of Discrete Evolutionary Systems of İnformation security Management in a Random Environment  1
收藏 引用
International Conference on Machine Learning and Autonomous Systems, ICMLAS 2021
作者: Lakhno, V.A. Kasatkin, D.Y. Skliarenko, O.V. Kolodinska, Y.O. Department of Computer Systems and Networks National University of Life and Environmental Sciences of Ukraine Kyiv Ukraine Department of Information Technology Cyber Security and Mathematical Sciences Private Higher Education Institution European University Kyiv Ukraine
A method for studying the stability of zero solutions of a system of nonlinear difference equations depending on the semi-Markov chain is proposed. The essence of the proposed method is to study the stability of momen... 详细信息
来源: 评论
E-Commerce Supply Chains with Considerations of cyber-security  1
E-Commerce Supply Chains with Considerations of Cyber-Securi...
收藏 引用
1st International Conference on computer Science and Emerging Technologies, CSET 2023
作者: Zawaideh, Firas H. Abu-Ulbeh, Waheeb Majdalawi, Yousef I. Zakaria, Muhammad D. Jusoh, Julaily Aida Das, Sunanda Irbid National University Faculty of Science and Informaiton Technology Department of Cyber Security Irbid Jordan Al-Istiqlal University Faculty of Administrative Sciences and Informatics Cybersecurity Department Palestine Petra University Faculty of Management and Financial Sciences Business & E-commerce Department Amman Jordan Faculty of Informatics and Computing UniSZA Malaysia School of Computer Science and Engineering Jain University Bangalore India
As the global e-commerce landscape continues to expand rapidly, the efficiency and security of supply chains have become critical areas of concern. With the increasing reliance on digital platforms and the interconnec... 详细信息
来源: 评论
A Secure Cardless Automated Teller Machine
A Secure Cardless Automated Teller Machine
收藏 引用
International Conference on Emerging Trends in Networks and computer Communications (ETNCC)
作者: Simon Hlekisana Muchinenyika Fungai Bhunu Shava João Baptista Bastos Software Engineering Department Namibia University of Science and Technology Windhoek Namibia Cyber Security Department Namibia University of Science and Technology Windhoek Namibia
Automated Teller Machines (ATM) are critical to banking operations due to their convenient and widespread use. Apart from queues reduced in banking halls, bank clients can still access services outside the regular ope...
来源: 评论
Secure Blockchain Integration Approach for Knowledge Discovery in Industrial Internet of Things
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2025年 6卷 4772-4787页
作者: Rohan Tripathi Ritam Rao Vivekananda Bhat K. Abhishek Kumar Pandey Ashok Kumar Das Department of Computer Science and Engineering Manipal Institute of Technology Manipal Academy of Higher Education Manipal India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Department of Computer Science and Engineering College of Informatics Korea University Seoul South Korea
The field of Industrial Internet of Things (IIoT) is now being duly recognized as a revolutionary area in industrial automation. With the budding interest of knowledge discovery that helps the businesses in applying t... 详细信息
来源: 评论
Optimizing Gas Consumption in Ethereum Smart Contracts: A Static Analysis Approach
Optimizing Gas Consumption in Ethereum Smart Contracts: A St...
收藏 引用
International Conference on Communication Technologies (ComTech)
作者: Abdur Rehman Raza Muhammad Hanzala Khawir Mahmood Shahzaib Tahir Saifullah Khalid Asif Masood Department of Information Security National University of Sciences and Technology Islamabad Pakistan Department of Computer Software Engineering National University of Sciences and Technology Islamabad Pakistan
Ethereum smart contracts enable decentralized applications (dApps) on the blockchain and execution of each transaction on dApps incurs a gas cost (fee). While the gas cost prevents denial-of-service (DoS) attacks and ... 详细信息
来源: 评论
Terrestrial Radio Propagation Research Datasets Repository  2
Terrestrial Radio Propagation Research Datasets Repository
收藏 引用
2nd International Conference on Multidisciplinary engineering and Applied Science, ICMEAS 2023
作者: Adewole, Kayode S. Olagunju, Hawau Faruk, Nasir Imoize, Agbotiname Lucky Alozie, Emmanuel Sowande, Olugbenga A. Abdulkarim, Abubakar Usman, Aliyu D. Olayinka Imam-Fulani, Yusuf Oloyede, Abdulkarim A. Garba, Salisu Baba, Bashir Abdullahi Musa, Abdulwaheed Adediran, Yinusa A. Taura, Lawan S. University of Ilorin Department of Computer Science Ilorin Nigeria University of Ilorin Department of Telecommunication Science Ilorin Nigeria Sule Lamido University Department of Information Technology Kafin Hausa Nigeria University of Lagos Department of Electrical and Electronics Engineering Nigeria Ruhr University Department of Electrical Engineering and Information Technology Bochum44801 Germany Ahmadu Bello University Department of Electrical Engineering Zaria Nigeria Ahmadu Bello University Department of Electronics and Telecommunication Engineering Zaria Nigeria Sule Lamido University Department of Software Engineering Kafin Hausa Nigeria Sule Lamido University Department of Cyber Security Kafin Hausa Nigeria Kwara State University Department of Electrical and Computer Engineering Malete Nigeria University of Ilorin Department of Electrical and Electronics Engineering Ilorin Nigeria Sule Lamido University Department of Physics Kafin Hausa Nigeria
Terrestrial Radio Propagation (TRP) involves radio wave propagation from one station to another over the surface of the earth. Radio communication systems have been deployed for broadcasting, mobile cellular, and publ... 详细信息
来源: 评论
Metaverse security and Forensics: VR Devices as an Example
Metaverse Security and Forensics: VR Devices as an Example
收藏 引用
14th International Conference on computer engineering and Networks, CENet 2024
作者: Su, Fu Liang, Guangjun Ni, Xueli Zhang, Qinrui Chen, Pu Liu, Jianning Li, Xiang Du, Hongtian Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing China Engineering Research Center of Electronic Data Forensics Analysis Nanjing China Department of Public Security of Jiangsu Province Key Laboratory of Digital Forensics Nanjing China
VR devices are a rapidly emerging type of sensory terminal device in the context of the metaverse, with its immersive use effects attracting a large number of users to experience. However, with the continuous developm... 详细信息
来源: 评论
Meet-in-the-Middle Preimage Attack on Round-Reduced Areion256
收藏 引用
Chinese Journal of Electronics 2025年 第3期34卷 839-848页
作者: Zhang Zhiyu Li Shun Sun Siwei Wang Caibing Hu Lei Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Chinese Academy of Sciences Beijing 100085 China School of Cryptology University of Chinese Academy of Sciences Beijing 100049 China Department of Cryptology Science and Technology Beijing Electronic Science and Technology Institute Beijing 100070 China School of Cyber Security University of Chinese Academy of Sciences Beijing 100049 China State Key Laboratory of Cryptology P.O.Box 5159 Beijing 100878 China
\begin{document}$ \rm{Areion} $\end{document} is a family of highly-efficient permutations proposed by Isobe et al. in the Annual Conference on Cryptographic Hardware and Embedded Systems (CHES) 2023, which is designe... 详细信息
来源: 评论
Design Services at Home-Tailor Application
Design Services at Home-Tailor Application
收藏 引用
Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication engineering (RMKMATE), International Conference on
作者: U. M. Fernandes Dimlo Mohammad Arshad D. Paulraj Balaram Allam M Silpa Raj Department of CSE Sreyas Institute of Engineering and Technology Nagole Hyderabad Department of IT Deccan College of Engineering and Technology Hyderabad (TS) Department of Computer Science and Engineering R.M.K. Engineering College Tamil Nadu India Department of Information Technology MLR Institute of Technology Hyderabad India Department of Computer Science and Engineering (Cyber Security) CVR College of Engineering Hyderabad
Cloths are one of the basic needs of humans and everyone require them at their sense of fashion. Searching out for the best Tailors within a large city is a very tiresome task. Also, visiting a Tailor without appointm...
来源: 评论
Performance Evaluation of Uplink Shared Channel for Cooperative Relay based Narrow Band Internet of Things Network
Performance Evaluation of Uplink Shared Channel for Cooperat...
收藏 引用
2022 International Conference on Business Analytics for technology and security, ICBATS 2022
作者: Hassan, Mona Bakri Hasan, Mohammad Kamrul Ali, Elmustafa Sayed Saeed, Rashid A. Mokhtar, Rania A. Khalifa, Othman O. Hashim, Aisha Hassan Abdalla Electronics Engineering Dept Khartoum Sudan Universiti Kebngsaan Malaysia Center for Cyber Security Faculty of Information Sceince and Technology Selangor Bangi43600 Malaysia Department of Electrical and Electronics Engineering Port Sudan Sudan Taif University College of Computers and Information Technology Department of Computer Engineering P.O. Box 11099 Taif21944 Saudi Arabia International Islamic University Malaysia Department of Electrical and Computer Engineering Lumpur Kuala Malaysia
Low Power Wide Area Network (LPWAN) is one of the fastest growing network techniques provides efficient communciations for smart cities, e-Health, industry 4.0 and other applications. LPWAN enables long-rang communcia... 详细信息
来源: 评论