咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,330 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,635 篇 工学
    • 2,782 篇 计算机科学与技术...
    • 2,313 篇 软件工程
    • 959 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 508 篇 电气工程
    • 417 篇 生物工程
    • 333 篇 电子科学与技术(可...
    • 244 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 195 篇 安全科学与工程
    • 178 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 133 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,569 篇 理学
    • 825 篇 数学
    • 451 篇 生物学
    • 324 篇 物理学
    • 261 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 954 篇 管理学
    • 602 篇 管理科学与工程(可...
    • 391 篇 图书情报与档案管...
    • 302 篇 工商管理
  • 299 篇 法学
    • 188 篇 社会学
  • 266 篇 医学
    • 217 篇 临床医学
    • 198 篇 基础医学(可授医学...
    • 119 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 42 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 217 篇 accuracy
  • 192 篇 deep learning
  • 181 篇 feature extracti...
  • 179 篇 machine learning
  • 175 篇 security
  • 159 篇 internet of thin...
  • 152 篇 training
  • 139 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 93 篇 cryptography
  • 90 篇 protocols
  • 90 篇 artificial intel...
  • 82 篇 convolutional ne...
  • 79 篇 data models
  • 73 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 162 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 57 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 47 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 peng hao
  • 20 篇 sofotasios pasch...
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 jin hai
  • 17 篇 liu yang
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,449 篇 英文
  • 330 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5838 条 记 录,以下是131-140 订阅
排序:
Implementing Three Factors Authentication System (3FA) to Maintain Employee Attendance Record to Enhance security  3
Implementing Three Factors Authentication System (3FA) to Ma...
收藏 引用
3rd IEEE International Conference on Intelligent Technologies, CONIT 2023
作者: Johnson, Plezzant Columbus Kant, Shri Kumar, Sandeep Sharda University Department of Computer Science Engineering India Sharda University Center for Cyber Security and Cryptology India
Today as we all know that maintaining of employee credential have been some major issues around the world. Finding it more difficult to keep track of employees. With this, the company, institution, or government entit... 详细信息
来源: 评论
Demand Response in Smart Grids: Challenges, Solutions, and security Implications  2
Demand Response in Smart Grids: Challenges, Solutions, and S...
收藏 引用
2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Abdelraouf, Hussien Gogolkiewicz, Ryker Kim, Nathaniel McCaughan, Nicholas Alanes, Joel Nadhaif, Ali Fouda, Mostafa M. Ibrahem, Mohamed I. Augusta University School of Computer and Cyber Sciences AugustaGA30912 United States George Mason University Cyber Security Engineering Department FairfaxVA United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States
This paper discusses demand response (DR) in the context of smart grids (SGs). DR is a method of controlling electricity consumption and production, usually for financial and security reasons. The topics covered inclu... 详细信息
来源: 评论
Red deer algorithm to detect the secret key of the monoalphabetic cryptosystem
收藏 引用
Soft Computing 2024年 第17-18期28卷 10569-10582页
作者: Jain, Ashish Bansal, Sulabh Das, Nripendra Narayan Gupta, Shyam Sunder Department of Information Technology School of Information Security and Data Science Manipal University Jaipur Jaipur303007 India Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Madhya Pradesh Gwalior474005 India
Encryption of a plaintext involves a secret key. The secret key of classical cryptosystems can be successfully determined by utilizing metaheuristic techniques. Monoalphabetic cryptosystem is one of the famous classic... 详细信息
来源: 评论
Privacy Preservation Techniques in Smart Grids: Balancing security and Utility in IoT-Driven Environments  2
Privacy Preservation Techniques in Smart Grids: Balancing Se...
收藏 引用
2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Abdelraouf, Hussien Long, Michael Tran, Paul Baral, Luna Khan, Zuha Mahmoud, Mohamed Fouda, Mostafa M. Ibrahem, Mohamed I. Augusta University School of Computer and Cyber Sciences AugustaGA30912 United States George Mason University Cyber Security Engineering Department FairfaxVA United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States
The Internet of Things (IoT) has significantly impacted the energy industry, leading to increased reliance on smart grid (SG) technology. However, integrating electricity with the internet introduces security vulnerab... 详细信息
来源: 评论
Enhancing Side-Channel Attacks Prediction using Convolutional Neural Networks  14
Enhancing Side-Channel Attacks Prediction using Convolutiona...
收藏 引用
14th International Conference on Advanced computer Information Technologies, ACIT 2024
作者: Alemerien, Khalid Al-Suhemat, Sadeq Alsuhimat, Fadi Altarawneh, Enshirah Tafila Technical University Information Technology Department Tafila Jordan Isra University Faculty of Information Technology Amman Jordan Philadelphia University Cyber Security Department Amman Jordan Hashemite University Computer Engineering Department Zarqa Jordan
A common type of cyberattack is the side channel attack (SCA), which affects many devices and equipment connected to a network. These attacks have different types, like power attacks such as DPA, electromagnetic attac... 详细信息
来源: 评论
AI-Driven Solutions for Cloud security Implementing Intelligent Threat Detection and Mitigation Strategies
AI-Driven Solutions for Cloud Security Implementing Intellig...
收藏 引用
2024 IEEE International Conference on Intelligent Computing and Emerging Communication Technologies, ICEC 2024
作者: Yasani, Rajashekar Reddy Prasad, Putalpattu Muni Srinivas, Pattlola Reddy, N V Raja Sekhar Jawarkar, Parag Raghunath, Vedaprada Cloud Security Cloud Computing Cyber Security India University of Rome Tor Vergata Department of Industrial Engineering Italy Department of Computer Science and Engineering Telangana India Mlr Institute of Technology Department of It India Shri Ramdeobaba College of Engineering and Management Electronics Engineering Nagpur India Visveswaraya Technological University India
Adapting threat detection and response procedures is essential for businesses to stay ahead of the constantly developing cyberattack landscape. Researching cutting-edge tools like XDR, SIEM, SOAR, and NDR - which shed... 详细信息
来源: 评论
Using dummy data for RFID tag and reader authentication
收藏 引用
Digital Communications and Networks 2022年 第5期8卷 804-813页
作者: Baha’A.Alsaify Dale R.Thompson Abdallah Alma'aitah Jia Di Department of Network Engineering and Security Jordan University of Science and TechnologyIrbid21163Jordan Computer Science and Computer Engineering Department University of ArkansasFayetteville72701ARUSA
Radio-Frequency IDentification(RFID)technology is an essential enabler of a multitude of intelligent *** robust authentication of RFID system components is critical in providing trustworthy data delivery from/to *** t... 详细信息
来源: 评论
Image-Based Malware Classification: A Systematic Literature Review  1
Image-Based Malware Classification: A Systematic Literature ...
收藏 引用
1st IEEE International Conference on Cryptography, Informatics, and cybersecurity, ICoCICs 2023
作者: Yudhistira Utomo, Dimas Wahyu Lim, Charles Cyber and Crypto Polytechnic Cyber Security Engineering Bogor Indonesia Swiss German University Information Technology Department Banten Tangerang Indonesia
Malware, a shortened term for malicious software, refers to software or code designed to harm targets using malicious activities. Effective classification of malware is essential for developing robust detection and pr... 详细信息
来源: 评论
An Enhanced Product Quality Evaluation using Hybrid LSTM-FCNN Model and GWO Algorithm for Social Media Sentiment Analysis  8
An Enhanced Product Quality Evaluation using Hybrid LSTM-FCN...
收藏 引用
8th International Conference on Electronics, Communication and Aerospace technology, ICECA 2024
作者: Raj Kumar, V.S. Kumaresan, T. Kanna, P. Rajesh Jagadeesan, S. Showmiya, P. Nithin, P. Bannari Amman Institute of Technology Department of Artificial Intelligence and Data Science Erode India Bannari Amman Institute of Technology Department of Computer Science and Engineering Erode India Nandha Engineering College Department of Computer Science and Engineering Erode India Nehru Institute of Technology Department of Computer Science - Cyber Security Coimbatore India Bannari Amman Institute of Technology Department of Artificial Intelligence and Machine Learning Erode India
Sentiment analysis is still in its developing era, and sometimes, struggles are faced in evaluating user sentiment due to the use of traditional models to analyze the relationship structures in social media interactio... 详细信息
来源: 评论
Personalized Educational Video Evaluation Combining Student's Cognitive and Teaching Style
Personalized Educational Video Evaluation Combining Student'...
收藏 引用
2023 IEEE International Conference on Systems, Man, and cybernetics, SMC 2023
作者: Weng, Jinta Dong, Haoyu Deng, Yifan Hu, Yue Wu, Hao Huang, Heyan School of Cyber Security University of Chinese Academy of Sciences China School of Computer Science and Cyber Engineering Guangzhou University China School of Computer Science and Technology Southeast Academy of Information Technology Beijing Institute of Technology China
AI-powered technologies, like ChatGPT and learning analytic technologies, have encouraged the sharing of online teaching resources and the transformation of teaching methods and learning pathways. However, the mixed r...
来源: 评论