咨询与建议

限定检索结果

文献类型

  • 468 篇 会议
  • 259 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 734 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 455 篇 工学
    • 363 篇 计算机科学与技术...
    • 300 篇 软件工程
    • 127 篇 信息与通信工程
    • 108 篇 控制科学与工程
    • 64 篇 电气工程
    • 53 篇 网络空间安全
    • 49 篇 电子科学与技术(可...
    • 45 篇 生物工程
    • 37 篇 生物医学工程(可授...
    • 31 篇 安全科学与工程
    • 27 篇 机械工程
    • 24 篇 交通运输工程
    • 21 篇 光学工程
    • 21 篇 仪器科学与技术
    • 19 篇 动力工程及工程热...
  • 211 篇 理学
    • 104 篇 数学
    • 50 篇 生物学
    • 47 篇 物理学
    • 42 篇 统计学(可授理学、...
    • 32 篇 系统科学
    • 17 篇 化学
  • 142 篇 管理学
    • 104 篇 管理科学与工程(可...
    • 58 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 47 篇 医学
    • 37 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 29 篇 公共卫生与预防医...
  • 46 篇 法学
    • 27 篇 社会学
    • 22 篇 法学
  • 21 篇 经济学
    • 20 篇 应用经济学
  • 7 篇 农学
  • 6 篇 教育学
  • 4 篇 文学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 36 篇 accuracy
  • 34 篇 deep learning
  • 32 篇 internet of thin...
  • 30 篇 machine learning
  • 21 篇 feature extracti...
  • 21 篇 convolutional ne...
  • 20 篇 computational mo...
  • 20 篇 real-time system...
  • 19 篇 security
  • 17 篇 cybersecurity
  • 17 篇 artificial intel...
  • 17 篇 training
  • 15 篇 reliability
  • 15 篇 authentication
  • 14 篇 support vector m...
  • 14 篇 predictive model...
  • 13 篇 data models
  • 12 篇 software
  • 12 篇 cloud computing
  • 12 篇 privacy

机构

  • 15 篇 department of el...
  • 15 篇 department of co...
  • 14 篇 university of bu...
  • 14 篇 zarqa university...
  • 11 篇 department of cy...
  • 11 篇 zarqa university...
  • 9 篇 computer technic...
  • 8 篇 department of cy...
  • 8 篇 school of cybers...
  • 8 篇 the islamic univ...
  • 8 篇 department of co...
  • 7 篇 department of cy...
  • 7 篇 medical instrume...
  • 7 篇 medical instrume...
  • 7 篇 center for artif...
  • 6 篇 department of co...
  • 6 篇 cybersecurity ce...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 cybersecurity la...

作者

  • 15 篇 ghassan samara
  • 15 篇 samara ghassan
  • 12 篇 domingo-ferrer j...
  • 10 篇 ali elrashidi
  • 10 篇 danda b. rawat
  • 10 篇 elrashidi ali
  • 9 篇 sánchez david
  • 9 篇 lerga jonatan
  • 8 篇 mohammad shahada...
  • 8 篇 afaneh suha
  • 8 篇 tanjim mahmud
  • 8 篇 aljaidi mohammad
  • 8 篇 bashar mustafa
  • 8 篇 galeb basim
  • 8 篇 mohammad aljaidi
  • 8 篇 suha afaneh
  • 7 篇 karl andersson
  • 7 篇 obaidat mohammad...
  • 7 篇 al-hilali aqeel ...
  • 6 篇 mohammad rasmi a...

语言

  • 667 篇 英文
  • 64 篇 其他
  • 2 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cybersecurity and Computer Engineering"
734 条 记 录,以下是1-10 订阅
排序:
A Verifiably Secure and Lightweight Device-to-Device (D2D) Authentication Protocol for the Resource-Constrained IoT Networks
收藏 引用
IEEE Access 2025年 13卷 92982-92996页
作者: Alzahrani, Naif University of Jeddah College of Computer Science and Engineering Department of Cybersecurity Saudi Arabia
Due to the growth of Internet of Things (IoT) devices on networks with limited resources, developing a safe and effective authentication method for Device-to-Device (D2D) communication has become necessary. Convention... 详细信息
来源: 评论
Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2449-2463页
作者: Maher Alharby Cybersecurity Department College of Computer Science and EngineeringTaibah UniversityMedina42353Saudi Arabia
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various ***,the adoption of cloud storage poses significant risks to data secrecy and *** article presents an effec... 详细信息
来源: 评论
HybridEdge: A Lightweight and Secure Hybrid Communication Protocol for the Edge-Enabled Internet of Things
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3161-3178页
作者: Amjad Khan Rahim Khan Fahad Alturise Tamim Alkhalifah Department of Computer Science Abdul Wali Khan UniversityMardan23200Pakistan Department of Cybersecurity College of ComputerQassim UniversityBuraydahSaudi Arabia Department of Computer Engineering College of ComputerQassim UniversityBuraydahSaudi Arabia
The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These in... 详细信息
来源: 评论
Modeling and Comprehensive Review of Signaling Storms in 3GPP-Based Mobile Broadband Networks:Causes,Solutions,and Countermeasures
收藏 引用
computer Modeling in engineering & Sciences 2025年 第1期142卷 123-153页
作者: Muhammad Qasim Khan Fazal Malik Fahad Alturise Noor Rahman Department of Computer Science Iqra National UniversityPeshawar25000Pakistan Department of Cybersecurity College of ComputerQassim UniversityBuraydah52555Saudi Arabia Department of Computer Science and Engineering Al-Fayha CollegeAl Jubayl31961Saudi Arabia
Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband ***,they consume important and scarce net... 详细信息
来源: 评论
Enhanced Neutrosophic Set and Machine Learning Approach for Kidney Disease Prediction
收藏 引用
Neutrosophic Sets and Systems 2025年 80卷 465-477页
作者: Al-Doori, Humam M. Alkellezli, Tareef S. Abdelhafeez, Ahmed Eassaa, Mohamed Sawah, Mohamed S. El-Douh, Ahmed A. Cybersecurity Sciences Department College of Science Ashur University Baghdad Iraq Cybersecurity Engineering Department College of Engineering Ashur University Baghdad Iraq Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan Cybersecurity Technology Engineering Department College of Engineering Technology Ashur University Baghdad Iraq
Kidney disease (KD) is a gradually increasing global health concern. It is a chronic illness linked to higher rates of morbidity and mortality, a higher risk of cardiovascular disease and numerous other illnesses, and... 详细信息
来源: 评论
Fake News Detection Using Machine Learning and Deep Learning Methods
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 2079-2096页
作者: Ammar Saeed Eesa Al Solami Department of Computer Science Comsats University IslamabadWah Cantt47010Pakistan Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21959Saudi Arabia
The evolution of the internet and its accessibility in the twenty-first century has resulted in a tremendous increase in the use of social media *** social media sources contribute to the propagation of fake news that... 详细信息
来源: 评论
A Color Image Encryption Scheme Based on Singular Values and Chaos
收藏 引用
computer Modeling in engineering & Sciences 2023年 第10期137卷 965-999页
作者: Adnan Malik Muhammad Ali Faisal S.Alsubaei Nisar Ahmed Harish Kumar Electrical Engineering Department University of Engineering and TechnologyLahore54000Pakistan Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21959Saudi Arabia Computer Engineering Department University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ... 详细信息
来源: 评论
Blockchain-Enabled Medical Supply Chain Architecture for Rapid Response in Hajj  2nd
Blockchain-Enabled Medical Supply Chain Architecture for Rap...
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Albalwy, Faisal Department of Cybersecurity College of Computer Science and Engineering Taibah University Madinah Saudi Arabia
The annual Hajj pilgrimage presents a unique logistical challenge for healthcare institutions, with the need to efficiently manage medical supplies for millions of participants. Traditional methods often fall short in... 详细信息
来源: 评论
Adaptive Cyber Defense Technique Based on Multiagent Reinforcement Learning Strategies
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 2757-2771页
作者: Adel Alshamrani Abdullah Alshahrani Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia
The static nature of cyber defense systems gives attackers a sufficient amount of time to explore and further exploit the vulnerabilities of information technology *** this paper,we investigate a problem where multiag... 详细信息
来源: 评论
Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 3655-3683页
作者: Abdullah Alabdulatif Navod Neranjan Thilakarathne Mohamed Aashiq Department of Cybersecurity College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of ICT Faculty of TechnologyUniversity of ColomboColombo00700Sri Lanka Department of Computer Science and Engineering Faculty of EngineeringSouth Eastern University of Sri LankaOluvil32360Sri Lanka
The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber *** the myriad of potential attacks,D... 详细信息
来源: 评论