咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,307 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,613 篇 工学
    • 2,769 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 955 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 499 篇 电气工程
    • 417 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 243 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 194 篇 安全科学与工程
    • 177 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 132 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,564 篇 理学
    • 822 篇 数学
    • 451 篇 生物学
    • 322 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 952 篇 管理学
    • 601 篇 管理科学与工程(可...
    • 390 篇 图书情报与档案管...
    • 301 篇 工商管理
  • 296 篇 法学
    • 188 篇 社会学
  • 265 篇 医学
    • 216 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 218 篇 accuracy
  • 193 篇 deep learning
  • 181 篇 feature extracti...
  • 180 篇 machine learning
  • 175 篇 security
  • 158 篇 internet of thin...
  • 153 篇 training
  • 141 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 cryptography
  • 90 篇 protocols
  • 89 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 56 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 46 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,431 篇 英文
  • 324 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5815 条 记 录,以下是4861-4870 订阅
排序:
On the importance of standardising the process of generating digital forensic reports
收藏 引用
Forensic Science International: Reports 2019年 1卷 100008-100008页
作者: Karie, Nickson. M. Kebande, Victor R. Venter, H.S. Choo, Kim-Kwang Raymond Department of Computer Science University of Swaziland Kwaluseni Swaziland IoTaP Research Center Department of Computer Science and Media Technology Malmo University Nordenskiöldsgatan 1 211 19 Malmö Sweden Department of Computer Science University of Pretoria Private Bag X20 Hatfield 0028 Pretoria South Africa Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio TX 78249-0631 USA
AbstractThe ISO/IEC 27043:2015 international standard provides new standardised guidelines for common investigation processes across various investigation scenarios that mostly involve digital evidence. The reporting ... 详细信息
来源: 评论
SMDP-based downlink packet scheduling scheme for solar energy assisted heterogeneous networks
arXiv
收藏 引用
arXiv 2018年
作者: Li, Qizhen Gao, Jie Wen, Jinming Tang, Xiaohu Zhao, Lian Sun, Limin School of Information Science and Technology Southwest Jiaotong University Chengdu611756 China Department of Electrical and Computer Engineering Ryerson University TorontoONM5B 2K3 Canada Department of Electrical and Computer Engineering University of Toronto TorontoONM5S 3G4 Canada Beijing Key Laboratory of IoT Information Security Technology Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
Renewable energy assisted heterogeneous networks can improve system capacity and reduce conventional energy consumption. In this paper, we propose a semi-Markov decision process (SMDP)-based downlink packet scheduling... 详细信息
来源: 评论
Frequency synchronization for uplink massive MIMO with adaptive MUI suppression in angle-domain
arXiv
收藏 引用
arXiv 2018年
作者: Ge, Yinghao Zhang, Weile Gao, Feifei Li, Geoffrey Ye MOE Key Lab for Intelligent Networks and Network Security School of Electronic and Information Engineering Xi'an Jiaotong University Xi'an Shaanxi710049 China State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Automation Tsinghua University Beijing100084 China Department of Electrical and Computer Engineering Georgia Institute of Technology AtlantaGA30332 United States
In this paper, we develop a novel angle-domain adaptive filtering (ADAF)-based frequency synchronization method for the uplink of a massive multiple-input multiple-output (MIMO) multiuser network, which is applicable ... 详细信息
来源: 评论
Opportunities and challenges for monitoring terrestrial biodiversity in the robotics age
收藏 引用
Nature Ecology and Evolution 2025年 1-12页
作者: Pringle, Stephen Dallimer, Martin Goddard, Mark A. Le Goff, Léni K. Hart, Emma Langdale, Simon J. Fisher, Jessica C. Abad, Sara-Adela Ancrenaz, Marc Angeoletto, Fabio Auat Cheein, Fernando Austen, Gail E. Bailey, Joseph J. Baldock, Katherine C. R. Banin, Lindsay F. Banks-Leite, Cristina Barau, Aliyu S. Bashyal, Reshu Bates, Adam J. Bicknell, Jake E. Bielby, Jon Bosilj, Petra Bush, Emma R. Butler, Simon J. Carpenter, Dan Clements, Christopher F. Cully, Antoine Davies, Kendi F. Deere, Nicolas J. Dodd, Michael Drinkwater, Rosie Driscoll, Don A. Dutilleux, Guillaume Dyrmann, Mads Edwards, David P. Farhadinia, Mohammad S. Faruk, Aisyah Field, Richard Fletcher, Robert J. Foster, Chris W. Fox, Richard Francksen, Richard M. Franco, Aldina M. A. Gainsbury, Alison M. Gardner, Charlie J. Giorgi, Ioanna Griffiths, Richard A. Hamaza, Salua Hanheide, Marc Hayward, Matt W. Hedblom, Marcus Helgason, Thorunn Heon, Sui P. Hughes, Kevin A. Hunt, Edmund R. Ingram, Daniel J. Jackson-Mills, George Jowett, Kelly Keitt, Timothy H. Kloepper, Laura N. Kramer-Schadt, Stephanie Labisko, Jim Labrosse, Frédéric Lawson, Jenna Lecomte, Nicolas de Lima, Ricardo F. Littlewood, Nick A. Marshall, Harry H. Masala, Giovanni L. Maskell, Lindsay C. Matechou, Eleni Mazzolai, Barbara McConnell, Alistair Melbourne, Brett A. Miriyev, Aslan Nana, Eric Djomo Ossola, Alessandro Papworth, Sarah Parr, Catherine L. Payo-Payo, Ana Perry, Gad Pettorelli, Nathalie Pillay, Rajeev Potts, Simon G. Prendergast-Miller, Miranda T. Qie, Lan Rolley-Parnell, Persie Rossiter, Stephen J. Rowcliffe, Marcus Rumble, Heather Sadler, Jon P. Sandom, Christopher J. Sanyal, Asiem Schrodt, Franziska Sethi, Sarab S. Shabrani, Adi Siddall, Robert Smith, Simón C. Snep, Robbert P. H. Soulsbury, Carl D. Stanley, Margaret C. Stephens, Philip A. Stephenson, P.J. Struebig, Matthew J. Studley, Matthew Svátek, Martin Tang, Gilbert Taylor, Nicholas K. Umbers, Kate D. L. Ward, Robert J. White, Patrick J. C. Whittingham, Mark J. Wich, Serge Williams, Christopher D. Yakubu, Ibrahim B. Yoh, Natalie Durrell Institute of Conservation and Ecology (DICE) School of Natural Sciences University of Kent Canterbury United Kingdom Centre for Environmental Policy Imperial College London London United Kingdom Department of Geography and Environmental Sciences Northumbria University Newcastle upon Tyne United Kingdom School of Computing Engineering and the Built Environment Edinburgh Napier University Edinburgh United Kingdom Synthotech Ltd Milner Court Hornbeam Square Harrogate United Kingdom Mechanical Engineering Department University College London London United Kingdom HUTAN SWD Kota Kinabalu Malaysia Programa de Pós-Graduação em Gestão e Tecnologia Ambiental da Universidade Federal de Rondonópolis Rondonópolis Brazil Department of Engineering Harper Adams University Newport United Kingdom Applied Ecology Research Group School of Life Sciences Anglia Ruskin University Cambridge United Kingdom Centre for Ecology and Hydrology Penicuik United Kingdom Department of Life Sciences Imperial College London Silwood Park Campus Ascot United Kingdom Department of Urban and Regional Planning Faculty of Earth and Environmental Sciences Bayero University Kano Nigeria Greenhood Nepal Kathmandu Nepal Animal Rural & Environmental Sciences Nottingham Trent University Nottinghamshire United Kingdom School of Biological and Environmental Sciences Liverpool John Moores University Liverpool United Kingdom Lincoln Centre for Autonomous Systems University of Lincoln Lincoln United Kingdom Royal Botanic Garden Edinburgh Edinburgh United Kingdom School of Biological Sciences University of East Anglia Norwich Research Park Norwich United Kingdom Digital Ecology Limited Bristol United Kingdom School of Biological Sciences University of Bristol Bristol United Kingdom Department of Computing Imperial College London London United Kingdom Department of Ecology and Evolutionary Biology University of Colorado Boulder CO United States Faculty of Science Technology Engineering
With biodiversity loss escalating globally, a step change is needed in our capacity to accurately monitor species populations across ecosystems. Robotic and autonomous systems (RAS) offer technological solutions that ...
来源: 评论
Predicting vulnerable software components using software network graph  9th
Predicting vulnerable software components using software net...
收藏 引用
9th International Symposium on cyberspace Safety and security, CSS 2017
作者: Wei, Shengjun Du, Xiaojiang Hu, Changzhen Shan, Chun Beijing Key Laboratory of Software Security Engineering Technique Beijing Institute of Technology Beijing100081 China Department of Computer and Information Sciences Temple University PhiladelphiaPA19122 United States
Vulnerability Prediction Models (VPMs) are used to predict vulnerability-prone modules and now many software security metrics have been proposed. In this paper, we predict vulnerability-prone components. Based on soft... 详细信息
来源: 评论
Information Leakage in Encrypted Deduplication via Frequency Analysis
Information Leakage in Encrypted Deduplication via Frequency...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Jingwei Li Chuan Qin Patrick P. C. Lee Xiaosong Zhang University of Electronic Science and Technology of China Chengdu CN Department of Computer Science and Engineering The Chinese University of Hong Kong Center for Cyber Security University of Electronic Science and Technology of China
Encrypted deduplication seamlessly combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mostly adopt a determinist... 详细信息
来源: 评论
A Dynamic Social Network Data Publishing Algorithm Based on Differential Privacy
收藏 引用
Journal of Information security 2017年 第4期8卷 328-338页
作者: Zhenpeng Liu Yawei Dong Xuan Zhao Bin Zhang School of Cyber Security and Computer Hebei University Baoding China Center for Information Technology Hebei University Baoding China School of Electronic Information Engineering Hebei University Baoding China
Social network contains the interaction between social members, which constitutes the structure and attribute of social network. The interactive relationship of social network contains a lot of personal privacy inform... 详细信息
来源: 评论
Effects of csi knowledge on secrecy of threshold-selection decode-and-forward relaying
arXiv
收藏 引用
arXiv 2018年
作者: Kundu, Chinmoy Ghose, Sarbani Ngatche, Telex M.N. Dobre, Octavia A. Duong, Trung Q. Bose, Ranjan School of Electronics Electrical Engineering and Computer Science Queen’s University Belfast Northern Ireland United Kingdom Cryptology and Security Research Unit Indian Statistical Institute Kolkata700108 India Engineering and Applied Science Memorial University Canada Department of Electrical Engineering Indian Institute of Technology Delhi New Delhi110016 India
—This paper considers secrecy of a three node cooperative wireless system in the presence of a passive eavesdropper. The threshold-selection decode-and-forward (DF) relay is considered, which can decode the source me... 详细信息
来源: 评论
On the design of a secure user authentication and key agreement scheme for wireless sensor networks
On the design of a secure user authentication and key agreem...
收藏 引用
作者: Kumari, Saru Das, Ashok Kumar Wazid, Mohammad Li, Xiong Wu, Fan Choo, Kim-Kwang Raymond Khan, Muhammad Khurram Department of Mathematics Chaudhary Charan Singh University MeerutUttar Pradesh250 005 India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad500 032 India School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411 201 China Nanjing University of Information Science and Technology Nanjing210044 China Department of Computer Science and Engineering Xiamen Institute of Technology Xiamen361021 China Department of Information Systems and Cyber Security The University of Texas at San Antonio San AntonioTX78249 United States School of Computer Science China University of Geosciences Wuhan China School of Information Technology & Mathematical Sciences University of South Australia AdelaideSA Australia Center of Excellence in Information Assurance King Saud University Riyadh Saudi Arabia
A wireless sensor network (WSN) typically consists of a large number of resource-constrained sensor nodes and several control or gateway nodes. Ensuring the security of the asymmetric nature of WSN is challenging, and... 详细信息
来源: 评论
Mobile Social Network Forensic Analysis Based on Visualization Method
Mobile Social Network Forensic Analysis Based on Visualizati...
收藏 引用
2017 6th International Conference on Advanced Materials and computer Science(ICAMCS 2017)
作者: Jiating Li Chunguang Ma Min Yu Chao Liu College of Computer Science and Technology Harbin Engineering University Institution of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences
Nowadays, so much personal information is stored in the mobile phone, especially in mobile social network. Due to the large amount of data in the mobile phone, it is very difficult to extract and analyze the evidence ... 详细信息
来源: 评论