咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是641-650 订阅
排序:
security, Trust, and Privacy in cyber-physical Systems (CPS)
Security, Trust, and Privacy in Cyber-physical Systems (CPS)
收藏 引用
cyber Physical Systems, Power Electronics and Electric Vehicles (ICPEEV), International Conference on
作者: Wareez A. Busari Abeeb A. Bello Department of Cyber Security Science Federal University of Technology Minna Niger State Nigeria Department of Electrical and Computer Engineering Mahindra University Hyderabad India
This paper explores the convergence of physical and computational components in cyber-Physical Systems (CPS). security, trust, and privacy are paramount for reliable and resilient operation of these interconnected sys... 详细信息
来源: 评论
Watermarking and Encryption for Electronic Medical Records (EMR) security Based on mCloud  2
Watermarking and Encryption for Electronic Medical Records (...
收藏 引用
2nd International Conference on cyber Resilience, ICCR 2024
作者: Abdulshaheed, Haider Rasheed Abbas, Yaseen Saadi Tawfeq, Jamal F. Ateeq, Karamath Alnawayseh, Saif. E. A. Ghazal, Taher M. Baghdad College Of Economic Sciences University Computer Engineering Techniques Department Baghdad Iraq College Of Engineering Al-Nahrain University Electronic And Communications Engineering Department Baghdad Iraq Medical Technical College Al-Farahidi University Department Of Medical Instrumentation Technical Engineering Baghdad10070 Iraq School Of Computing Skyline University College University City Sharjah Sharjah United Arab Emirates College Of Engineering Mutah University Department Of Electrical Engineering Al-Karak Jordan Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
Providing quality healthcare services and promoting collaborative clinical research are easier and more efficient with electronic medical record (EMR) systems. All aspects of care are included in electronic health rec... 详细信息
来源: 评论
Traffic Congestion Prediction Using Machine Learning: Amman City Case Study
Traffic Congestion Prediction Using Machine Learning: Amman ...
收藏 引用
2024 International Conference on Medical Imaging, Electronic Imaging, Information Technologies, and Sensors, MIEITS 2024
作者: Arabiat, Areen Hassan, Mohammad Al Momani, Omar Department of Communication and Computer Engineering Faculty of Engineering Al Ahliyya Amman University Amman19111 Jordan Department of Networks security Faculty of Information Technology The World Islamic Sciences and Educations University WISE Amman Jordan
Traffic congestion leads to wasted time, pollution, and increased fuel usage. Traffic congestion prediction has become a developing research topic in recent years, particularly in the field of machine learning (ML). T... 详细信息
来源: 评论
Leveraging IR based sequence and graph features for source-binary code alignment  4
Leveraging IR based sequence and graph features for source-b...
收藏 引用
4th International Conference on Neural Networks, Information and Communication engineering, NNICE 2024
作者: Yu, Zhouqian Zhang, Wei Xu, Tao Beijing Information Science and Technology University Computer School Beijing China Beijing Information Science and Technology University Beijing Laboratory of National Economic Security Early-Warning Engineering Beijing China Tsinghua University Department of Computer Science and Technology Beijing China
Code similarity analysis is a versatile technique that can be applied across various domains, including code clone detection, code search, malware detection, patch analysis, and vulnerability search. The core of sourc... 详细信息
来源: 评论
AI-Driven Intelligent IoT Systems for Real-Time Food Quality Monitoring and Analysis  2
AI-Driven Intelligent IoT Systems for Real-Time Food Quality...
收藏 引用
2nd IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Krishnan, Prabhakar Ebenezar, U. Samson Ranitha, R. Purushotham, N. Balakrishnan, T. Suresh Amrita Vishwa Vidyapeetham Center for Cyber Security Systems and Networks Amritapuri campus India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Care College of Engineering Department of Computer Science and Engineering Tamil Nadu Trichy India Mohan Babu University Department of Computer Science and Engineering Mr.palliAP India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Chennai India
The system will monitor and analyse food quality along the supply chain in real time. The system has high performance due to the CNN algorithms. In terms of accuracy, CNN has a high performance (95.2%), precision (92.... 详细信息
来源: 评论
Intelligent Model to Predict Early Liver Disease using Machine Learning Technique
Intelligent Model to Predict Early Liver Disease using Machi...
收藏 引用
2022 International Conference on Business Analytics for technology and security, ICBATS 2022
作者: Ghazal, Taher M. Rehman, Aziz Ur Saleem, Muhammad Ahmad, Munir Ahmad, Shabir Mehmood, Faisal Faculty of Information Science and Technology Ukm Network and Communication Technology Lab Center for Cyber Security Malaysia School of Computer Science NCBAandE Lahore Pakistan Gachon University Department of Computer Engineering Korea Republic of Gachon University Department of It Convergence Engineering Korea Republic of
Liver Disease (LD) is the main cause of death worldwide, affecting a large number of people. A variety of factors affect the liver, resulting in this disease. The diagnosis of this condition is both expensive and time... 详细信息
来源: 评论
Conditional GANs against DNS based unsupervised detection of malicious domains
Conditional GANs against DNS based unsupervised detection of...
收藏 引用
2022 International Conference on cyberworlds, CW 2022
作者: Mohus, Mathias Lundteigen Flakk, Emil Henry Norwegian University of Science and Technology Department of Computer Science Trondheim Norway Cyber Security Center for Research and Education Sikt Trondheim Norway
While Unsupervised Learning methods have been employed in detecting malicious domains using DNS data, it is unknown if these techniques are robust in an adversarial setting. We present a novel method using a condition... 详细信息
来源: 评论
Detection of Network Attacks using Machine Learning and Deep Learning Models
Detection of Network Attacks using Machine Learning and Deep...
收藏 引用
2022 International Conference on Machine Learning and Data engineering, ICMLDE 2022
作者: Dhanya, K.A. Vajipayajula, Sulakshan Srinivasan, Kartik Tibrewal, Anjali Kumar, T. Senthil Kumar, T. Gireesh TIFAC-CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham Coimbatore India STSM Architect IBM Security IBM India Sr. Architect IBM Security IBM India Pvt Ltd India Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Coimbatore India
Anomaly-based network intrusion detection systems are highly significant in detecting network attacks. Robust machine learning and deep learning models for identifying network intrusion and attack types are proposed i... 详细信息
来源: 评论
Optimizing Cloud-Based IoT Architectures with an Energy-Sensitive Load Balancing Algorithm for Enhanced Resource Utilization and Network Efficiency  4
Optimizing Cloud-Based IoT Architectures with an Energy-Sens...
收藏 引用
4th International Conference on Technological Advancements in Computational Sciences, ICTACS 2024
作者: Kumar, Ravi Raghavendar, K. Chary, Kalvog Prakasha Naresh, K. Reddy, G. Venkata Rami Kumar, D. Sravan Sreenidhi University Department of Cse Hyderabad India Teegala Krishna Reddy Engineering College Department of Cse Hyderabad India Cvr College of Engineering Department of CSE Cyber Security Hyderabad India Tkr College of Engineering & Technology Department of Cse Hyderabad India Vardhaman College of Engineering Department of Cse Hyderabad India Narshima Reddy Engineering College Maisammaguda Hyderabad India
Cloud computing, which provides virtualized computing resources online, has become increasingly popular. Effective load balancing (LB) is essential for distributing dynamic workloads among cloud systems and ensuring e... 详细信息
来源: 评论
Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks  33
Design of Lightweight Cryptography based Deep Learning Model...
收藏 引用
33rd International Telecommunication Networks and Applications Conference, ITNAC 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Nafi, Nazmus Shaker Aman, Azana Hafizah Islam, Shayla Fadhil, Saif Aamer Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia Department of Computer Techniques Engineering Baghdad10011 Iraq Integrated Work Package KBR SouthbankVIC Australia Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia
Depending on a device's encryption mechanism, a wide variety of tangible details could be exposed. These leaks are used in side-channel analysis, which is used to get keys. Due to deep learning's sensitivity t... 详细信息
来源: 评论