咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是901-910 订阅
排序:
Adaptive Multi-Link Data Allocation for LEO Satellite Networks
Adaptive Multi-Link Data Allocation for LEO Satellite Networ...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Zheng, Jinkai Luan, Tom H. Zhao, Jinwei Li, Guanjie Zhang, Yao Pan, Jianping Cheng, Nan Dongguan University of Technology School of Electrical Engineering and Intelligentization Guangdong China Xidian University School of Cyber Engineering Shaanxi China University of Victoria Department of Computer Science VictoriaBC Canada Northwestern Polytechnical University School of Computer Science Shaanxi China Xidian University School of Telecommunications Engineering Shaanxi China
The rapid development of Low Earth Orbit (LEO) satellite networks has provided ubiquitous Internet access to users around the world, especially in areas where there are no terrestrial networks. However, a dish can onl... 详细信息
来源: 评论
AI technology for the Practices of Societal Sustainable Development
AI Technology for the Practices of Societal Sustainable Deve...
收藏 引用
Computational Intelligence for security, Communication and Sustainable Development (CISCSD), International Conference on
作者: N Santhosh Kumar CH Rajendra Prasad K Pavan Kumar P Department of Computer Science and Engineering ANURAG Engineering College Kodad Telengana India Department of Computer Science and Engineering (Cyber Security) Institute of Aeronautical Engineering Hyderabad India Department of Computer Science and Engineering (AI & ML) Vardhaman College of Engineering Hyderabad India
The importance of incorporating AI technology into the engineering process is growing as technology gets more integrated. In this paper, we will explore artificial intelligence (AI) and its applications in sustainabil... 详细信息
来源: 评论
FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and cyberattack Discrimination
FeDiSa: A Semi-asynchronous Federated Learning Framework for...
收藏 引用
2023 IEEE INFOCOM Conference on computer Communications Workshops, INFOCOM WKSHPS 2023
作者: Husnoo, M.A. Anwar, A. Reda, H.T. Hosseinzadeh, N. Islam, S.N. Mahmood, A.N. Doss, R. School of IT Centre for Cyber Security Research and Innovation Deakin University Geelong Australia School of Engineering Centre for Smart Power and Energy Research Deakin University Geelong Australia Latrobe University Department of Computer Science & IT Melbourne Australia
With growing security and privacy concerns in the Smart Grid domain, intrusion detection on critical energy infrastructure has become a high priority in recent years. To remedy the challenges of privacy preservation a... 详细信息
来源: 评论
Low-Complexity PSCL Decoding of Polar Codes
收藏 引用
IEEE Transactions on Communications 2025年
作者: Yao, Xinyuanmeng Ma, Xiao Ningbo University of Technology School of Cyber Science and Engineering Ningbo315211 China Sun Yat-sen University School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China School of Computer Science and Engineering China Sun Yat-sen University Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China
Successive cancellation list (SCL) decoding enables polar codes and their generalizations to deliver satisfactory performance in finite-length scenarios but it comes with high latency and complexity. To reduce latency... 详细信息
来源: 评论
HybridBoost Ensemble Model for Enhanced Cervical Cancer Detection: A Multi-Stage Feature Optimization Approach
HybridBoost Ensemble Model for Enhanced Cervical Cancer Dete...
收藏 引用
Data Science, Agents & Artificial Intelligence (ICDSAAI), International Conference on
作者: Angel Mathew Julia Punitha Malar Dhas Devapriya Nirmal Varghese Babu Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India
Early cervical cancer diagnosis drastically improves treatment efficacy, requiring sensitive and effective models for diagnostics. This research offers a new HybridBoost Ensemble Model that integrates cutting-edge pre... 详细信息
来源: 评论
Hireblock: Hyperledger-based Human Resource Recruitment System
Hireblock: Hyperledger-based Human Resource Recruitment Syst...
收藏 引用
2022 International Conference on Electrical, computer, Communications and Mechatronics engineering, ICECCME 2022
作者: Shah, Kaushal Padhya, Mukti Doshi, Prachi Paliwal, Manish Kaur, Hargeet Pandit Deendayal Energy University Computer Engineering Department Gandhinagar India School of Cyber Security & Digital Forensics National Forensics Sciences University Gandhinagar India
Human Resource (HR) plays a vital role in the development of the organization. Existing solutions such as LinkedIn, Indeed, Moster J ***, Internshala, Angel List provides access to great list of candidates. The existi... 详细信息
来源: 评论
Enhance Capacity Region of Multi-Class IIoT Network by Applying Entanglement Assistance Protocol
IET Quantum Communication
收藏 引用
IET Quantum Communication 2025年 第1期6卷
作者: Subhi, Doaa Bacsardi, Laszlo Department of Networked Systems and Services Faculty of Electrical Engineering and Informatics Budapest University of Technology and Economics Budapest Hungary Department of Network Engineering and Cyber Security College of Engineering Al-Iraqia University Baghdad Iraq
In the Industrial Internet of Things (IIoT) context, heterogeneous IIoT nodes need diverse performance requirements, including throughput and quality of service (QoS). These IIoT nodes transmit data over a common shar... 详细信息
来源: 评论
Performance Framework for Virtual Machine Migration in Cloud Computing
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6289-6305页
作者: Tahir Alyas Taher M.Ghazal Badria Sulaiman Alfurhood Munir Ahmad Ossma Ali Thawabeh Khalid Alissa Qaiser Abbas Department of Computer Science Lahore Garrison UniversityLahore54000Pakistan School of Information Technology Skyline University CollegeUniversity City SharjahSharjah1797UAE Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebansaan Malaysia(UKM)Bangi43600SelangorMalaysia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversitySaudi Arabia School of Computer Science National College of Business Administration&EconomicsLahore54000Pakistan Dean of Student Affairs Skyline University CollegeUniversity City SharjahSharjah1797UAE Networks and Communications Department College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Faculty of Computer and Information Systems Islamic University Madinah Madinah42351Saudi Arabia
In the cloud environment,the transfer of data from one cloud server to another cloud server is called *** can be delivered in various ways,from one data centre to *** research aims to increase the migration performanc... 详细信息
来源: 评论
Assessing the Effects of Blackhole Attacks on MANET Reliability and security
Assessing the Effects of Blackhole Attacks on MANET Reliabil...
收藏 引用
Decision Aid Sciences and Application (DASA), International Conference on
作者: Amjed Abbas Ahmed Saif Aamer Fadhil Ali Hamza Najim Khattab M. Ali Alheeti Nurhizam Safie Mohd Satar Aisha Hassan Abdallah Hashim Faculty of Information Science and Technology Center for Cyber Security Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Imam AlKadhum College (IKC) Baghdad Iraq Department of Computer Technical Engineering Imam Al-Kadhum College (IKC) Baghdad Iraq Computer Networking Systems Department College of Computer and Information Technology University of Anbar Anbar Iraq Faculty of Information Science and Technology Center for Cyber Security Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Electrical and Computer Engineering Faculty of Engineering International Islamic University Malaysia Selangor Malaysia
Mobile Ad Hoc Networks (MANETs) are characterized by some important attributes, including infrastructure, mobile, and dynamic nature, which makes them have vast applications in different areas of computer networks. Th... 详细信息
来源: 评论
MAD-ANET:Malware Detection Using Attention-Based Deep Neural Networks
收藏 引用
computer Modeling in engineering & Sciences 2025年 第4期143卷 1009-1027页
作者: Waleed Khalid Al-Ghanem Emad Ul Haq Qazi Tanveer Zia Muhammad Hamza Faheem Muhammad Imran Iftikhar Ahmad Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11362Saudi Arabia Centre of Artificial Intelligence Naif Arab University for Security SciencesRiyadh14812Saudi Arabia School of Arts and Sciences The University of Notre DameSydneyNSW 2007Australia Center for Smart Analytics Institute of InnovationScience and SustainabilityFederation University AustraliaBerwickVIC 3806Australia Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia
In the current digital era,new technologies are becoming an essential part of our ***,the number ofmalicious software ormalware attacks is rapidly *** is no doubt,themajority ofmalware attacks can be detected by most ... 详细信息
来源: 评论