咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,307 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,613 篇 工学
    • 2,769 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 955 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 499 篇 电气工程
    • 417 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 243 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 194 篇 安全科学与工程
    • 177 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 132 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,564 篇 理学
    • 822 篇 数学
    • 451 篇 生物学
    • 322 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 952 篇 管理学
    • 601 篇 管理科学与工程(可...
    • 390 篇 图书情报与档案管...
    • 301 篇 工商管理
  • 296 篇 法学
    • 188 篇 社会学
  • 265 篇 医学
    • 216 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 218 篇 accuracy
  • 193 篇 deep learning
  • 181 篇 feature extracti...
  • 180 篇 machine learning
  • 175 篇 security
  • 158 篇 internet of thin...
  • 153 篇 training
  • 141 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 cryptography
  • 90 篇 protocols
  • 89 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 56 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 46 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,431 篇 英文
  • 324 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5815 条 记 录,以下是4791-4800 订阅
排序:
Multi-sink En-Route Filtering Mechanism for Wireless Sensor Networks  1
收藏 引用
5th International Symposium on security in Computing and Communications, SSCC 2017
作者: Kumar, Alok Pais, Alwyn Roshan Information Security Research Lab Department of Computer Science and Engineering National Institute of Technology Karnataka SurathkalKarnataka India
Wireless Sensor Networks (WSNs) are deployed in unattended environments and thus are prone to security compromises. Providing security and tamper resistant hardware to each node is also unrealistic. The compromised no... 详细信息
来源: 评论
Fast Verification of Digital Signatures in IoT  1
收藏 引用
5th International Symposium on security in Computing and Communications, SSCC 2017
作者: Kittur, Apurva S. Jain, Ashu Pais, Alwyn Roshan Information Security and Research Lab Department of Computer Science and Engineering National Institute of Technology Karnataka SurathkalKarnataka India
Internet of Things (IoT) is the recent advancement in Wireless technology where multiple embedded devices are connected through internet for exchange of information. Since the information exchanged is private and at t... 详细信息
来源: 评论
CommanderSong: A systematic approach for practical adversarial voice recognition
arXiv
收藏 引用
arXiv 2018年
作者: Yuan, Xuejing Chen, Yuxuan Zhao, Yue Long, Yunhui Liu, Xiaokang Chen, Kai Zhang, Shengzhi Huang, Heqing Wang, XiaoFeng Gunter, Carl A. SKLOIS Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China Department of Computer Science Florida Institute of Technology United States Department of Computer Science University of Illinois at Urbana-Champaign United States Department of Computer Science Metropolitan College Boston University United States School of Informatics and Computing Indiana University Bloomington United States
The popularity of automatic speech recognition (ASR) systems, like Google Assistant, Cortana, brings in security concerns, as demonstrated by recent attacks. The impacts of such threats, however, are less clear, since... 详细信息
来源: 评论
Innovative Task Scheduling Algorithm in Cloud Computing
收藏 引用
IOP Conference Series: Materials Science and engineering 2020年 第2期981卷
作者: S. Magesh Kumar V. Auxilia Osvin Nancy A Balasundaram Seena Naik korra D Kothandaraman E Sudarshan Associate Professor Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai Tamil Nadu India Assistant professor Department of IT S. A. Engineering College Chennai Tamil Nadu India Assistant Professor Center for Cyber Physical Systems (CPS) School of Computer Science and Engineering Vellore Institute of Technology (VIT) Chennai Tamil Nadu India Associate Professor School of Computer Science and Artificial Intelligence S R University Warangal India Associate Professor Sumathi Reddy Institute of Technology for Women Warangal India
This work concentrates around the task scheduling depends on QoS and imperative of desire. Under nature of vibrant cloud computing, effectiveness improving of scheduling of task and load balancing are interminable iss...
来源: 评论
Impact assessment of hypothesized cyberattacks on interconnected bulk power systems
arXiv
收藏 引用
arXiv 2018年
作者: Ten, Chee-Wooi Yamashita, Koji Yang, Zhiyuan Vasilakos, Athanasios V. Ginter, Andrew Electrical and Computer Engineering Department Michigan Technological University HoughtonMI49931 United States Luleå University of Technology Sweden Waterfall Security Solutions Isreal Israel
The first-ever Ukraine cyberattack on power grid has proven its devastation by hacking into their critical cyber assets. With administrative privileges accessing substation networks/local control centers, one intellig... 详细信息
来源: 评论
Adding Continuous Proactive Forensics to Android  5th
Adding Continuous Proactive Forensics to Android
收藏 引用
5th International Symposium on security in Computing and Communications, SSCC 2017
作者: Rao, Karthik M. Aiyyappan, P.S. Mateti, Prabhaker TIFAC-CORE in Cyber Security Amrita Vishwa Vidyapeetham EttimadaiTN641105 India Department of Computer Science and Engineering Wright State University DaytonOH45435 United States
Criminals and terrorists have become good at using the smartphones. The traditional reactive forensics responds only after an incident. Smartphone OS should include proactive forensics support (pfs), that deals with p... 详细信息
来源: 评论
Blockchain-based Mutual Authentication security Protocol for Distributed RFID Systems
Blockchain-based Mutual Authentication Security Protocol for...
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: Siye Wang Shaoyi Zhu Yanfang Zhang Chinese Academy of Sciences School of Computer and Information Technology Institute of Information Engineering Beijing Jiaotong University Beijing China Chinese Academy of Sciences School of Cyber Security Institute of Information Engineering University of Chinese Academy of Sciences Beijing China Chinese Academy of Sciences Institute of Information Engineering Beijing China
Since radio frequency identification (RFID) technology has been used in various scenarios such as supply chain, access control system and credit card, tremendous efforts have been made to improve the authentication be... 详细信息
来源: 评论
Image feature extraction with homomorphic encryption on integer vector  17
Image feature extraction with homomorphic encryption on inte...
收藏 引用
2017 International Conference on Machine Learning and Soft Computing, ICMLSC 2017
作者: Huang, Yunfan Yang, Haomiao Nie, Mengxi Wu, Honggang School of Computer Science and Engineering University of Electronic Science and Technology of China Science and Technology on Communication Security Laboratory Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Center for Cyber Security UESTC Chengdu China School of Engineering and Applied Science George Washington University Chengdu United States Second Research Institute Civil Aviation Administration of China Chengdu China
With the amount of user-contributed image data increasing, it is a potential threat for users that everyone may have the access to gain privacy information. To reduce the possibility of the loss of real information, t... 详细信息
来源: 评论
Privacy as a currency: Un-regulated?  14
Privacy as a currency: Un-regulated?
收藏 引用
14th International Joint Conference on e-Business and Telecommunications, ICETE 2017
作者: Patil, Vishwas T. Shyamasundar, R.K. Department of Computer Science and Engineering Information Security R and D Center Indian Institute of Technology Bombay Mumbai400076 India
We are living in a time where many of the decisions that affect us are made by mathematical models. These models rely on data. Precision and relevance of the decisions made by these models is dependent on quality of t... 详细信息
来源: 评论
An Extended Exploration to the Epidemic Containment Game
An Extended Exploration to the Epidemic Containment Game
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Jia-Hao Xu Zhen Wang Guang-Hai Cui Yi-Zhi Ren Hong Ding Kim-Kwang Raymond Choo School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China School of Cyberspace Hangzhou Dianzi University Hangzhou China School of Information and Electrical Engineering Ludong University Yantai China Department of Information Systems and Cyber Security The University of Texas at San Antonio San Antonio TX USA
The epidemic containment game is a formulation to describe voluntary vaccination behaviors before epidemic spreading. This game relies on the characterization of the susceptible-infected- susceptible (SIS) model in te... 详细信息
来源: 评论