咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,330 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,635 篇 工学
    • 2,782 篇 计算机科学与技术...
    • 2,313 篇 软件工程
    • 959 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 508 篇 电气工程
    • 417 篇 生物工程
    • 333 篇 电子科学与技术(可...
    • 244 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 195 篇 安全科学与工程
    • 178 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 133 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,569 篇 理学
    • 825 篇 数学
    • 451 篇 生物学
    • 324 篇 物理学
    • 261 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 954 篇 管理学
    • 602 篇 管理科学与工程(可...
    • 391 篇 图书情报与档案管...
    • 302 篇 工商管理
  • 299 篇 法学
    • 188 篇 社会学
  • 266 篇 医学
    • 217 篇 临床医学
    • 198 篇 基础医学(可授医学...
    • 119 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 42 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 217 篇 accuracy
  • 192 篇 deep learning
  • 181 篇 feature extracti...
  • 179 篇 machine learning
  • 175 篇 security
  • 159 篇 internet of thin...
  • 152 篇 training
  • 139 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 93 篇 cryptography
  • 90 篇 protocols
  • 90 篇 artificial intel...
  • 82 篇 convolutional ne...
  • 79 篇 data models
  • 73 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 162 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 57 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 47 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 peng hao
  • 20 篇 sofotasios pasch...
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 jin hai
  • 17 篇 liu yang
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,449 篇 英文
  • 330 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5838 条 记 录,以下是4951-4960 订阅
排序:
Dynamical system with Markov parameters for modelling system security of threats in cyberspace
收藏 引用
AIP Conference Proceedings 2019年 第1期2116卷
作者: Miroslava Růžičková Irada Dzhalladova Josef Diblík 1University of Białystok Faculty of Mathematics and Informatics K. Ciołkowskiego 1M 15-245 Białystok Poland 2National University of Economics Department of Computer Mathematics and Information Security Kyiv 03068 Peremogy 54/1 Ukraine 3Brno University of Technology Faculty of Electrical Engineering and Communication Department of Mathematics Technická 3058/10 61600 Brno Czech Republic
The moment equations are derived for a system of linear difference equations with Markov switching. One example illustrates the use of such systems for modeling the security of threats in cyberspace.
来源: 评论
A survey on security and privacy issues of bitcoin
arXiv
收藏 引用
arXiv 2017年
作者: Conti, Mauro Kumar E, Sandeep Lal, Chhagan Ruj, Sushmita Department of Mathematics University of Padua Padua Italy Department of Telecommunication Engineering Ramaiah Institute of Technology Bengaluru India Cryptology and Security Research Unit Computer and Communication Sciences Division Indian Statistical Institute India
Bitcoin is a popular cryptocurrency that records all transactions in a distributed append-only public ledger called blockchain. The security of Bitcoin heavily relies on the incentivecompatible proof-of-work (PoW) bas... 详细信息
来源: 评论
Inertial proximal alternating linearized minimization (iPALM) for nonconvex and nonsmooth problems
arXiv
收藏 引用
arXiv 2017年
作者: Pock, Thomas Sabach, Shoham Institute of Computer Graphics and Vision Graz University of Technology Graz8010 Austria Digital Safety and Security Department Ait Austrian Institute of Technology GmbH Vienna1220 Austria Department of Industrial Engineering and Management Technion-Israel Institute of Technology Haifa3200003 Israel
In this paper we study nonconvex and nonsmooth optimization problems with semi-algebraic data, where the variables vector is split into several blocks of variables. The problem consists of one smooth function of the e... 详细信息
来源: 评论
A framework for counterfeit smart grid device detection
A framework for counterfeit smart grid device detection
收藏 引用
2016 IEEE Conference on Communications and Network security, CNS 2016
作者: Babun, Leonardo Aksu, Hidayet Selcuk Uluagac, A. Cyber-Physical Systems Security Lab Department of Electrical and Computer Engineering Florida International University 10555 West Flagler St. MiamiFL33174 United States
The core vision of the smart grid concept is the realization of reliable two-way communications between smart devices (e.g., IEDs, PLCs, PMUs). The benefits of the smart grid also come with tremendous security risks a... 详细信息
来源: 评论
Formalising openCypher graph queries in relational algebra
arXiv
收藏 引用
arXiv 2017年
作者: Marton, József Szárnyas, Gábor Varró, Dániel Budapest University of Technology and Economics Database Laboratory Budapest University of Technology and Economics Fault Tolerant Systems Research Group MTA-BME Lendület Research Group on Cyber-Physical Systems McGill University Department of Electrical and Computer Engineering
Graph database systems are increasingly adapted for storing and processing heterogeneous network-like datasets. However, due to the novelty of such systems, no standard data model or query language has yet emerged. Co... 详细信息
来源: 评论
A novel vulnerability analysis approach to generate fuzzing test case in industrial control systems
A novel vulnerability analysis approach to generate fuzzing ...
收藏 引用
2016 IEEE Information technology,Networking,Electronic and Automation Control Conference(ITNEC 2016)
作者: SungJin Kim WooYeon Jo Taeshik Shon Department of Computer Engineering Ajou University Department of Cyber Security Ajou University
A smart grid is nationwide industrial control system that combine IT and traditional electric system. The main hindrance to smart grid is security. To solve this problem we propose a novel approach for vulnerability a... 详细信息
来源: 评论
Design and implementation of mobile app and web-based software for management and monitoring of bicycle routes  13
Design and implementation of mobile app and web-based softwa...
收藏 引用
13th European, Mediterranean and Middle Eastern Conference on Information Systems, EMCIS 2016
作者: Khodambashi, Soudabeh Sanders, Richard Liodden Gulla, Jon Atle Abrahamsson, Pekka Department of Computer and Information Science Norwegian University of Sceicne and Technology Trondheim Norway Department of Software Engineering Safety and Security Sintef Trondheim Norway
Currently there are only limited data available on the habits and behaviour of pedestrians and cyclists towards private motor vehicles and public transport. The only data on cyclists' behaviour originates from spa... 详细信息
来源: 评论
Combinatorial algorithms for control of biological regulatory networks
arXiv
收藏 引用
arXiv 2017年
作者: Clark, Andrew Lee, Phillip Alomair, Basel Bushnell, Linda Poovendran, Radha Department of Electrical and Computer Engineering Worcester Polytechnic Institute WorcesterMA01609 United States Network Security Lab Department of Electrical Engineering University of Washington SeattleMA98195 United States National Center for Cybersecurity Technology King Abdulaziz City for Science and Technology Riyadh Saudi Arabia
Biological processes, including cell differentiation, organism development, and disease progression, can be interpreted as attractors (fixed points or limit cycles) of an underlying networked dynamical system. In this... 详细信息
来源: 评论
SMoNt: An ontology for crime solving through social media
收藏 引用
International Journal of Metadata, Semantics and Ontologies 2017年 第2-3期12卷 71-81页
作者: Kalemi, Edlira Yildirim-Yayilgan, Sule Domnori, Elton Elezaj, Ogerta Process and Information Systems Engineering Research Centre University of Surrey Guildford SurreyGU2 7XH United Kingdom Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik2815 Norway Department of Computer Engineering Epoka University Tirana1039 Albania Department of Mathematics Statistics and Applied Informatics University of Tirana Tirana1000 Albania
There are numerous social networks such as Facebook, LinkedIn, Google Plus and Twitter whose data sources are becoming larger every day holding an abundance of valuable information. Among these data, digital crime evi... 详细信息
来源: 评论
Credit card fraud detection through parenclitic network analysis
arXiv
收藏 引用
arXiv 2017年
作者: Zanin, Massimiliano Romance, Miguel Moral, Santiago Criado, Regino Department of Computer Science Faculty of Science and Technology Universidade Nova de Lisboa Lisboa Portugal Department of Applied Mathematics Universidad Rey Juan Carlos Mostoles Madrid28933 Spain Center for Biomedical Technology Universidad Politecnica de Madrid Pozuelo de Alarcon Madrid28223 Spain Cyber Security and Digital Trust BBVA Group Madrid28050 Spain
The detection of frauds in credit card transactions is a major topic in financial research, of profound economic implications. While this has hitherto been tackled through data analysis techniques, the resemblances be... 详细信息
来源: 评论