咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,307 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,613 篇 工学
    • 2,769 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 955 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 499 篇 电气工程
    • 417 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 243 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 194 篇 安全科学与工程
    • 177 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 132 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,564 篇 理学
    • 822 篇 数学
    • 451 篇 生物学
    • 322 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 952 篇 管理学
    • 601 篇 管理科学与工程(可...
    • 390 篇 图书情报与档案管...
    • 301 篇 工商管理
  • 296 篇 法学
    • 188 篇 社会学
  • 265 篇 医学
    • 216 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 218 篇 accuracy
  • 193 篇 deep learning
  • 181 篇 feature extracti...
  • 180 篇 machine learning
  • 175 篇 security
  • 158 篇 internet of thin...
  • 153 篇 training
  • 141 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 cryptography
  • 90 篇 protocols
  • 89 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 56 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 46 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,431 篇 英文
  • 324 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5815 条 记 录,以下是211-220 订阅
排序:
Smart Agriculture-Based Food Quality Analysis with Healthcare security System Using Cloud Machine Learning Model
收藏 引用
Remote Sensing in Earth Systems Sciences 2024年 第4期7卷 389-398页
作者: Vaithianathan, V. Rebecca, B. Begum, M. Fathima Sundarraj, Antony Allwyn Kumar, M. Prema Kiran, Ajmeera Department of Electronics and Communication Engineering Sri Sivasubramaniya Nadar College of Engineering Kalavakkam Chennai 603110 India Department of Computer Science and Engineering Marri Laxman Reddy Institute of Technology and Management Hyderabad Telangana Dundigal 500043 India Assistant Professor Department of Computer Science and Engineering (Cyber Security) Madanapalle Institute of Technology and Science Andhra Pradesh-517325 Madanapalle India Department of Food Technology Sri Shakthi Institute of Engineering and Technology Coimbatore Tamilnadu Coimbatore India Dept. of ECE Shri Vishnu Engineering College for Women (A) Andhra Pradesh Bhimavaram 534202 India Department of Computer Science and Engineering MLR Institute of Technology Hyderabad India
The primary sector of our Indian economy is agriculture. Today’s world’s most important and vital industries are agriculture and irrigation. Information and communication technology must be used in our agriculture s... 详细信息
来源: 评论
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 358-366页
作者: Chintan Patel Ali Kashif Bashir Ahmad Ali AlZubi Rutvij Jhaveri School of Artificial Intelligence Information Technology and Cyber SecurityRashtriya Raksha UniversityGujaratIndia Department of Computing and Mathematics Manchester Metropolitan UniversityUnited Kingdom Woxsen School of Business Woxsen UniversityIndia Department of Computer Science and Mathematics Lebanese American UniversityBeirutLebanon Computer Science Department Community CollegeKing Saud UniversityP.O.Box 28095Riyadh11437Saudi Arabia Department of Computer Science and Engineering School of TechnologyPandit Deendayal Energy UniversityGujaratIndia
Industrial IoT(IIoT)aims to enhance services provided by various industries,such as manufacturing and product *** suffers from various challenges,and security is one of the key challenge among those *** and access con... 详细信息
来源: 评论
Novel Approach for Key-Based Hashing Algorithm
Novel Approach for Key-Based Hashing Algorithm
收藏 引用
2023 IEEE Region 10 Symposium, TENSYMP 2023
作者: Shah, Kaushal Joshi, Kunj Parmar, Dwireph Patel, Dhrumin Padhya, Mukti Pandit Deendayal Energy University Department of Computer Engineering Gandhinagar India National Forensics Sciences University Department of Cyber Security Gandhinagar India
The existing key-based hashing algorithms, such as HMAC, NMAC and GMAC are highly dependent on pre-existing hashing algorithms such as MD5 and SHA1 which are self-sufficient and independent from the usage of keys. Hen... 详细信息
来源: 评论
Guarding Voices, Protecting Homes: A Comprehensive Case Study on Voice Assistant security in Smart Living  12
Guarding Voices, Protecting Homes: A Comprehensive Case Stud...
收藏 引用
12th International Symposium on Digital Forensics and security, ISDFS 2024
作者: Rehman, Fazalur Hashmi, Joudat Abdullah, Moiz Zaman, Hafsah School of Electrical Engineering and Computer Science National University of Sciences and Technology Islamabad Pakistan College of Engineering Georgia Tech University Department of Analytics United States Air University Faculty of Computing and Artificial Intelligence Department of Cyber Security Islamabad Pakistan
The evolution of technologies in the last decades has transformed the whole human interaction experience with the digital world. Integrated into users' home voice assistant devices has rationalized personal intera... 详细信息
来源: 评论
GLIMMER: Incorporating Graph and Lexical Features in Unsupervised Multi-Document Summarization  27
GLIMMER: Incorporating Graph and Lexical Features in Unsuper...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Liu, Ran Liu, Ming Yu, Min Jiang, Jianguo Li, Gang Zhang, Dan Li, Jingyuan Meng, Xiang Huang, Weiqing Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China School of Information Technology Deakin University Australia Department of Computer Science Beijing Technology and Business University China
Pre-trained language models are increasingly being used in multi-document summarization tasks. However, these models need large-scale corpora for pre-training and are domain-dependent. Other non-neural unsupervised su... 详细信息
来源: 评论
A Performance Analysis of Hyperledger Fabric for Blockchain-Based Concert Ticketing Systems  4
A Performance Analysis of Hyperledger Fabric for Blockchain-...
收藏 引用
4th International Conference on Electrical engineering and computer Science, ICECOS 2024
作者: Juliansyah, Muhammad Rafi Khunaifi, Aan Syariati, Ali Reza Prasetyo, Andri Puji Rafianti, Dewi Suci Wijanarto, Fajaryan Ramadhan, Insan Handoyo, Karina Mayasita Santoso, Tanzi Mubaroq Harmanda, Topan Try Sahreza, Yosi National Research and Innovation Agency Research Center for Artificial Intelligence and Cyber Security Jakarta Indonesia Gunadarma University Department of Technology and Engineering Jakarta Indonesia
Indonesia's booming music industry faces a rise in fraudulent ticketing, impacting both event organizers and concertgoers. This research develops and analyzes a blockchain-based concert ticketing system using Hype... 详细信息
来源: 评论
Unveiling the Future: Exploring the Impacts and Challenges of Artificial Intelligence in Workplace Applications  3
Unveiling the Future: Exploring the Impacts and Challenges o...
收藏 引用
3rd International Conference for Advancement in technology, ICONAT 2024
作者: Pragith, S. Supriya, S. Sasikala, S. Sateesh, Rayala Swamy, Hemanth Karpagam, P. Vellore Institute of Technology Department of Computer Science Engineering Vellore India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering India Tagore Engineering College Department of ECE Chennai India MLR Institute of Technology Department of ECE Hyderabad India Motorola Solutions United States Dhanalakshmi College of Engineering Department of Cyber Security Chennai India
Unveiling the Future: Exploring the Impacts and Challenges of Artificial Intelligence in Society' embarks on a comprehensive journey through the transformative landscape shaped by Artificial Intelligence (AI). Thi... 详细信息
来源: 评论
Optimizing Energy Management and Load Balancing Through AI-Driven Quantum Approximate Optimization  4
Optimizing Energy Management and Load Balancing Through AI-D...
收藏 引用
4th IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2024
作者: Manjunath Kamath, K. Manasa, M. Anitha, B.S. Mahadevi Tlajiya, Falguni Chavan, Sangramjit Department of Cyber Security Karkala India Brindavan College of Engineering Department of Artificial Intelligence and Machine Learning Bengaluru India Sarada Vilas College Department of Computer Science Mysuru India Parul institute of Engineering and Technology Parul University Department of Electrical Engineering Gujarat India Pune India
The integration of Quantum Approximate Optimization Algorithm (QAOA) and Quantum Annealing (QA) offers a promising approach to addressing energy management and load balancing challenges in modern power systems. This s... 详细信息
来源: 评论
Forensic Analysis of I2P Communication Network in Android and macOS Environments  18
Forensic Analysis of I2P Communication Network in Android an...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Wangchuk, Tashi Mandela, Ngaira Mbinda, Tumaini Damedjate, Kamboisssoi Etyang, Felix Makopa, Joel Royal University of Bhutan Department of Information Technology Dewathang Bhutan National Forensic Sciences University School of Cyber Security and Digital Forensics Gandhinagar India Cochin University of Science and Technology School of Computer Science and Engineering Kochi India
The Invisible Internet Project (I2P) has emerged as a crucial privacy-centric communication network, offering users a secure and anonymous online environment. As the utilization of I2P continues to expand, the demand ... 详细信息
来源: 评论
A RECENT REVIEW ON IoT BASED TECHNIQUES AND APPLICATIONS
A RECENT REVIEW ON IoT BASED TECHNIQUES AND APPLICATIONS
收藏 引用
2024 International Conference on Sustainable Computing and Integrated Communication in Changing Landscape of AI, ICSCAI 2024
作者: Singh, Arjun Kumar, Sandeep Kumar, Sandeep Bahuguna, Renu Singh, Mahesh Kumar Raj, Nikhil Department Of Computer Science and Engineering Greater Noida Institute of Technology Greater Noida India Department Of Information Technology Raj Kumar Goel Institute Technology Ghaziabad India Department Of Electronics and Communication Engineering G.L. BAJAJ Institute of Technology & Management Greater Noida India Department Of Cyber Security COER University Roorkee India Department Of Computer Science and Engineering Dronacharya Group of Institutions Greater Noida India
IoT known as Internet of Things is an advanced mechanics which has changed the way humans’ smart devices, smart things, data, and information are connected throughout the world. IoT is a single concept of embedding e... 详细信息
来源: 评论