咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是471-480 订阅
排序:
Classification of Phishing Email Using Word Embedding and Machine Learning Techniques
收藏 引用
Journal of cyber security and Mobility 2022年 第3期11卷 279-320页
作者: Somesha, M. Pais, Alwyn R. Information Security Research Lab Department of Computer Science and Engineering National Institute of Technology karnataka Karnataka Surathkal575025 India
Email phishing is a cyber-attack, bringing substantial financial damage to corporate and commercial organizations. A phishing email is a special type of spamming, used to trick the user to disclose personal informatio... 详细信息
来源: 评论
Optimizing Diabetes Prediction: A Systematic Study of Machine Learning Techniques and Data Enhancements  5
Optimizing Diabetes Prediction: A Systematic Study of Machin...
收藏 引用
5th International Conference on Sustainable Communication Networks and Application, ICSCNA 2024
作者: Rajender, R. Kothapalli, Chaitanya Deepthi Gorikapudi, Sateesh Pavan Kumar, V.S. Pachhala, Nagababu Neelima, P. Lendi Institute of Engineering and Technology Department of CSE Vizianagaram India Sir C R Reddy College of Engineering Department of CSE Eluru India Koneru Lakshmaiah Education Foundation Green Fields Department of CSE Vaddeswaram India Malla Reddy University Department of Cyber Security Hyderabad India Vasireddy Venkatadri Institute of Technology Department of IT Guntur India SRKR Engineering College Department of Computer Science and Artificial Intelligence Bhimavaram India
This study focuses on the application of different machine learning algorithms to derive an efficient and effective predictive model for screening for diabetes prediction. The main objective is to improve the model pe... 详细信息
来源: 评论
Digital Twin-Based Automated Fault Diagnosis in Industrial IoT Applications
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 183-196页
作者: Samah Alshathri Ezz El-Din Hemdan Walid El-Shafai Amged Sayed Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science and Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Computer Science Department Security Engineering LabPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Department of Industrial Electronics and Control Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Department of Electrical Energy Engineering College of Engineering&TechnologyArab Academy for Science Technology&Maritime TransportSmart Village CampusEgypt
In recent years, Digital Twin (DT) has gained significant interestfrom academia and industry due to the advanced in information technology,communication systems, Artificial Intelligence (AI), Cloud Computing (CC),and ... 详细信息
来源: 评论
Breast Mammogram Analysis and Classification Using Deep Convolution Neural Network
收藏 引用
computer Systems Science & engineering 2022年 第10期43卷 275-289页
作者: V.Ulagamuthalvi G.Kulanthaivel A.Balasundaram Arun Kumar Sivaraman Department of Computer Science and Engineering Sathyabama UniversityChennai600119India Department of Electrical Electronics and Communication EngineeringNITTTRChennai600113India Centre for Cyber Physical Systems School of Computer Science and EngineeringVellore Institute of Technology(VIT)Chennai600127India School of Computer Science and Engineering Vellore Institute of Technology(VIT)Chennai600127India
One of the fast-growing disease affecting women’s health seriously is breast *** is highly essential to identify and detect breast cancer in the earlier *** paper used a novel advanced methodology than machine learni... 详细信息
来源: 评论
CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis  40
CryptoPyt: Unraveling Python Cryptographic APIs Misuse with ...
收藏 引用
40th Annual computer security Applications Conference, ACSAC 2024
作者: Guo, Xiangxin Jia, Shijie Lin, Jingqiang Ma, Yuan Zheng, Fangyu Li, Guangzheng Xu, Bowen Cheng, Yueqiang Ji, Kailiang School of Cyber Security University of Science and Technology of China Hefei China Key Laboratory of Cyberspace Security Defense Institute of Information Engineering CAS Beijing China School of Cryptology University of Chinese Academy of Sciences Beijing China Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China NIO China
Cryptographic APIs are essential for ensuring the security of software systems. However, many research studies have revealed that the misuse of cryptographic APIs is commonly widespread. Detecting such misuse in Pytho... 详细信息
来源: 评论
security Analysis of OAuth 2.0 Implementation
Security Analysis of OAuth 2.0 Implementation
收藏 引用
2023 Innovations in Power and Advanced Computing Technologies, i-PACT 2023
作者: Sharma, Swarag Jevitha, K.P. TIFAC-CORE in Cyber Security Amrita School of Engineering Coimbatore Amrita Vishwa Vidyapeetham India Department of Computer Science and Engineering Amrita School of Computing Coimbatore Amrita Vishwa Vidyapeetham India
Many users all over the world routinely use open authentication and authorization providers based on OAuth 2.0 framework such as Google, Facebook etc. to sign in to third-party websites (relying party). The authentica... 详细信息
来源: 评论
Network Intrusion Detection in Cloud Computing Environments  3
Network Intrusion Detection in Cloud Computing Environments
收藏 引用
3rd IEEE World Conference on Applied Intelligence and Computing, AIC 2024
作者: Sreeramulu, Madhusudhan Dasari Suganyadevi, K. Neravetla, Anuteja Reddy Mohammed, Abdul Sajid American Express Dept of Cyber Security United States Sri Eshwar College of Engineering Department of Ece Tamil Nadu Coimbatore India University of the Cumberlands Department of Information Technology KY United States University of the Cumberlands Dept of School of Computer and Information Sciences KY United States
The increasing use of cloud computing has also resulted in a higher vulnerability to cyber attacks. Network Intrusion Detection Systems (NIDS) play a vital role in protecting cloud computing environments from these at... 详细信息
来源: 评论
FedDiSC:A computation-efficient federated learning framework for power systems disturbance and cyber attack discrimination
收藏 引用
Energy and AI 2023年 第4期14卷 212-220页
作者: Muhammad Akbar Husnoo Adnan Anwar Haftu Tasew Reda Nasser Hosseinzadeh Shama Naz Islam Abdun Naser Mahmood Robin Doss Centre for Cyber Security Research and Innovation(CSRI) School of Information TechnologyDeakin UniversityGeelongVIC 3216Australia Centre for Smart Power and Energy Research(CSPER) School of EngineeringDeakin UniversityGeelongVIC 3216Australia Department of Computer Science&IT Latrobe UniversityBundooraVIC 3086Australia
With the growing concern about the security and privacy of smart grid systems,cyberattacks on critical power grid components,such as state estimation,have proven to be one of the top-priority cyber-related issues and ... 详细信息
来源: 评论
The Internet of Things: a domain-specific security requirement classification  4
The Internet of Things: a domain-specific security requireme...
收藏 引用
4th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2022
作者: Mukalazi, Arafat Boyaci, Ali Istanbul Commerce University Department of Cyber Security Istanbul Turkey Istanbul Commerce University Department of Computer Engineering Istanbul Turkey
Worldwide, societies are rapidly becoming more connected, owing primarily to the growing number of intelligent things and smart applications (e.g, smart automobiles, smart wearable devices, etc.) These have occurred i... 详细信息
来源: 评论
Machine Learning for Climate Change Impact Assessment and Adaptation Planning  2
Machine Learning for Climate Change Impact Assessment and Ad...
收藏 引用
2nd IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Balakrishnan, T. Suresh Krishnan, Prabhakar Ebenezar, U. Samson Mohammed Nizarudeen, M. Kamal, N. Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Chennai India Amrita Vishwa Vidyapeetham Center for Cyber Security Systems and Networks Amritapuri-Campus India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Care College of Engineering Department of Computer Science and Engineering Tamil Nadu Trichy India Grt Institute of Engineering and Technology Dept. of Computer Science and Engineering Tamil Nadu Tiruttani India
The presented research introduces a new advanced data analytics methodology for climate change impact assessment and adaptive planning that utilizes machine learning and deep-learning techniques. Quantitative analysis... 详细信息
来源: 评论