咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,307 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,613 篇 工学
    • 2,769 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 955 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 499 篇 电气工程
    • 417 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 243 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 194 篇 安全科学与工程
    • 177 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 132 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,564 篇 理学
    • 822 篇 数学
    • 451 篇 生物学
    • 322 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 952 篇 管理学
    • 601 篇 管理科学与工程(可...
    • 390 篇 图书情报与档案管...
    • 301 篇 工商管理
  • 296 篇 法学
    • 188 篇 社会学
  • 265 篇 医学
    • 216 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 218 篇 accuracy
  • 193 篇 deep learning
  • 181 篇 feature extracti...
  • 180 篇 machine learning
  • 175 篇 security
  • 158 篇 internet of thin...
  • 153 篇 training
  • 141 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 cryptography
  • 90 篇 protocols
  • 89 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 56 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 46 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,431 篇 英文
  • 324 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5815 条 记 录,以下是4931-4940 订阅
排序:
A framework for counterfeit smart grid device detection
A framework for counterfeit smart grid device detection
收藏 引用
2016 IEEE Conference on Communications and Network security, CNS 2016
作者: Babun, Leonardo Aksu, Hidayet Selcuk Uluagac, A. Cyber-Physical Systems Security Lab Department of Electrical and Computer Engineering Florida International University 10555 West Flagler St. MiamiFL33174 United States
The core vision of the smart grid concept is the realization of reliable two-way communications between smart devices (e.g., IEDs, PLCs, PMUs). The benefits of the smart grid also come with tremendous security risks a... 详细信息
来源: 评论
Formalising openCypher graph queries in relational algebra
arXiv
收藏 引用
arXiv 2017年
作者: Marton, József Szárnyas, Gábor Varró, Dániel Budapest University of Technology and Economics Database Laboratory Budapest University of Technology and Economics Fault Tolerant Systems Research Group MTA-BME Lendület Research Group on Cyber-Physical Systems McGill University Department of Electrical and Computer Engineering
Graph database systems are increasingly adapted for storing and processing heterogeneous network-like datasets. However, due to the novelty of such systems, no standard data model or query language has yet emerged. Co... 详细信息
来源: 评论
A novel vulnerability analysis approach to generate fuzzing test case in industrial control systems
A novel vulnerability analysis approach to generate fuzzing ...
收藏 引用
2016 IEEE Information technology,Networking,Electronic and Automation Control Conference(ITNEC 2016)
作者: SungJin Kim WooYeon Jo Taeshik Shon Department of Computer Engineering Ajou University Department of Cyber Security Ajou University
A smart grid is nationwide industrial control system that combine IT and traditional electric system. The main hindrance to smart grid is security. To solve this problem we propose a novel approach for vulnerability a... 详细信息
来源: 评论
Design and implementation of mobile app and web-based software for management and monitoring of bicycle routes  13
Design and implementation of mobile app and web-based softwa...
收藏 引用
13th European, Mediterranean and Middle Eastern Conference on Information Systems, EMCIS 2016
作者: Khodambashi, Soudabeh Sanders, Richard Liodden Gulla, Jon Atle Abrahamsson, Pekka Department of Computer and Information Science Norwegian University of Sceicne and Technology Trondheim Norway Department of Software Engineering Safety and Security Sintef Trondheim Norway
Currently there are only limited data available on the habits and behaviour of pedestrians and cyclists towards private motor vehicles and public transport. The only data on cyclists' behaviour originates from spa... 详细信息
来源: 评论
Combinatorial algorithms for control of biological regulatory networks
arXiv
收藏 引用
arXiv 2017年
作者: Clark, Andrew Lee, Phillip Alomair, Basel Bushnell, Linda Poovendran, Radha Department of Electrical and Computer Engineering Worcester Polytechnic Institute WorcesterMA01609 United States Network Security Lab Department of Electrical Engineering University of Washington SeattleMA98195 United States National Center for Cybersecurity Technology King Abdulaziz City for Science and Technology Riyadh Saudi Arabia
Biological processes, including cell differentiation, organism development, and disease progression, can be interpreted as attractors (fixed points or limit cycles) of an underlying networked dynamical system. In this... 详细信息
来源: 评论
SMoNt: An ontology for crime solving through social media
收藏 引用
International Journal of Metadata, Semantics and Ontologies 2017年 第2-3期12卷 71-81页
作者: Kalemi, Edlira Yildirim-Yayilgan, Sule Domnori, Elton Elezaj, Ogerta Process and Information Systems Engineering Research Centre University of Surrey Guildford SurreyGU2 7XH United Kingdom Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik2815 Norway Department of Computer Engineering Epoka University Tirana1039 Albania Department of Mathematics Statistics and Applied Informatics University of Tirana Tirana1000 Albania
There are numerous social networks such as Facebook, LinkedIn, Google Plus and Twitter whose data sources are becoming larger every day holding an abundance of valuable information. Among these data, digital crime evi... 详细信息
来源: 评论
Credit card fraud detection through parenclitic network analysis
arXiv
收藏 引用
arXiv 2017年
作者: Zanin, Massimiliano Romance, Miguel Moral, Santiago Criado, Regino Department of Computer Science Faculty of Science and Technology Universidade Nova de Lisboa Lisboa Portugal Department of Applied Mathematics Universidad Rey Juan Carlos Mostoles Madrid28933 Spain Center for Biomedical Technology Universidad Politecnica de Madrid Pozuelo de Alarcon Madrid28223 Spain Cyber Security and Digital Trust BBVA Group Madrid28050 Spain
The detection of frauds in credit card transactions is a major topic in financial research, of profound economic implications. While this has hitherto been tackled through data analysis techniques, the resemblances be... 详细信息
来源: 评论
Predicting aesthetic score distribution through cumulative jensen-shannon divergence
arXiv
收藏 引用
arXiv 2017年
作者: Jin, Xin Wu, Le Li, Xiaodong Chen, Siyu Peng, Siwei Chi, Jingying Ge, Shiming Song, Chenggen Zhao, Geng Department of Computer Science and Technology Beijing Electronic Science and Technology Institute Beijing100070 China Department of Information Security Beijing Electronic Science and Technology Institute Beijing100070 China College of Information Science and Technology Beijing University of Chemical Technology Beijing100029 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
Aesthetic quality prediction is a challenging task in the computer vision community because of the complex interplay with semantic contents and photographic technologies. Recent studies on the powerful deep learning b... 详细信息
来源: 评论
Energy efficient genetic inspired scheduling for data aggregation
International Journal of Control and Automation
收藏 引用
International Journal of Control and Automation 2016年 第3期9卷 227-234页
作者: Madhavi, S. Kim, Tai Honn Department of Computer Science and Engineering P.V.P. Siddhartha Institute of Technology Andhra Pradesh India Department of Convergence Security Sungshin Women's University 249-1 Dongseon-dong 3 - ga Seoul Korea Republic of
Energy efficient Data Aggregation Scheduling is essential in Ubiquitous sensor networks. Optimal communication distances between the nodes and the base station improves the network lifetime. Clustering improves the ef... 详细信息
来源: 评论
A consequence of invertibility on the normal form of a MIMO nonlinear systems
收藏 引用
IFAC-PapersOnLine 2016年 第18期49卷 856-861页
作者: Wang, Lei Isidori, Alberto Marconi, Lorenzo Su, Hongye State Key Laboratory of Industrial Control Technology Institute of Cyber-Systems and Control Zhejiang University Hangzhou China CASY - DEI University of Bologna Italy Department of Computer Control and Management Engineering University of Rome "La Sapienza" Rome Italy
In this paper, a relevant consequence of invertibility on the normal form of MIMO nonlinear systems is presented. Making full use of the definition of uniform invertibility in the sense of Singh, the multipliers δi+1... 详细信息
来源: 评论