咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,330 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,635 篇 工学
    • 2,782 篇 计算机科学与技术...
    • 2,313 篇 软件工程
    • 959 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 508 篇 电气工程
    • 417 篇 生物工程
    • 333 篇 电子科学与技术(可...
    • 244 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 195 篇 安全科学与工程
    • 178 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 133 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,569 篇 理学
    • 825 篇 数学
    • 451 篇 生物学
    • 324 篇 物理学
    • 261 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 954 篇 管理学
    • 602 篇 管理科学与工程(可...
    • 391 篇 图书情报与档案管...
    • 302 篇 工商管理
  • 299 篇 法学
    • 188 篇 社会学
  • 266 篇 医学
    • 217 篇 临床医学
    • 198 篇 基础医学(可授医学...
    • 119 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 42 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 217 篇 accuracy
  • 192 篇 deep learning
  • 181 篇 feature extracti...
  • 179 篇 machine learning
  • 175 篇 security
  • 159 篇 internet of thin...
  • 152 篇 training
  • 139 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 93 篇 cryptography
  • 90 篇 protocols
  • 90 篇 artificial intel...
  • 82 篇 convolutional ne...
  • 79 篇 data models
  • 73 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 162 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 57 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 47 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 peng hao
  • 20 篇 sofotasios pasch...
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 jin hai
  • 17 篇 liu yang
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,449 篇 英文
  • 330 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5838 条 记 录,以下是81-90 订阅
排序:
Unveiling the Nexus: Exploring the Societal Implications of AI-Driven cybersecurity and Data Analysis  13
Unveiling the Nexus: Exploring the Societal Implications of ...
收藏 引用
13th International Conference on System Modeling and Advancement in Research Trends, SMART 2024
作者: Arif, Mohd Ahmad, Shahnawaz Nazim, Mohd Ahmad, Javed Onyarin, Ogala Justin Galgotias University Department of Computer Science Engineering and Technology Greater Noida India School of Computer Science Engineering and Technology Bennett University Greater Noida India Noida Institute of Engineering and Technology Department of Computer Science Greater Noida India University of Delta Pmb Cyber Security Department Delta State Agbor2090 Nigeria
AI when integrated with cybersecurity and data analysis forms a new field that will have great impact on the society. The present research focuses on the social consequences of integrating AI for cybersecurity and big... 详细信息
来源: 评论
Breast Cancer Detection using Domain-Adversarial Training (DANN) with Invariant Risk Minimization (IRM) Hybrid Approach  3
Breast Cancer Detection using Domain-Adversarial Training (D...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Akash, K.V. Daniel, Esther Seetha, S. Durga, S. Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Cmr Institute of Technology Department of Information Science & Engineering India Amrita Vishwa Vidyapeetham Tifac Core in Cyber Security Amrita School of Engineering India
The breast cancer detection performs a key function in the health care network. The precise and early detection of cancer in the breast could aid to save life of the sufferer. The traditional machine learning methods ... 详细信息
来源: 评论
Empowering Smart Homes with Fog Computing for IoT Connectivity
Empowering Smart Homes with Fog Computing for IoT Connectivi...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Mahdi, Ali Jafer Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq AI-Zahraa University for Women Department of Scientific Affairs Bangi43600 Malaysia College of Computer and Information Technology University of Anbar Computer Networking Systems Department Anbar Iraq Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Innovative grid technology leverages Information and Communication technology (ICT) to enhance energy efficiency and mitigate losses. This paper introduces a 'novel three-tier hierarchical framework for smart home... 详细信息
来源: 评论
The Future of Recruitment: Using Deep Learning to Build Intelligent Interview Bots  15
The Future of Recruitment: Using Deep Learning to Build Inte...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Ahmad, Shahnawaz Hussain, Shahadat Wasid, Mohammed Onyarin, Ogala Justin Arif, Mohd Ahmad, Javed Bennett University School of Computer Science Engineering and Technology Greater Noida India University of Delta Cyber Security Department PMB 2090 Delta State Agbor Nigeria Galgotias University Department of Computer Science Engineering and Technology Greater Noida India Sharda University Department of Computer Science Engineering and Technology Greater Noida India
The hiring process for IT positions is often complex and time-consuming, posing significant challenges for businesses seeking to maintain consistency and efficiency. Interview scheduling is complicated by manual effor... 详细信息
来源: 评论
Designing Biometric Automated Teller Machine: Opportunities and Challenges  4
Designing Biometric Automated Teller Machine: Opportunities ...
收藏 引用
4th IEEE International Conference on ICT in Business Industry and Government, ICTBIG 2024
作者: Bastos, João Baptista Muchinenyika, Simon Hlekisana Shava, Fungai Bhunu Nyambuya, Tanaka Mamvura Namibia University of Science and Technology Cyber Security Department Windhoek Namibia Namibia University of Science and Technology Software Engineering Department Windhoek Namibia
The increasing sophistication of fraud in the financial sector, particularly in Automated Teller Machine (ATM) transactions, demands advanced security measures to protect users and their accounts. Despite the widespre... 详细信息
来源: 评论
Vision-based UAV Detection in Complex Backgrounds and Rainy Conditions  2
Vision-based UAV Detection in Complex Backgrounds and Rainy ...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Singh, Pranita Gupta, Keshav Jain, Amit Kumar Vishakha Jain, Abhishek Jain, Arpit Roorkee Institute of Technology Department of Computer Science and Engineering Roorkee India Grd Institute of Management and Technology Department of Computer Science and Engineering Dehradun India Coer University Department of Cyber Security Roorkee India Uttaranchal University Department of Computer Science and Engineering Dehradun India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Vaddeswaram India
Studies aimed at detecting UAVs in real time using processer vision and deep learning are in their infancy. Although there are many possible advantages to using unmanned aerial vehicles (UAVs), some people are concern... 详细信息
来源: 评论
PriFace: a privacy-preserving face recognition framework under untrusted server
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第3期14卷 2967-2979页
作者: Zhao, Shan Zhang, Lefeng Xiong, Ping School of Information and Safety Engineering Zhongnan University of Economics and Law Wuhan China Center for Cyber Security and Privacy School of Computer Science University of Technology Sydney Sydney Australia
Alongside the rapid development of artificial intelligence and mobile Internet, face recognition has gradually become a mainstream intelligent terminal authentication technology that is widely applied in security, fin... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
Credit Card Fraud Detection Using ML Techniques  1
收藏 引用
International Conference on Recent Developments in cyber security, ReDCySec 2023
作者: Bonkoungou, Samiratou Roy, Nihar Ranjan Ako, Nomel Haymes Axel-Elie Junior Mishra, Alpna Department of Computer Science and Engineering Sharda University Noida India Center of Cyber Security and Cryptology Sharda University Noida India
With the increasing use of Internet, online banking transactions have also increased. Everyday more and more users are being added to the cyberspace, which has also attracted cybercriminals. These scammers use stolen ... 详细信息
来源: 评论
Secure Communication for MUM-T: A Blockchain and Lightweight Cryptography Framework  17
Secure Communication for MUM-T: A Blockchain and Lightweight...
收藏 引用
17th International Conference on security of Information and Networks, SIN 2024
作者: Yasar, Halimcan Bahtiyar, Serif Istanbul Technical University Cyber Security and Privacy Research Lab SPFLab Department of Computer Engineering Maslak Istanbul34469 Turkey
Manned-Unmanned Teaming (MUM-T) systems integrate manned aircraft and unmanned aerial vehicles (UAVs) to enhance mission effectiveness, allowing a single pilot to coordinate multiple UAVs for tasks like reconnaissance... 详细信息
来源: 评论