咨询与建议

限定检索结果

文献类型

  • 1,889 篇 会议
  • 1,224 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 3,155 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,042 篇 工学
    • 1,596 篇 计算机科学与技术...
    • 1,263 篇 软件工程
    • 603 篇 信息与通信工程
    • 311 篇 控制科学与工程
    • 253 篇 电气工程
    • 196 篇 生物工程
    • 183 篇 电子科学与技术(可...
    • 183 篇 网络空间安全
    • 125 篇 生物医学工程(可授...
    • 117 篇 安全科学与工程
    • 115 篇 机械工程
    • 85 篇 仪器科学与技术
    • 79 篇 光学工程
    • 79 篇 动力工程及工程热...
    • 66 篇 交通运输工程
  • 814 篇 理学
    • 458 篇 数学
    • 213 篇 生物学
    • 163 篇 物理学
    • 134 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 62 篇 化学
  • 544 篇 管理学
    • 349 篇 管理科学与工程(可...
    • 216 篇 图书情报与档案管...
    • 148 篇 工商管理
  • 143 篇 医学
    • 115 篇 临床医学
    • 110 篇 基础医学(可授医学...
    • 65 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 141 篇 法学
    • 91 篇 社会学
  • 60 篇 经济学
    • 59 篇 应用经济学
  • 29 篇 农学
  • 27 篇 军事学
  • 21 篇 教育学
  • 20 篇 文学
  • 12 篇 艺术学

主题

  • 103 篇 authentication
  • 102 篇 information secu...
  • 96 篇 security
  • 90 篇 internet of thin...
  • 90 篇 cryptography
  • 83 篇 deep learning
  • 83 篇 machine learning
  • 74 篇 accuracy
  • 67 篇 protocols
  • 63 篇 feature extracti...
  • 58 篇 privacy
  • 56 篇 training
  • 53 篇 computational mo...
  • 50 篇 blockchain
  • 50 篇 artificial intel...
  • 44 篇 encryption
  • 43 篇 predictive model...
  • 42 篇 computer science
  • 42 篇 computer securit...
  • 39 篇 data mining

机构

  • 79 篇 school of cyber ...
  • 68 篇 institute of inf...
  • 55 篇 state key labora...
  • 45 篇 department of co...
  • 42 篇 department of co...
  • 40 篇 department of co...
  • 39 篇 school of inform...
  • 31 篇 department of in...
  • 30 篇 department of co...
  • 27 篇 department of el...
  • 27 篇 security enginee...
  • 26 篇 school of inform...
  • 20 篇 department of co...
  • 20 篇 center for secur...
  • 19 篇 university of ch...
  • 17 篇 school of comput...
  • 17 篇 department of cy...
  • 16 篇 key laboratory o...
  • 16 篇 department of el...
  • 16 篇 center for cyber...

作者

  • 43 篇 choo kim-kwang r...
  • 34 篇 das ashok kumar
  • 30 篇 walid el-shafai
  • 25 篇 kim-kwang raymon...
  • 20 篇 naglaa f.soliman
  • 19 篇 susilo willy
  • 19 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 18 篇 ashok kumar das
  • 18 篇 chen kai
  • 17 篇 mohammad kamrul ...
  • 17 篇 cao xiaochun
  • 16 篇 guo yuanxiong
  • 16 篇 fathi e.abd el-s...
  • 16 篇 kai chen
  • 16 篇 el-shafai walid
  • 15 篇 mahmood khalid
  • 15 篇 gong yanmin
  • 15 篇 hasan mohammad k...
  • 15 篇 amjed abbas ahme...

语言

  • 2,550 篇 英文
  • 567 篇 其他
  • 40 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Department of Information Security and Computer Engineering"
3155 条 记 录,以下是41-50 订阅
排序:
A Privacy-Preserving Data Aggregation Protocol for Internet of Vehicles with Federated Learning
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-11页
作者: Xu, Zisang Zhang, Ruirui Liang, Wei Li, Kuan-Ching Gu, Ke Li, Xiong Huang, Jialun Computer and Communication Engineer Institute Changsha University of Science and Technology Changsha China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Department of Computer Science and Information Engineering Providence University Taichung Taiwan Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c... 详细信息
来源: 评论
Generative AI-Enabled Quantum Encryption Algorithm for Securing IoT-Based Healthcare Application Using Blockchain
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24541-24551页
作者: Prajapat, Sunil Kumar, Pankaj Das, Ashok Kumar Muhammad, Ghulam Central University of Himachal Pradesh Srinivasa Ramanujan Department of Mathematics Dharamshala176215 India International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11543 Saudi Arabia
The integration of Artificial Intelligence (AI) with the Internet of Things (IoT) has transformed numerous domains through the AI of Things (AIoT). Nonetheless, AIoT encounters issues related to energy usage and carbo... 详细信息
来源: 评论
Leveraging OpenStack-based Private Cloud for Intrusion Detection Using Deep Learning Techniques  1
Leveraging OpenStack-based Private Cloud for Intrusion Detec...
收藏 引用
1st International Conference for Women in Computing, InCoWoCo 2024
作者: Roshan, Rahul G. Salanke, Vishal S Nagasundari, S. Research Center for Information Security Forensics and Cyber Resilience PES University Department of Computer Science and Engineering Bangalore India
OpenStack is a cloud platform that offers infrastructure services, providing access to computing, storage, and network resources. However, due to its open-source nature, the cloud environment can be vulnerable to secu... 详细信息
来源: 评论
Phishing Classification Based on Text Content of an Email Body Using Transformers
Phishing Classification Based on Text Content of an Email Bo...
收藏 引用
International Conference on information security, Privacy, and Digital Forensics, 2022
作者: Somesha, M. Pais, Alwyn R. Department of Computer Science and Engineering Information Security Research Lab National Institute of Technology Karnataka Surathkal575025 India
Phishing attacks steal sensitive credentials using different techniques, tools, and some sophisticated methods. The techniques include content injection, information re-routing, social engineering, server hacking, soc... 详细信息
来源: 评论
Smart Water-Powered Renewable Energy System with IoT Integration
Smart Water-Powered Renewable Energy System with IoT Integra...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Ibraheem, Ahmed Salman Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq Department of Computer Technical Engineering Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
An advanced hybrid renewable energy collecting and storage system prototype that utilizes water flow as its primary power source. Additionally, the system incorporates an energy monitoring system based on the Internet... 详细信息
来源: 评论
Improving VANET Localization Performance with Data Verification: Challenges and Solutions
Improving VANET Localization Performance with Data Verificat...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Kadhim, Aqeel Kamil Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisa Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
In VANETs, the important and effective applications of vehicle localization include safety and communication applications. Thus, it is difficult to get very accurate localization in the dynamic and often very fluctuat... 详细信息
来源: 评论
Proposed 3D chaos-based medical image cryptosystem for secure cloud-IoMT eHealth communication services
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第1期15卷 1-28页
作者: El-Shafai, Walid Khallaf, Fatma El-Rabaie, El-Sayed M. El-Samie, Fathi E. Abd Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Electrical Engineering Faculty of Engineering Ahram Canadian University Giza 6th October City Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh84428 Saudi Arabia
Medical image encryption is a mandatory process in various healthcare, Internet of Medical Things (IoMT) and cloud services. This paper provides a robust cryptosystem based on a 3D chaotic map for the medical image en... 详细信息
来源: 评论
Video and image quality improvement using an enhanced optimized dehazing technique
收藏 引用
Multimedia Tools and Applications 2024年 1-19页
作者: Ayoub, Abeer El-Shafai, Walid El-Samie, Fathi E. Abd Hamad, Ehab K. I. EL-Rabaie, El-Sayed M. Electrical Engineering Department Faculty of Engineering Aswan University Aswan81542 Egypt Department of Electronics and Electrical Communication Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
The detrimental effects of atmospheric haze frequently plague outdoor imagery. This phenomenon arises from the scattering of light by minute particles within the ambient environment surrounding the scene to be im... 详细信息
来源: 评论
A Review of Key Elements for Underwater Wireless Sensor Networks
A Review of Key Elements for Underwater Wireless Sensor Netw...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Al-Dulaimi, Aymen Mohammed Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Aliesawi, Salah A. Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq
Underwater Wireless Sensor Networks (UWSNs) are emerging and have huge prospects since they have various applications in oceanography, environmental monitoring, and underwater communication. These networks contain low... 详细信息
来源: 评论
Enhancing Organizational Performance: Synergy of Cyber-Physical Systems, Cloud Services, and Crowdsensing
收藏 引用
International Journal of Crowd Science 2025年 第1期9卷 44-55页
作者: Al-Qerem, Ahmad Ali, Ali Mohd Nabot, Ahmad Jebreen, Issam Alauthman, Mohammad Alangari, Someah Aburub, Faisal Aldweesh, Amjad Computer Science Department Faculty of Information Technology Zarqa University Zarqa13110 Jordan Communications and Computer Engineering Department Faculty of Engineering Al-Ahliyya Amman University Amman19328 Jordan Department of Information Security University of Petra Amman11196 Jordan Department of Computer Science College of Science and Humanities Dawadmi Shaqra University Shaqra11911 Saudi Arabia Department of Business Intelligence and Data Analytics University of Petra Amman11196 Jordan College of Computing and Information Technology Shaqra University Shaqra11911 Saudi Arabia
In the contemporary business landscape, software has evolved into a strategic asset crucial for organizations seeking sustainable competitive advantage. The imperative of ensuring software quality becomes evident as l... 详细信息
来源: 评论