咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是851-860 订阅
排序:
IoT security Frameworks: A Comparative Review with a Focus on Privacy  2
IoT Security Frameworks: A Comparative Review with a Focus o...
收藏 引用
2nd International Conference on cyber Resilience, ICCR 2024
作者: Al-Hasnawi, Abduljaleel Niu, Yitong Tawfeq, Jamal F. Ranjan Pradhan, Manas Salahat, Mohammed Ghazal, Taher M. Ministry Of Higher Education And Scientific Research Baghdad Iraq College Of Information Technology Imam Ja'afar Al-Sadiq University Department Of Communication Technology Engineering Baghdad Iraq School Of Aeronautical Engineering AnYang University Anyang China Medical Technical College Al-Farahidi University Department Of Medical Instrumentation Technical Engineering Baghdad10070 Iraq School Of Computing Skyline University College University City Sharjah Sharjah United Arab Emirates College Of Engineering And Technology University Of Science And Technology Of Fujairah Fujairah United Arab Emirates Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
The privacy of sensitive data within the Internet of Things (IoT) is at risk due to potential privacy violations. These violations can occur through illegal access by external entities, as well as inadvertent disclosu... 详细信息
来源: 评论
A Scalable and Lightweight Authentication Architecture for the Internet of Things (IoT) in Smart Home Applications  2
A Scalable and Lightweight Authentication Architecture for t...
收藏 引用
2nd Zimbabwe Conference on Information Communication and technology, ZCICT 2023
作者: Gamundani, Attlee M. Phillips, Amelia Muyingi, Hippolyte N. Namibia University of Science and Technology Faculty of Computing & Informatics Cyber Security Department Windhoek Namibia University of the Cumberlands School of Computer and Information Sciences WilliamsburgKY United States Namibia University of Science and Technology Faculty of Computing & Informatics Windhoek Namibia
In the evolving landscape of smart home applications, ensuring robust and efficient authentication within the Internet of Things (IoT) environments is paramount. This paper presents a scalable, lightweight authenticat... 详细信息
来源: 评论
Implementing Three Factors Authentication System (3FA) to Maintain Employee Attendance Record to Enhance security
Implementing Three Factors Authentication System (3FA) to Ma...
收藏 引用
Intelligent Technologies (CONIT), International Conference on
作者: Plezzant Columbus Johnson Shri Kant Sandeep Kumar Department of Computer Science Engineering Sharda University Center for Cyber Security and Cryptology Sharda University
Today as we all know that maintaining of employee credential have been some major issues around the world. Finding it more difficult to keep track of employees. With this, the company, institution, or government entit...
来源: 评论
Accounting for systemic risk in analysis of crisis scenarios  21
Accounting for systemic risk in analysis of crisis scenarios
收藏 引用
21st International ISCRAM Conference, ISCRAM 2024
作者: Gonzalez, Jose J. Abbas, Reem Paulsen, Sigurd University of Agder Kristiansand Norway Department of Computer Science and Software Engineering Auckland University of Technology Auckland New Zealand Dept. of Organization Crisis Management and Information Security Kristiansand Norway
Systemic risk is ubiquitous in our increasingly globalised world owing to the interconnections within and across sectors. However, a review of National Risk Assessments performed in OECD member countries reveals that ... 详细信息
来源: 评论
Privacy Preservation Techniques in Smart Grids: Balancing security and Utility in IoT-Driven Environments
Privacy Preservation Techniques in Smart Grids: Balancing Se...
收藏 引用
Artificial Intelligence, Blockchain, and Internet of Things (AIBThings), IEEE International Conference on
作者: Hussien AbdelRaouf Michael Long Paul Tran Luna Baral Zuha Khan Mohamed Mahmoud Mostafa M. Fouda Mohamed I. Ibrahem School of Computer and Cyber Sciences Augusta University Augusta GA USA Cyber Security Engineering Department George Mason University Fairfax VA USA Department of Electrical and Computer Engineering Idaho State University Pocatello ID USA
The Internet of Things (IoT) has significantly impacted the energy industry, leading to increased reliance on smart grid (SG) technology. However, integrating electricity with the internet introduces security vulnerab... 详细信息
来源: 评论
Optimizing Distributed Denial of Service (DDoS) Attack Detection Techniques on Software Defined Network (SDN) Using Feature Selection  4
Optimizing Distributed Denial of Service (DDoS) Attack Detec...
收藏 引用
4th International Conference on Innovations in computer Science, ICONICS 2024
作者: Haq, Inamul Khan, Salman A. Mohammad, Nazeeruddin Zaman, Ali College of Computing and Info. Sciences Karachi Institute of Economics and Technology Karachi Pakistan Cyber Security Center Prince Mohammad Bin Fahd University Al-Khobar Saudi Arabia Shaheed Zulfiqar Ali Bhutto University Computer Science Department Karachi Pakistan
Distributed denial of service (DDoS) attacks refer to a category of cyber attacks in which an attacker attempts to overwhelm a resource, such as a server, destination, or bandwidth through various means. This is usual... 详细信息
来源: 评论
Secure Channel Creation for Task Delivery in Vehicular Cloud Computing to Avoid Denial of Service (DoS)
Secure Channel Creation for Task Delivery in Vehicular Cloud...
收藏 引用
Automation, Computing and Renewable Systems (ICACRS), International Conference on
作者: A. Meenambika S. Pavalarajan N. Anu Lavanya B. Ajith Jerom S. Divya Department of Computer Science and Business Systems PSNA College of Engineering and Technology Dindigul India Department of CSE (Cyber Security) PSNA College of Engineering and Technology Dindigul India Department of Artificial Intelligence and Data Science PSNA College of Engineering and Technology Dindigul India
Vehicular Cloud Computing (VCC) offers a promising platform for supporting various automotive applications and services. However, its distributed and dynamic nature makes it susceptible to Denial-of-Service (DoS) atta... 详细信息
来源: 评论
Extraction of Actionable Threat Intelligence from Dark Web Data
Extraction of Actionable Threat Intelligence from Dark Web D...
收藏 引用
International Conference on Control Communication & Computing India (ICCC)
作者: Varsha Varghese Mahalakshmi S Senthilkumar Kb Cyber Forensics and Information Security Department of Computer Science & Engineering ER&DCI Institute of Technology Thiruvananthapuram Cyber Security Group Centre for Development of Advanced Computing Thiruvananthapuram Scientict_E Cyber Security Group Centre for Development of Advanced Computing Thiruvananthapuram
Darknet has emerged as an excellent platform for cybercriminals to conduct various illicit activities such as operating a fully functional crypto-currency-based marketplace or maintaining a highly anonymous communicat...
来源: 评论
Deep Q-Learning-Based Resource Management in IRS-Assisted VLC Systems
IEEE Transactions on Machine Learning in Communications and ...
收藏 引用
IEEE Transactions on Machine Learning in Communications and Networking 2024年 2卷 34-48页
作者: Hammadi, Ahmed Al Bariah, Lina Muhaidat, Sami Al-Qutayri, Mahmoud Sofotasios, Paschalis C. Debbah, Merouane Technology Innovation Institute Abu Dhabi United Arab Emirates Khalifa University Center for Cyber-Physical Systems Department of Electrical Engineering and Computer Science Abu Dhabi United Arab Emirates Carleton University Department of Systems and Computer Engineering OttawaK1S 5B6 Canada Khalifa University Department of Electrical Engineering and Computer Science Abu Dhabi United Arab Emirates Tampere University Department of Electrical Engineering Tampere33014 Finland Khalifa University KU 6G Center Abu Dhabi United Arab Emirates
Visible Light Communication (VLC) is a promising enabling technology for the next-generation wireless networks, as it complements radio-frequency (RF)-based communications by providing wider bandwidth, higher data rat... 详细信息
来源: 评论
Hybrid Grey Wolf and Particle Swarm Optimized (HGW-PSO) Scheduling in Containerized Cloud Computing Environment
Hybrid Grey Wolf and Particle Swarm Optimized (HGW-PSO) Sche...
收藏 引用
Emerging technology (INCET), International Conference for
作者: S.M. Udhaya sankar Martin Joel Rathnam Aswanth Babu Harikumar G J Keerthi Nadh Department of Computer Science and Engineering(Cyber Security) R.M.K College of Engineering and Technology Chennai Tamilnadu India Department of Electronics and Communication Engineering Sri Sairam college of Engineering Bengaluru Karnataka India
The concept of containerization consists of encapsulating applications with their libraries with the help of operating system level virtualization, ensuring they are separated from other processes on the same machine.... 详细信息
来源: 评论