咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是441-450 订阅
排序:
Strategies for Building and Maintaining Secure Web Applications
Strategies for Building and Maintaining Secure Web Applicati...
收藏 引用
Mobile Computing and Sustainable Informatics (ICMCSI), International Conference on
作者: C. Sathiyapriyan B. Manikandan S. Gokul Rewin Satheesh S. Nivetha S. Leelavathy Department of Computer Science and Engineering Cyber Security Aarupadai Veedu Institute of Technology Chennai Department of Computer Science and Engineering Aarupadai Veedu Institute of Technology Chennai Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai
Ensuring the security of web applications is paramount in safeguarding sensitive data and maintaining user trust. This study presents a comprehensive overview of strategies for building and maintaining secure web appl...
来源: 评论
Asymmetric Channel Reuse Model for Wi-Fi 6
Asymmetric Channel Reuse Model for Wi-Fi 6
收藏 引用
International Conference on Emerging Technologies, ICET
作者: Aitizaz Uddin Syed Safdar Nawaz Khan Marwat Cyber Security Operations Ministry of Justice Doha Qatar Department of Computer Systems Engineering Faculty of Electrical and Computer Engineering University of Engineering and Technology Peshawar Pakistan
Channel reuse is an effective technique to reutilize the limited resource of the frequency radio spectrum to fulfill the ever-increasing demands of wireless communication. Implementing the channel reuse in Wi-Fi 6 by ... 详细信息
来源: 评论
A System security Strategy Implementation for Secured Data Communication System  5
A System Security Strategy Implementation for Secured Data C...
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Madhumala, V.S. Tripathi, Pradeep Kumar Rana, Priya Sharma, Nitin Kumar Yamsani, Nagendar Shashikant Cyber Security Department Vignana Bharathi Institute of Technology Hyderabad India Ajay Kumar Garg Engineering College Department of Information Technology Ghaziabad India Raj Kumar Goel Institute of Technology Department of Information Technology Ghaziabad India Nitra Technical Campus Department of Cse Ghaziabad India Sr University School of Computer Science and Artificial Intelligence Warangal India Babu Banarasi das University School of Engineering Electrical Engineering Department Lucknow India
The digital age is one of omnipresent digital information and network access. As such, it is essential for any enterprise to make the security of their office networks a top priority. However, due to the rapid spread ... 详细信息
来源: 评论
Real-time consumer aware and alert system based on smart water tank
收藏 引用
Materials Today: Proceedings 2022年 63卷 790-797页
作者: Khan, Fazal Qudus Ahmad, Ibrar Fawzi Khairullah, Enas Bajaber, Osama Ullah, Anayat Jan, Sadeeq KPK Shangla Pakistan Department of Information Technology Faculty of Computing and Information Technology King AbdulAziz University Jeddah Saudi Arabia National Center for Cyber Security Department of CS&IT University of Engineering & Technology Peshawar Pakistan
As population is growing water scarcity is becoming a raising issue year after year. The reasons may vary but there are two main factors which could be considered as key reasons of water shortages. Fresh water sources... 详细信息
来源: 评论
The Role of Smart Contracts in Revolutionizing Supply Chain Finance with Blockchain  2
The Role of Smart Contracts in Revolutionizing Supply Chain ...
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation technology, ICICAT 2024
作者: Kumar, Rakesh Surekha, N. Rao, Cherukupalli Mallikarjuna Al-Fatlawy, Ramy Riad Bhuvaneshwari, P. Raja, Lakshmi GLA University Department of Computer Engineering & Applications Mathura India CMR College of Engineering & Technology Department of CSE India GRIET Bachupally Department of CSE Telangana Hyderabad India The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq New Prince Shri Bhavani College of Engineering and Technology Department of CSE Tamil Nadu Chennai600073 India Karpagam Academy of Higher Education Department of Cyber Security Coimbatore641021 India
Focusing on revolution of Supply Chain Finance (SCF) through the help of smart contracts and blockchain technology, this work aims to identify the potential of this field. Global supply chain finance management using ... 详细信息
来源: 评论
Neural Network-Based Multi-class Model for Abnormal Heartbeat Audio Signal Detection
收藏 引用
SN computer Science 2025年 第1期6卷 1-16页
作者: Kashyap, Pavan P. Madihalli, Revanasiddappa B N, Kavitha S, Santosh Kumar N, Ravi Kumar B Rohith, S. Department of CSE (Cyber Security) Sri Venkateshwara College of Engineering Bengaluru 562157 India Department of Civil Engineering Sri Venkateshwara College of Engineering Bengaluru 562157 India Department of Mathematics Sri Venkateshwar College of Engineering Bengaluru 562157 India Department of CSE (Data Science) Sri Venkateshwara College of Engineering Bengaluru 562157 India Department of CSE BMS Institute of Technology & Management Yelahanka Bengaluru 560119 India Department of Electronics and Communication Engineering Nagarjuna College of Engineering and Technology Bengaluru 562164 India
Detection of abnormal heartbeats, or arrhythmias, is crucial for early diagnosis and management of cardiac diseases. Traditional methods, such as manual auscultation and basic signal processing techniques, often fall ... 详细信息
来源: 评论
AntiMal: an Approach of Malware Detection Employing Swin Transformer  13
AntiMal: an Approach of Malware Detection Employing Swin Tra...
收藏 引用
13th International Conference on Communication and Network security, ICCNS 2023
作者: Lyu, Chenxi Yao, Yinan Guo, Xiaodong Huang, Zihong Dong, Chen Zhang, Yuanyuan Chen, Zhenyi College of Computer and Data Science Fuzhou University Fuzhou China College of Computer and Cyber Security Fujian Normal University Fuzhou China Department of Computer Science and Engineering University of South Florida FL United States
In the present era, the menace of malicious software is growing continuously, posing a significant challenge in the realm of cybersecurity. Currently, traditional machine learning algorithms have been widely applied t... 详细信息
来源: 评论
AI-Based Intelligent Model to Predict Epidemics Using Machine Learning Technique
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 1095-1104页
作者: Liaqat Ali Saif E.A.Alnawayseh Mohammed Salahat Taher M.Ghazal Mohsen A.A.Tomh Beenu Mago College of Engineering and Technology University of Science and Technology of FujairahFujairahUAE Electrical Engineering Department Faculty of EngineeringMutah UniversityJordan School of Information Technology Skyline University CollegeUniversity City Sharjah1797UAE Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia43600Malaysia Faculty of Computer Science NCBA&ELahore54660Pakistan School of Information Technology Skyline University CollegeUniversity City Sharjah1797SharjahUAE
The immediate international spread of severe acute respiratory syn-drome revealed the potential threat of infectious diseases in a closely integrated and interdependent *** an outbreak occurs,each country must have a ... 详细信息
来源: 评论
Strengthening KMS security with Advanced Cryptography, Machine Learning, Deep Learning, and IoT Technologies
收藏 引用
SN computer Science 2023年 第5期4卷 1-13页
作者: Ogala, Justin Onyarin Ahmad, Shahnawaz Shakeel, Iman Ahmad, Javed Mehfuz, Shabana Department of Cyber Security University of Delta Agbor Nigeria Department of Computer Science & Engineering Mewat Engineering College (WAQF) Mewat Haryana Nuh 122107 India Department of Electrical Engineering Jamia Millia Islamia (A Central University) New Delhi 110025 India Department of Computer Science School of Engineering Sciences & Technology (SEST) Jamia Hamdard (Deemed to be University) Hamdard Nagar New Delhi 110062 India
This paper presents an innovative approach to strengthening Key Management Systems (KMS) against the escalating landscape of cyber threats by integrating advanced cryptographic technologies, machine learning, deep lea... 详细信息
来源: 评论
On Multi-Key FuncCPA Secure Encryption Schemes  1
On Multi-Key FuncCPA Secure Encryption Schemes
收藏 引用
1st International Conference on Cryptography and Information security, VCRIS 2024
作者: Nakajima, Eri Hara, Keisuke Yamashita, Kyosuke Osaka University Department of Information and Computer Sciences Osaka Japan National Institute of Advanced Industrial Science and Technology Cyber Physical Security Research Center Tokyo Japan Yokohama National University Kanagawa Japan
The notion of funcCPA security for homomorphic encryption schemes was introduced by Akavia et al. (TCC 2022). Whereas it aims to capture the bootstrapping technique in homomorphic encryption schemes, Dodis et al. (TCC... 详细信息
来源: 评论