咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是4661-4670 订阅
排序:
IoT Denial-of-Service Attack Detection and Prevention Using Hybrid IDS
IoT Denial-of-Service Attack Detection and Prevention Using ...
收藏 引用
Information technology (ACIT)
作者: Mohammad M. Shurman Rami M. Khrais Abdulrahman A. Yateem Network Engineering and Security Dept. Jordan Univ. of Science and Technology Irbid Jordan Computer Engineering Department Jordan Univ. of Science and Technology Irbid Jordan
the more (IoT) scales up with promises, the more security issues raise to the surface and must be tackled down. IoT is very vulnerable against DoS attacks. In this paper, we propose a hybrid design of signature-based ...
来源: 评论
Towards a multi-chain future of proof-of-space
arXiv
收藏 引用
arXiv 2019年
作者: Tang, Shuyang Zheng, Jilai Deng, Yao Wang, Ziyu Liu, Zhiqiang Gu, Dawu Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China School of Cyber Science and Technology Beihang University Beijing China
Proof-of-Space provides an intriguing alternative for consensus protocol of permissionless blockchains due to its recyclable nature and the potential to support multiple chains simultaneously. However, a direct shared... 详细信息
来源: 评论
MHD analysis on the physical designs of CFETR and HFRC
arXiv
收藏 引用
arXiv 2021年
作者: Zhu, Ping Li, Li Fang, Yu He, Yuling Wang, Shuo Han, Rui Liu, Yue Wang, Xiaojing Zhang, Yang Zhang, Xiaodong Yu, Qingquan Hu, Liqun Wang, Huihui Sun, Youwen Wei, Lai Tang, Weikang Liu, Tong Wang, Zhengxiong Yan, Xingting Huang, Wenlong Hou, Yawei Ji, Xiaoquan Zeng, Shiyong Abdullah, Zafar Chen, Zhongyong Zeng, Long Li, Haolong Chen, Zhipeng Wang, Zhijiang Rao, Bo Zhang, Ming Ding, Yonghua Pan, Yuan International Joint Research Laboratory of Magnetic Confinement Fusion and Plasma Physics State Key Laboratory of Advanced Electromagnetic Engineering and Technology School of Electrical and Electronic Engineering Huazhong University of Science and Technology Hubei Wuhan430074 China Department of Engineering Physics University of Wisconsin-Madison MadisonWI53706 United States College of Science Donghua University Shanghai201620 China Key Laboratory of Materials Modification by Laser Ion and Electron Beams Ministry of Education School of Physics Dalian University of Technology Dalian116024 China Guangdong Provincial Key Laboratory of Quantum Engineering and Quantum Materials School of Physics and Telecommunication Engineering South China Normal University Guangzhou510006 China Southwestern Institute of Physics P.O. Box 432 Chengdu610041 China CAS Key Laboratory of Geospace Environment Department of Engineering and Applied Physics University of Science and Technology of China Hefei230026 China CAS Institute of Plasma Physics Anhui Hefei230031 China Max-Planck-Institute for Plasma Physics Garching Germany School of Computer Science and Technology Anhui Engineering Laboratory for Industrial Internet Intelligent Applications and Security Anhui University of Technology Anhui Ma'anshan243002 China College of Physics and Optoelectronic Engineering Shenzhen University Shenzhen518060 China
The China Fusion engineering Test Reactor (CFETR) and the Huazhong Field Reversed Configuration (HFRC), currently both under intensive physical and engineering designs in China, are the two major projects representati... 详细信息
来源: 评论
Ransomware Entities Classification with Supervised Learning for Informal Text
Ransomware Entities Classification with Supervised Learning ...
收藏 引用
International Conference on cybersecurity (ICoCSec)
作者: Nurfadilah Ariffini Anazida Zainal Mohd Aizaini Maarof Mohamad Nizam Kassim Department of Computer Science School of Computing Faculty of Engineering Universiti Teknologi Malaysia Johor Malaysia Cyber Security Responsive Services Division CyberSecurity Malaysia 43300 Seri Kembangan Selangor Malaysia
Analyzing text especially in Malware domain is quite challenging. Even with Natural Language Processing approach, it limits with the absence of specific Named Entity recognizer to extract related entities of malware f...
来源: 评论
Reviewing national cybersecurity awareness for users and executives in Africa
arXiv
收藏 引用
arXiv 2019年
作者: Bada, Maria Solms, Basie Von Agrafiotis, Ioannis Cambridge Cybercrime Centre Computer Laboratory Cambridge University UK Global Cyber Security Capacity Centre University of Oxford United Kingdom Academy for Computer Science and Software Engineering University of Johannesburg South Africa Department of Computer Science University of Oxford
There is an unprecedented increase in cybercrime globally observed over the last years. One of the regions driving this increase is Africa, where significant financial losses are reported. Yet, citizens of African cou... 详细信息
来源: 评论
Winning the carbon race: Game-based strategies for emission reduction in maritime industry
收藏 引用
Research in Transportation Business and Management 2025年 61卷
作者: Ruslan, Siti Marsila Mhd Osman, Mohd Tarmizi Mansor, Wan Nurdiyana Wan Mokhtar, Kasypi Saidi, Norjipin Roslan, Ummu Atiqah Mohd Hassim, Muhamad Fairus Noor Mclellan, Benjamin Craig Faculty of Maritime Studies Universiti Malaysia Terengganu Malaysia Security Safety & Environmental Division Marine Department Malaysia Faculty of Ocean Engineering Technology Universiti Malaysia Terengganu Malaysia Special Interest Group on Modelling and Data Analytics Faculty of Computer Science and Mathematics Universiti Malaysia Terengganu Malaysia Special Interest Group on Modelling and Data Analytics Faculty Science and Marine Environment Universiti Malaysia Terengganu Malaysia Energy Economics Research Group Graduate School of Energy Science Department of Socio-Environmental Energy Science Kyoto University Japan
The maritime industry contributes to global greenhouse gas (GHG) emissions, accounting for approximately 2.89 % of global emissions. With the International Maritime Organization (IMO) setting ambitious goals to reduce... 详细信息
来源: 评论
Verification of OAuth 2.0 Using UPPAAL  52nd
Verification of OAuth 2.0 Using UPPAAL
收藏 引用
52nd Annual Convention of the computer Society of India: Social Transformation - Digital Way, CSI 2017
作者: Jayasri, K.S. Jevitha, K.P. Jayaraman, B. TIFAC-CORE in Cyber Security Amrita Vishwa Vidyapeetham Coimbatore India Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Coimbatore India Department of Computer Science and Engineering State University of New York at Buffalo Buffalo United States
Web services are software services that are accessible over the internet through a set of application program interfaces (APIs). The security of these APIs is a major concern because of their loose coupling, and prote... 详细信息
来源: 评论
Path planning of submarine cables  21
Path planning of submarine cables
收藏 引用
21st International Conference on Transparent Optical Networks, ICTON 2019
作者: Wang, Qing Wang, Zengfu Guo, Jun Tahchi, Elias Wang, Xinyu Moran, Bill Zukerman, Moshe Department of Electronic Engineering City University of Hong Kong Hong Kong Hong Kong Research and Development Institute Northwestern Polytechnical University in Shenzhen Shenzhen China School of Computer Science and Network Security Dongguan University of Technology Dongguan China Limited North Point Hong Kong Hong Kong Department of Electrical and Electronic Engineering University of Melbourne VIC Australia
Submarine optical-fiber cables are key components in the conveying of Internet data, and their failures have costly consequences. Currently, there are over a million km of such cables empowering the Internet. To carry... 详细信息
来源: 评论
ELCPH: An Efficient Lightweight Conditional Privacy-Preserving Authentication Scheme Based on Hash Function and Local Group Secrete Key for VANET
ELCPH: An Efficient Lightweight Conditional Privacy-Preservi...
收藏 引用
作者: Saad Ali Alfadhli Shayem Alresheedi Songfeng Lu Abdulaziz Fatani Mahmut Ince School of Computer Science and Technology Huazhong University of Science and Technology Department of Computer Techniques Engineering Imam Al-Kadhum College School of Cyber Science and Engineering Huazhong University of Science and Technology Shenzhen Huazhong University of Science and echnology Research Institute
Vehicular ad-hoc networks(VANETs) have got a wide range of attention to improve traffic systems and smart cities. security and privacy are critical issues and need to be addressed for effective VANET systems. In thi... 详细信息
来源: 评论
An artificial intelligence perspective on mobile edge computing  3
An artificial intelligence perspective on mobile edge comput...
收藏 引用
3rd IEEE International Conference on Smart Internet of Things, SmartIoT 2019
作者: Chen, Zhuang He, Qian Liu, Lei Lan, Dapeng Chung, Hwei-Ming Mao, Zhifei School of Computer and Information Security Guilin University of Electronic Technology Guilin Guangxi541004 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin Guangxi541004 China State and Local Joint Engineering Research Center for Satellite Navigation and Location Service Guilin University of Electronic Technology Guilin Guangxi541004 China CETC Key Laboratory of Aerospace Information Applications China School of Telecommunications Engineering Xidian University Xi'an China Department of Informatics University of Oslo Oslo Norway Trondheim Norway
The interest of artificial intelligence (AI) and mobile edge computing (MEC) has increased in recent years. As a fundamental building block for the development of mobile edge computing, new techniques are needed in th... 详细信息
来源: 评论