咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是4651-4660 订阅
排序:
Design of a dynamic and self-adapting system, supported with artificial intelligence, machine learning and real-time intelligence for predictive cyber risk analytics in extreme environments - cyber risk in the colonisation of Mars
arXiv
收藏 引用
arXiv 2020年
作者: Radanliev, Petar de Roure, David Page, Kevin van Kleek, Max Santos, Omar Maddox, La'Treall Burnap, Pete Anthi, Eirini Maple, Carsten Department of Engineering Sciences University of Oxford Oxford e-Research Centre 7 Keble Road OxfordOX1 3QG United Kingdom Department of Computer Science University of Oxford Oxford United Kingdom Cisco Research Centre Research Triangle Park Raleigh-DurhamNC United States School of Computer Science and Informatics Cardiff University Cardiff United Kingdom MG Cyber Security Centre University of Warwick Coventry United Kingdom
Multiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace... 详细信息
来源: 评论
Energy Efficient Decentralized Authentication in Internet of Underwater Things Using Blockchain
Energy Efficient Decentralized Authentication in Internet of...
收藏 引用
IEEE Globecom Workshops
作者: Abbas Yazdinejad Reza M. Parizi Gautam Srivastava Ali Dehghantanha Kim-Kwang Raymond Choo Cyber Science Lab School of Computer Science University of Guelph Ontario Canada College of Computing and Software Engineering Kennesaw State University GA USA Department of Mathematics and Computer Science Brandon University Manitoba Canada Department of Information Systems and Cyber Security University of Texas at San Antonio TX USA
In recent years, there has been rapid growth in developing smart cities. Nearly 70% of the Earth’s surface is covered by water and a large proportion of underwater environments are still unknown and have not be... 详细信息
来源: 评论
Trust-PBFT: A PeerTrust-Based Practical Byzantine Consensus Algorithm
Trust-PBFT: A PeerTrust-Based Practical Byzantine Consensus ...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Wei Tong Xuewen Dong Jiawei Zheng Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an China School of Cyber Engineering Xidian University Xi'an China School of Computer Science and Technology Xidian University Xi'an China
Blockchain is becoming increasingly popular, while the performance problems have confused its implementation, especially the limited size of the distributed network. In this paper, we propose Trust-PBFT, a combination... 详细信息
来源: 评论
Research on System Dynamics and Agent Hybrid Modeling Method for Multi-Energy Collaborative Control under Ubiquitous Power Internet  3
Research on System Dynamics and Agent Hybrid Modeling Method...
收藏 引用
3rd IEEE Conference on Energy Internet and Energy System Integration, EI2 2019
作者: Zhang, Fuxing Zhang, Yingjie Zhan, Xiong Luo, Juan Miao, Honglei Gui, Yonghua Hunan University College of Computer Science and Electronic Engineering Changsha China Global Energy Interconnection Research Institute State Grid Key Laboratory of Information Network Security Beijing China HNAC Technology Co. Ltd. Hardware RD Department Changsha China
In order to promote the study of system dynamics (SD) and multi-agent theory and its wide application in the field of renewable energy, a hybrid modeling method of SD and Agent is proposed in this paper, which is suit... 详细信息
来源: 评论
Sum secret key rate maximization for TDD multi-user massive MIMO wireless networks
arXiv
收藏 引用
arXiv 2020年
作者: Li, Guyue Sun, Chen Jorswieck, Eduard Zhang, Junqing Hu, Aiqun Chen, You School of Cyber Science and Engineering Southeast University Nanjing China National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Purple Mountain Laboratories for Network and Communication Security Nanjing210096 China Institute for Communications Technology Technische Universitt Braunschweig Germany Department of Electrical Engineering and Electronics University of Liverpool LiverpoolL69 3GJ United Kingdom
Physical-layer key generation (PKG) based on channel reciprocity has recently emerged as a new technique to establish secret keys between devices. Most works focus on pairwise communication scenarios with single or sm... 详细信息
来源: 评论
A Hybrid Data Logging System Using Cryptographic Hash Blocks Based on SHA-256 and MD5 for Water Treatment Plant and Distribution Line
A Hybrid Data Logging System Using Cryptographic Hash Blocks...
收藏 引用
cyber security and Internet of Things (ICSIoT), International Conference on
作者: Kester Quist-Aphetsi Henry Blankson Computer Science Department Ghana Technology University College Ghana Cyber Security Division CRITAC Ghana Directorate of Information Assurance and Intelligence Research CRITAC Ghana Statistics Mathematics and Computer Studies Department Cape Coast Technical University Ghana
To maintain and ensure that the quality of water produced from the water treatment plant and the same quality is delivered to customers, there is the need to create a mechanism called the Data Logging System, where da... 详细信息
来源: 评论
Model for efficient development of security audit criteria  17
Model for efficient development of security audit criteria
收藏 引用
17th European Conference on cyber Warfare and security, ECCWS 2018
作者: Kelo, Tomi Eronen, Juhani Rousku, Kimmo Department of Pervasive Computing Tampere University of Technology Finland Department of Computer Science and Engineering University of Oulu Finland National Cyber Security Centre Finland Finnish Communications Regulatory Authority Finland Population Register Centre Finland
cyber-attacks have grown in importance to become a matter of national security. A growing number of states and organisations around the world have been developing defensive and offensive capabilities for cyber warfare... 详细信息
来源: 评论
Binary Image Steganalysis Based on Distortion Level Co-Occurrence Matrix
收藏 引用
computers, Materials & Continua 2018年 第5期55卷 201-211页
作者: Junjia Chen Wei Lu Yuileong Yeung Yingjie Xue Xianjin Liu Cong Lin Yue Zhang School of Data and Computer Science Guangdong Key Laboratory of Information Security TechnologySun Yat-sen UniversityGuangzhou 510006China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing 100093China Center for Faculty Development and Educational Technology Guangdong University of Finance and EconomicsGuangzhou 510320China Department of Computer Science College of Engineering and Computer ScienceEastern Lake AvenueOrlandoFLUSA.
In recent years,binary image steganography has developed so rapidly that the research of binary image steganalysis becomes more important for information *** most state-of-the-art binary image steganographic schemes,t... 详细信息
来源: 评论
Structural transition in interdependent networks with regular interconnections
收藏 引用
Physical Review E 2019年 第1期99卷 012311-012311页
作者: Xiangrong Wang Robert E. Kooij Yamir Moreno Piet Van Mieghem Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft The Netherlands iTrust Centre for Research in Cyber Security Singapore University of Technology and Design Singapore Institute for Biocomputation and Physics of Complex Systems (BIFI) University of Zaragoza Zaragoza 50009 Spain Department of Theoretical Physics University of Zaragoza Zaragoza 50009 Spain ISI Foundation Turin Italy
Networks are often made up of several layers that exhibit diverse degrees of interdependencies. An interdependent network consists of a set of graphs G that are interconnected through a weighted interconnection matrix... 详细信息
来源: 评论
Learning transferable self-attentive representations for action recognition in untrimmed videos with weak supervision
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Xiao-Yu Shi, Haichao Li, Changsheng Zheng, Kai Zhu, Xiaobin Duan, Lixin Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences University of Electronic Science and Technology of China Youedata Co. Ltd. Beijing School of Computer and Communication Engineering University of Science and Technology Beijing
Action recognition in videos has attracted a lot of attention in the past decade. In order to learn robust models, previous methods usually assume videos are trimmed as short sequences and require ground-truth annotat... 详细信息
来源: 评论