咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,330 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,635 篇 工学
    • 2,782 篇 计算机科学与技术...
    • 2,313 篇 软件工程
    • 959 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 508 篇 电气工程
    • 417 篇 生物工程
    • 333 篇 电子科学与技术(可...
    • 244 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 195 篇 安全科学与工程
    • 178 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 133 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,569 篇 理学
    • 825 篇 数学
    • 451 篇 生物学
    • 324 篇 物理学
    • 261 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 954 篇 管理学
    • 602 篇 管理科学与工程(可...
    • 391 篇 图书情报与档案管...
    • 302 篇 工商管理
  • 299 篇 法学
    • 188 篇 社会学
  • 266 篇 医学
    • 217 篇 临床医学
    • 198 篇 基础医学(可授医学...
    • 119 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 42 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 217 篇 accuracy
  • 192 篇 deep learning
  • 181 篇 feature extracti...
  • 179 篇 machine learning
  • 175 篇 security
  • 159 篇 internet of thin...
  • 152 篇 training
  • 139 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 93 篇 cryptography
  • 90 篇 protocols
  • 90 篇 artificial intel...
  • 82 篇 convolutional ne...
  • 79 篇 data models
  • 73 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 162 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 57 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 47 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 peng hao
  • 20 篇 sofotasios pasch...
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 jin hai
  • 17 篇 liu yang
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,449 篇 英文
  • 330 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5838 条 记 录,以下是31-40 订阅
排序:
security, Trust, and Privacy in cyber-physical Systems (CPS)  2
Security, Trust, and Privacy in Cyber-physical Systems (CPS)
收藏 引用
2nd International Conference on cyber Physical Systems, Power Electronics and Electric Vehicles, ICPEEV 2024
作者: Busari, Wareez A. Bello, Abeeb A. Department of Cyber Security Science Federal University of Technology Niger State Minna Nigeria Department of Electrical and Computer Engineering Mahindra University Hyderabad India
This paper explores the convergence of physical and computational components in cyber-Physical Systems (CPS). security, trust, and privacy are paramount for reliable and resilient operation of these interconnected sys... 详细信息
来源: 评论
Ensemble of deep learning models with Walrus Optimization Algorithm for accurate botnet recognition and classification
收藏 引用
Iran Journal of computer Science 2025年 1-18页
作者: Chacko, Ashwathy Anda Edwin, E. Bijolin Thanka, M. Roshni Ebenezer, V. Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India
The rapid growth of Internet of Things (IoT) networks has introduced significant security challenges, with botnet attacks being one of the most prevalent threats. These attacks exploit vulnerabilities in IoT devices, ... 详细信息
来源: 评论
Smart Water-Powered Renewable Energy System with IoT Integration
Smart Water-Powered Renewable Energy System with IoT Integra...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Ibraheem, Ahmed Salman Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq Department of Computer Technical Engineering Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
An advanced hybrid renewable energy collecting and storage system prototype that utilizes water flow as its primary power source. Additionally, the system incorporates an energy monitoring system based on the Internet... 详细信息
来源: 评论
Strategies for Building and Maintaining Secure Web Applications  5
Strategies for Building and Maintaining Secure Web Applicati...
收藏 引用
5th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2024
作者: Sathiyapriyan, C. Manikandan, B. Gokul, S. Satheesh, Rewin Nivetha, S. Leelavathy, S. Aarupadai Veedu Institute of Technology Cyber Security Department of Computer Science and Engineering Chennai603104 India Aarupadai Veedu Institute of Technology Department of Computer Science and Engineering Chennai603104 India Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai600119 India
Ensuring the security of web applications is paramount in safeguarding sensitive data and maintaining user trust. This study presents a comprehensive overview of strategies for building and maintaining secure web appl... 详细信息
来源: 评论
Randomization Strategies in Image Steganography Techniques:A Review
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 3139-3171页
作者: AFM Zainul Abadin Rossilawati Sulaiman Mohammad Kamrul Hasan Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia(UKM)BangiSelangor43600Malaysia Department of Information and Communication Engineering Pabna University of Science and TechnologyPabna6600Bangladesh
Image steganography is one of the prominent technologies in data hiding *** system performance mostly depends on the embedding *** goal is to embed strictly confidential information into images without causing percept... 详细信息
来源: 评论
Improving VANET Localization Performance with Data Verification: Challenges and Solutions
Improving VANET Localization Performance with Data Verificat...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Kadhim, Aqeel Kamil Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisa Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
In VANETs, the important and effective applications of vehicle localization include safety and communication applications. Thus, it is difficult to get very accurate localization in the dynamic and often very fluctuat... 详细信息
来源: 评论
Real-time Autonomous Vehicle Maneuver Generation Algorithm Based on Hierarchical Planning  24
Real-time Autonomous Vehicle Maneuver Generation Algorithm B...
收藏 引用
2024 Guangdong-Hong Kong-Macao Greater Bay Area International Conference on Digital Economy and Artificial Intelligence, DEAI 2024
作者: Zhai, WenHao School of Computer Science and Engineering School of Cyber Security University of Electronic Science and Technology of China Sichua Chengdu China
Global path planning, whether based on sampling-based algorithms or heuristic search algorithms, can search for a global path from the start point to the destination in a relatively short time. However, they often str... 详细信息
来源: 评论
IoMT-Based Healthcare Framework for Ambient Assisted Living Using a Convolutional Neural Network
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6867-6878页
作者: Waleed T.Al-Sit Nidal A.Al-Dmour Taher M.Ghazal Ghassan F.Issa Department of Computer Engineering Mutah UniversityAl-KarakJordanHigher Colleges of TechnologyDubaiUAE Department of Computer Engineering College of EngineeringMutah UniversityJordan School of Information Technology Skyline University CollegeUniversity City SharjahSharjahUAE Center for Cyber Security Faculty of Information Science and TechnologyUKM43600BangiSelangorMalaysia
In the age of universal computing,human life is becoming smarter owing to the recent developments in the Internet of Medical Things(IoMT),wearable sensors,and telecommunication innovations,which provide more effective... 详细信息
来源: 评论
An Efficient Key Establishment and Distribution Scheme for Wireless Body Area Networks
An Efficient Key Establishment and Distribution Scheme for W...
收藏 引用
2024 International Conference on Science, engineering and Business for Driving Sustainable Development Goals, SEB4SDG 2024
作者: Taofeek, Yusuf Victor, Waziri Onomza Olalere, Morufu Abdullahi, Muhammad Bashir Federal University of Technology Cyber Security Science Department Minna Nigeria Federal University of Technology Computer Science Department Minna Nigeria
Secure communication in wireless body area network (WBAN) depends on efficient key management system. However, to ensure robustness, key management schemes must not only be lightweight but also support the establishme... 详细信息
来源: 评论
Edge-based AI solution for enhancing urban safety: helmet compliance monitoring with YOLOv9 on Raspberry Pi
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-14页
作者: Tahilramani, Nikunj Ahir, Param Saxena, Shruti Talreja, Vandana P. Charanarur, Panem Adani Institute of Digital Technology Management Gandhinagar India School of Cyber Security and Digital Forensics National Forensic Sciences University Gandhinagar India Electrical Engineering Department R.C. Technical Institute Ahmedabad India Department of Cyber Security and Digital Forensics National Forensic Sciences University Tripura India
This paper presents an automated helmet detection system leveraging Raspberry Pi and advanced deep learning techniques, specifically the YOLOv9 object detection model that focuses on real-time object detection. The sy... 详细信息
来源: 评论