咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,330 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,635 篇 工学
    • 2,782 篇 计算机科学与技术...
    • 2,313 篇 软件工程
    • 959 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 508 篇 电气工程
    • 417 篇 生物工程
    • 333 篇 电子科学与技术(可...
    • 244 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 195 篇 安全科学与工程
    • 178 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 133 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,569 篇 理学
    • 825 篇 数学
    • 451 篇 生物学
    • 324 篇 物理学
    • 261 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 954 篇 管理学
    • 602 篇 管理科学与工程(可...
    • 391 篇 图书情报与档案管...
    • 302 篇 工商管理
  • 299 篇 法学
    • 188 篇 社会学
  • 266 篇 医学
    • 217 篇 临床医学
    • 198 篇 基础医学(可授医学...
    • 119 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 42 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 217 篇 accuracy
  • 192 篇 deep learning
  • 181 篇 feature extracti...
  • 179 篇 machine learning
  • 175 篇 security
  • 159 篇 internet of thin...
  • 152 篇 training
  • 139 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 93 篇 cryptography
  • 90 篇 protocols
  • 90 篇 artificial intel...
  • 82 篇 convolutional ne...
  • 79 篇 data models
  • 73 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 162 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 57 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 47 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 peng hao
  • 20 篇 sofotasios pasch...
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 jin hai
  • 17 篇 liu yang
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,449 篇 英文
  • 330 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5838 条 记 录,以下是21-30 订阅
排序:
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
security Flaw in TCP/IP and Proposed Measures  1
收藏 引用
International Conference on Recent Developments in cyber security, ReDCySec 2023
作者: Upadhyay, Sourav Kumar Kumar, Prakash Department of Computer Science and Engineering BIT Sindri Dhanbad India Department of Computer Science and Cyber Security JRSU Ranchi India
The whole Internet is based on TCP/IP protocol suite. The inherent flaw in the TCP/IP makes a cascading effect for other attacks like flooding, fingerprinting, and many more. All the switching and routing mechanisms a... 详细信息
来源: 评论
IDCE:Integrated Data Compression and Encryption for Enhanced security and Efficiency
收藏 引用
computer Modeling in engineering & Sciences 2025年 第4期143卷 1029-1048页
作者: Muhammad Usama Arshad Aziz Suliman A.Alsuhibany Imtiaz Hassan Farrukh Yuldashev Department of Cyber Security Pakistan Navy Engineering CollegeNational University of Sciences and TechnologyKarachi75350Pakistan Department of Computer Science Main CampusIqra UniversityKarachi75500Pakistan Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Informatics and Its Teaching Methods Tashkent State Pedagogical UniversityTashkent100170Uzbekistan
Data compression plays a vital role in datamanagement and information theory by reducing ***,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable t... 详细信息
来源: 评论
Dynamic Graph-Enhanced Sequential LSTM for Context-Aware Point-of-Interest Recommendation  21
Dynamic Graph-Enhanced Sequential LSTM for Context-Aware Poi...
收藏 引用
21st International computer Conference on Wavelet Active Media technology and Information Processing, ICCWAMTIP 2024
作者: Yuwen, Zhang Shaobo, Ren School of Computer Science and Engineering School of Cyber Security University of Electronic Science and Technology of China Chengdu China
Next Point-of-Interest (POI) recommendation is a critical task in location-based services, aiming to predict the user's next POI based on historical check-in data. Existing approaches often rely on static graphs o... 详细信息
来源: 评论
Multi-Behavioral Recommender System with Heterogeneous Graph Learning  4
Multi-Behavioral Recommender System with Heterogeneous Graph...
收藏 引用
4th International Conference on Consumer Electronics and computer engineering, ICCECE 2024
作者: Feng, Jiaming Liu, Yang Zhang, Junjie School of Computer Science and Engineering School of Cyber Security University of Electronic Science and Technology of China Chengdu China
With the rapid development of online platforms and the explosive growth of user-generated data, personalized recommendation systems have become increasingly crucial in delivering relevant content to users. Traditional... 详细信息
来源: 评论
Enhancing the security of SDN in 5G: A Hybrid Feature Selection Based Ensemble Machine Learning Framework for Classification of cyber-Attacks
收藏 引用
SN computer Science 2025年 第3期6卷 1-16页
作者: Singh, Mahendra Pratap Haimashreelakshmi Singh, Virendra Pratap Gupta, Maanak Cyber Security Research Lab (CSRL) Department of Computer Science and Engineering National Institute of Technology Karnataka Surathkal Mangaluru 575025 India Department of Computer Science Tennessee Technological University Cookeville TN United States
In recent years, the adoption of 5G has significantly increased due to its numerous benefits, including high availability, lower latency, improved reliability, and high performance. To manage packet flow, 5G relies on... 详细信息
来源: 评论
Distortion Evaluation of EMP Sensors Using Associated-Hermite Functions
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1093-1105页
作者: Rupo Ma Siping Gao College of Command and Control Engineering Army Engineering UniversityNanjing210007China Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjing210031China Department of Electrical and Computer Engineering National University of Singapore119260Singapore
Electromagnetic pulse(EMP)is a kind of transient electromagnetic phenomenon with short rise time of the leading edge and wide spectrum,which usually disrupts communications and damages electronic equipment and *** is ... 详细信息
来源: 评论
CSA4Rec: Collaborative Signals Augmentation Model Based on GCN for Recommendation  25th
CSA4Rec: Collaborative Signals Augmentation Model Based on ...
收藏 引用
25th International Conference on Web Information Systems engineering, WISE 2024
作者: Liu, Haibo Yu, Lianjie Si, Yali Liu, Jinglian School of Cyber Security and Computer Hebei University Baoding Baoding China School of Computer Science and Engineering Changshu Institute of Technology Suzhou China
Graph Convolution Network (GCN) is a potent deep learning methodology and GCN-based graph data augmentation methods excel in recommender systems. The augmented data, as the higher-order collaborative signals, is gener... 详细信息
来源: 评论
Advancing Android Malware Detection with BioSentinel Neural Network using Hybrid Deep Learning Techniques  18
Advancing Android Malware Detection with BioSentinel Neural ...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Rani, D. Sandhya Gnaneshwar, K. Sampurnima Pattem, K. Sekhar, Soma Krishna, G. Bala Kakarla, Shirisha Cvr College of Engineering Department of Computer Science Engineering Rangareddy Ibrahimpatnam India Sreenidhi Institute of Science and Technology Department of Computer Science Engineering-Cyber Security Hyderabad India Vardhaman College of Engineering Department of Computer Science Engineering Hyderabad India
The paper introduces the BioSentinel Neural Network (BSNN), a novel hybrid deep learning model designed to enhance malware detection, particularly focusing on zero-day threats. The BSNN model integrates diverse neural... 详细信息
来源: 评论
Adapting to Evasive Tactics through Resilient Adversarial Machine Learning for Malware Detection  18
Adapting to Evasive Tactics through Resilient Adversarial Ma...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Krishna, G. Bala Sravan Kumar, G. Ramachandra, Mummadi Sampurnima Pattem, K. Rani, D. Sandhya Kakarla, Geeta Cvr College of Engineering Department of Computer Science Engg. Rangareddy Ibrahimpatnam India Cvr College of Engineering Department of Computer Science Engg.-Cyber Security Rangareddy Ibrahimpatnam India Sreenidhi Institute of Science and Technology Department of Computer Science Engg. Hyderabad India Sreenidhi Institute of Science and Technology Department of Computer Science Engg. Cyber Security Hyderabad India
This paper presents the Adaptive Resilience-based Convolutional Network (ARCNet), a sophisticated machine learning framework specifically designed to detect advanced, evasive malware. ARCNet combines convolutional and... 详细信息
来源: 评论