咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,307 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,613 篇 工学
    • 2,769 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 955 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 499 篇 电气工程
    • 417 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 243 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 194 篇 安全科学与工程
    • 177 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 132 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,564 篇 理学
    • 822 篇 数学
    • 451 篇 生物学
    • 322 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 952 篇 管理学
    • 601 篇 管理科学与工程(可...
    • 390 篇 图书情报与档案管...
    • 301 篇 工商管理
  • 296 篇 法学
    • 188 篇 社会学
  • 265 篇 医学
    • 216 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 218 篇 accuracy
  • 193 篇 deep learning
  • 181 篇 feature extracti...
  • 180 篇 machine learning
  • 175 篇 security
  • 158 篇 internet of thin...
  • 153 篇 training
  • 141 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 cryptography
  • 90 篇 protocols
  • 89 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 56 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 46 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,431 篇 英文
  • 324 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5815 条 记 录,以下是201-210 订阅
排序:
Towards characterizing bug fixes through dependency-level changes in Apache Java open source projects
收藏 引用
Science China(Information Sciences) 2022年 第7期65卷 102-120页
作者: Di CUI Lingling FAN Sen CHEN Yuanfang CAI Qinghua ZHENG Yang LIU Ting LIU School of Computer Science and Technology Xi'an Jiaotong University College of Cyber Science Nankai University College of Intelligence and Computing Tianjin University Department of Computer Science Drexel University School of Computer Science and Engineering Nanyang Technological University School of Cyber Science and Engineering Xi'an Jiaotong University
The complexity and diversity of bug fixes require developers to understand bug fixes from multiple perspectives in addition to fine-grained code changes. The dependencies among files in a software system are an import... 详细信息
来源: 评论
An efficient data aggregation scheme with local differential privacy in smart grid
收藏 引用
Digital Communications and Networks 2022年 第3期8卷 333-342页
作者: Na Gai Kaiping Xue Bin Zhu Jiayu Yang Jianqing Liu Debiao He School of Cyber Science and Technology University of Science and Technology of ChinaHefeiAnhui230027China Department of Electronic Engineering and Information Science University of Science and Technology of ChinaHefeiAnhui230027China Department of Electrical and Computer Engineering University of Alabama in HuntsvilleHuntsvilleAL35899USA Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education School of Cyber Science and EngineeringWuhan UniversityWuhanBeihu430072China
By integrating the traditional power grid with information and communication technology, smart grid achieves dependable, efficient, and flexible grid data processing. The smart meters deployed on the user side of the ... 详细信息
来源: 评论
Distributed Timestamp Mechanism Based on Verifiable Delay Functions
收藏 引用
computer Systems Science & engineering 2023年 第2期44卷 1633-1646页
作者: Qiang Wu Zhaoyang Han Ghulam Mohiuddin Yongjun Ren Engineering Research Center of Digital Forensics of Ministry of Education School of Computer ScienceNanjing University of Information Science and TechnologyNanjing210044China Nanjing University of Aeronautics and Astronautics Nanjing210008China Department of Cyber Security at VaporVM Abu Dhabi999041United Arab Emirates
In the data communication system,the real-time information interaction of communication device increases the risk of privacy sensitive data being tam-pered ***,maintaining data security is one of the most important is... 详细信息
来源: 评论
The Principles of Information security and the Challenges Facing the Internet of Things in Developing Countries  3
The Principles of Information Security and the Challenges Fa...
收藏 引用
3rd International Conference on Emerging Smart Technologies and Applications, eSmarTA 2023
作者: Abdu, Mohammed Abdulwahed M. Murshed, Abdullah Qaid Mohammed Alhammadi, Akram Saeed Aqlan Alsaeed College for Engineering & It Taiz University It Department Taiz Yemen Taiz University Alsaeed College for Engineering & It Computer Network and Cyber Security Department Taiz Yemen
The modern age is witnessing a significant development in information technology. The Internet of Things (henceforth IoT) technology is one such advancement. Since its emergence, it has affected people's life posi... 详细信息
来源: 评论
A Proposed Approach for Risk Planning and Management  25
A Proposed Approach for Risk Planning and Management
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Al Refai, Mohammed N. Al-Smadi, Yazan Al-Momani, Adai Jamhawi, Zeyad M. Otoom, Ahmed Ali Atoum, Issa Yaseen, Ahid Ababneh, Jafar Kanan, Mohammad Zarqa University Software Engineering Dep. Zarqa Jordan Zarqa University Department of Computer Science Zarqa Jordan Applied Science Private University Department of Computer Science Amman Jordan Applied Science Private University Department of Cyber Security Amman Jordan Philadelphia University Faculty of Information Technology Software Engineering Department Jordan Zarqa University Department of Cyber Security Zarqa Jordan University of Business and Technelogy Dep. of Industry Engineering Jeddah21432 Saudi Arabia
Project Risk management is the process of identifying, evaluating, avoiding, or reducing risks. Where there is no software project without risks existence are natural in the context of project planning and management.... 详细信息
来源: 评论
On the Modification of Ring Consistent Hash Uniformity: A Case Study
On the Modification of Ring Consistent Hash Uniformity: A Ca...
收藏 引用
2024 IEEE International Conference on Systems, Man, and cybernetics, SMC 2024
作者: Waqas, Muhammad Lin, Sian-Jheng Liu, Bin Fazi, Adnan School of Cyber Security University of Science and Technology of China Anhui Province Key Laboratory of Digital Security Anhui Hefei China Air University University Department of Avionics Engineering Islamabad Pakistan
Distributed systems' applications employ distributed hashing for minimal dispersal, load balancing, and efficient lookups. One such scheme is Ring Consistent Hashing (RCH), which was initially proposed to tackle t... 详细信息
来源: 评论
Honeypot Comparison of Attack Detection and Mitigation of SSH Attack  3
Honeypot Comparison of Attack Detection and Mitigation of SS...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Ali, Wasif Sajid, Ahthasham Ghodke, Tanvi Ajit Malik, Rida Malik, Neeru Kaushik, Keshav Riphah Institute of System Engineering Riphah International University Department of Cyber Security Islamabad Pakistan Pimpri Chinchwad University Department of Computer Science and Engineering Maharashtra India School of Engineering & Technology Pimpri Chinchwad University Maharashtra Pune India Amity School of Engineering and Technology Amity University Mohali India
This research study addresses the importance of honeypots at multiple levels, which includes but not limited to placement in network or group of networks working alongside in an organization. This paper talks about th... 详细信息
来源: 评论
Utilizing Machine Learning Techniques for Enhanced Predictive Maintenance in the Manufacturing Sector  2
Utilizing Machine Learning Techniques for Enhanced Predictiv...
收藏 引用
2nd International Conference on Networking, Embedded and Wireless Systems, ICNEWS 2024
作者: Wadibhasme, Rashmi N. Naresh, Mallireddy Vikram Arun Sankar, V.V. Suresh, P. Jermina, F. YCCE Department of Information Technology Maharashtra Nagpur India Aditya College of Engineering and Technology Department of Computer Science Engineering 533437 India Karunya Institute of Technology and Sciences Karunya School of Management Coimbatore641114 India Karpagam College of Engineering Department of Mechanical Engineering Coimbatore India Muthayammal Engineering College Mechanical Engineering India Karpagam College of Engineering Department of Cyber Security Coimbatore India
The contributions of machine learning algorithms to predictive maintenance systems, such as classification, regression, and anomaly detection, are investigated to clarify their functions in forecasting equipment malfu... 详细信息
来源: 评论
Application of Data Analysis and Visualization Tools for U.S. Renewable Solar Energy Generation, Its Sustainability Benefits, and Teaching In engineering Curriculum
Application of Data Analysis and Visualization Tools for U.S...
收藏 引用
2024 ASEE Annual Conference and Exposition
作者: Radhakrishnan, Ben D. Altamirano, Nelson Jaurez, James J. Department of Engineering Data and Computer Sciences College of Business Engineering and Technology National University San DiegoCA United States Department of Finance Economics Marketing and Accounting College of Business Engineering and Technology National University San DiegoCA United States Department of Computer Science & Cyber Security College of Business Engineering and Technology National University San DiegoCA United States
The advancement of Data Analysis technologies with visualization has gained significant ground in the industries and they are also gaining ground in higher education curriculum. This research will focus on the applica... 详细信息
来源: 评论
FESR - Framework to evaluate Software Reliability based on software metrics  24
FESR - Framework to evaluate Software Reliability based on s...
收藏 引用
8th International Conference on High Performance Compilation, Computing and Communications, HP3C 2024
作者: Fahad, Hurriya Ahmed, Irfan Mahmood, Jabar Saman Batool, Khadija Ali, Qasim Department of Computer Science University of Sialkot Sialkot Pakistan State Key Laboratory of Blockchain and Data Security School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University Zhejiang Hangzhou310007 China
Evaluating reliability of software is hot concern for decision makers and software engineers seeing as if we assess, it cannot be mastered. It is common that reliability of system stratum could be employed for evaluat... 详细信息
来源: 评论