咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是331-340 订阅
排序:
Fault Classification based on Deep Learning for Photovoltaic Systems  2
Fault Classification based on Deep Learning for Photovoltaic...
收藏 引用
2nd International Conference on Distributed Computing and Optimization Techniques, ICDCOT 2024
作者: Kelin, A. R. Darshika Sudhakar, K. Surekha, Pothireddy Palanivel, R. Al-Jawahry, Hassan M. Karunya Institute of Technology and Sciences Data Science and Cyber Security Karunya Nagar Coimbatore India Department Electronics and Communication Engineering Telangana Hyderabad India Griet Department of Computer Science and Engineering Telangana Hyderabad India Nitte Meenakshi Institute of Technology Department of Ai and Ds Bengaluru India The Islamic University Najaf Iraq
In general, high power electronic converters such as Multilevel Inverters (MLI), that find their use in many applications, create difficulties of augmented switch count, capacitor flow current and reverse current flow... 详细信息
来源: 评论
User Behaviour based Insider Threat Detection using a Hybrid Learning Approach
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第4期14卷 4573-4593页
作者: Singh, Malvika Mehtre, B.M. Sangeetha, S. Govindaraju, Venu Centre of Excellence in Cyber Security Institute for Development and Research in Banking Technology Established by Reserve bank of India Telangana Hyderabad500057 India Department of Computer Applications National Institute of Technology Trichy Tamil Nadu Tiruchirappalli620015 India Center for Unified Biometrics and Sensors Department of Computer Science and Engineering State University of New York at Buffalo New York BuffaloNY14260 United States
Insider threats constitute a major cause of security breaches in organizations. They are the employees/users of an organization, causing harm by performing any malicious activity. Most of the existing methods to detec... 详细信息
来源: 评论
Machine Learning-Based Crop Recommendation System  4
Machine Learning-Based Crop Recommendation System
收藏 引用
4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024
作者: Ebenezer, V. Nair, Akash Stewart Kirubakaran, S. Praising Linijah, N.L. Rajan, Jerlin Santhiya, P. Karunya Institute of Technology and Sciences Division of Data Sciences and Cyber Security Coimbatore India Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Karunya School of Management Karunya Institute of Technology and Sciences Coimbatore India
The time-honored way that farmers have been used to apply to the identification of the best crops for better yield is not exhaustive. Under this technique, the management process of powerful and productive resources, ... 详细信息
来源: 评论
A Hybrid cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 201-241页
作者: Naglaa F.Soliman Fatma E.Fadl-Allah Walid El-Shafai Mahmoud I.Aly Maali Alabdulhafith Fathi E.Abd El-Samie Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Electronics and Communications Faculty of EngineeringZagazig UniversityZagazig44519Egypt Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia ***-quality images require well-tuned communication *** Single C... 详细信息
来源: 评论
Temporal Refinement Graph Convolutional Network for Skeleton-Based Action Recognition
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1586-1598页
作者: Zhuang, Tianming Qin, Zhen Ding, Yi Deng, Fuhu Chen, Leduo Qin, Zhiguang Raymond Choo, Kim-Kwang University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu Sichuan610054 China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu Sichuan610054 China School of Advanced Technology Suzhou Jiangsu215123 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
Human skeleton data, which has served in the aspect of human activity recognition, ought to be the most representative biometric characteristics due to its intuitivity and visuality. The state-of-the-art approaches ma... 详细信息
来源: 评论
A Review of Privacy-preserving and Efficient Data Collection and Aggregation in Smart Grids  11
A Review of Privacy-preserving and Efficient Data Collection...
收藏 引用
11th International Conference on Information and Communication technology, ICoICT 2023
作者: Donnelly, William Keifer, Paulina Minor, Robert Muthukumaran, Uthra Parolek, Bryan Tuck, Brandon Ibrahem, Mohamed I. Fouda, Mostafa M. George Mason University Dept of Cyber Security Engineering FairfaxVA United States Augusta University School of Computer and Cyber Sciences AugustaGA United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States
The smart grid fuses the traditional electrical power grid with smart technology to allow for a more distributed, bidirectional flow of communication, data, and electricity. Its advanced metering infrastructure (AMI) ... 详细信息
来源: 评论
Lung Cancer Image Identify and Categorization using Artificial Neural Networks
Lung Cancer Image Identify and Categorization using Artifici...
收藏 引用
2024 International Conference on Computational Intelligence for Green and Sustainable Technologies, ICCIGST 2024
作者: Lingappa, Ediga Begum, D Jareena Pachouri, Priya Rashmi, Kuderu Varalakshmi, Thokala Tharuna Kumar, Anoop Mallareddy College of Engineering Maisammaguda Dept of Computer Science and Engineering TS Secunderabad500100 India CMR Institute of Technology Dept. of Artificial Intelligence and Data Science Bengaluru560037 India Malla Reddy University Dept of Cyber Security Hyderabad India
Lung cancer that is made up of small cells is called small cell lung cancer (SCLC). Smoking tobacco in any form-cigarettes, cigars, or pipes-is by far the most significant risk factor for developing lung cancer, thoug... 详细信息
来源: 评论
Exploring cybersecurity Research Areas, Categories, and Limitations Utilizing an Interdisciplinary Approach  10
Exploring Cybersecurity Research Areas, Categories, and Limi...
收藏 引用
10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and computer engineering, UPCON 2023
作者: Mittal, Vinayak Martolia, Mamta Chhabra, Payal Srivastav, Arun Pratap College of Engineering Department of Cyber Security Roorkee India Krishna Institute of Engineering and Technology Artificial Intelligence and Machine Learning Ghaziabad India Lloyd Institute of Engineering & Technology Greater Noida India
Rapid technological advances have brought unprecedented levels of connectivity and security, but also new and complex cybersecurity challenges The purpose of this paper is to provide an in-depth insight into current c... 详细信息
来源: 评论
Efficient Convolutional Neural Network Based Side Channel Attacks Based on AES Cryptography  21
Efficient Convolutional Neural Network Based Side Channel At...
收藏 引用
21st IEEE Student Conference on Research and Development, SCOReD 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Aman, Azana Hafizah Abdulkadir, Rabiu Aliyu Islam, Shayla Farhan, Basim Abdulkareem Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia Department of Computer Techniques Engineering Baghdad10011 Iraq Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia
In recent years, profiled side-channel attacks have emerged as a particularly potent kind of side-channel attack that can circumvent cryptographic equipment's security. Convolutional neural networks (CNNs) have be... 详细信息
来源: 评论
Adversarial learning for Mirai botnet detection based on long short-term memory and XGBoost
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 153-160页
作者: Vajrobol, Vajratiya Gupta, Brij B. Gaurav, Akshat Chuang, Huan-Ming Institute of Informatics and Communication University of Delhi India International Center for AI and Cyber Security Research and Innovations. Asia University Taiwan Department of Computer Science and Information Engineering Asia University Taichung413 Taiwan Ronin Institute MontclairNJ United States Department of Information Management National Yunlin University of Science and Technology Yunlin Taiwan Symbiosis International University Pune India Department of Electrical and Computer Engineering Lebanese American University Beirut1102 Lebanon Dehradun India
In today's world, where digital threats are on the rise, one particularly concerning threat is the Mirai botnet. This malware is designed to infect and command a collection of Internet of Things (IoT) devices. The... 详细信息
来源: 评论