咨询与建议

限定检索结果

文献类型

  • 198 篇 会议
  • 178 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 379 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 252 篇 工学
    • 189 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 70 篇 信息与通信工程
    • 38 篇 电气工程
    • 33 篇 控制科学与工程
    • 26 篇 网络空间安全
    • 22 篇 电子科学与技术(可...
    • 12 篇 动力工程及工程热...
    • 12 篇 生物医学工程(可授...
    • 12 篇 生物工程
    • 9 篇 机械工程
    • 7 篇 仪器科学与技术
    • 7 篇 航空宇航科学与技...
    • 6 篇 安全科学与工程
    • 5 篇 化学工程与技术
    • 5 篇 环境科学与工程(可...
  • 105 篇 理学
    • 70 篇 数学
    • 25 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 15 篇 物理学
    • 14 篇 生物学
    • 6 篇 化学
  • 60 篇 管理学
    • 45 篇 管理科学与工程(可...
    • 18 篇 工商管理
    • 14 篇 图书情报与档案管...
  • 15 篇 法学
    • 10 篇 社会学
    • 6 篇 法学
  • 11 篇 医学
    • 8 篇 临床医学
    • 8 篇 公共卫生与预防医...
    • 6 篇 基础医学(可授医学...
  • 2 篇 经济学
  • 2 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 16 篇 cryptography
  • 13 篇 wireless sensor ...
  • 11 篇 security
  • 11 篇 accuracy
  • 10 篇 public key crypt...
  • 9 篇 authentication
  • 9 篇 computational mo...
  • 9 篇 feature extracti...
  • 8 篇 quality of servi...
  • 8 篇 monitoring
  • 8 篇 protocols
  • 8 篇 privacy
  • 7 篇 deep learning
  • 7 篇 computer securit...
  • 7 篇 servers
  • 7 篇 correlation
  • 7 篇 ip networks
  • 7 篇 provable securit...
  • 7 篇 training
  • 6 篇 standard model

机构

  • 17 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 12 篇 state key labora...
  • 10 篇 security and net...
  • 10 篇 department of ma...
  • 9 篇 department of co...
  • 7 篇 school of automa...
  • 6 篇 shandong provinc...
  • 6 篇 department of el...
  • 5 篇 key laboratory o...
  • 5 篇 department of co...
  • 5 篇 moe key laborato...
  • 5 篇 ministry of educ...
  • 5 篇 department of co...
  • 5 篇 school of comput...
  • 5 篇 care college of ...
  • 5 篇 key lab. of comp...
  • 5 篇 department of co...
  • 5 篇 saveetha institu...
  • 5 篇 saveetha institu...

作者

  • 23 篇 hu yupu
  • 11 篇 zhang leyou
  • 10 篇 wu qing
  • 9 篇 yang yang
  • 8 篇 yupu hu
  • 8 篇 hui li
  • 8 篇 zheng qinghua
  • 7 篇 meng deyu
  • 6 篇 ultes-nitsche ul...
  • 6 篇 irwin barry
  • 6 篇 kharchenko vyach...
  • 6 篇 li hui
  • 5 篇 zhang lei
  • 5 篇 xiaohong guan
  • 5 篇 prabhakar krishn...
  • 5 篇 qinghua zheng
  • 5 篇 krishnan prabhak...
  • 5 篇 liu ting
  • 5 篇 guan xiaohong
  • 5 篇 qinye yin

语言

  • 341 篇 英文
  • 20 篇 其他
  • 18 篇 中文
检索条件"机构=Department of Networks and Computer Security"
379 条 记 录,以下是1-10 订阅
排序:
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
LCEFL: A Lightweight Contribution Evaluation Approach for Federated Learning
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6643-6657页
作者: Guo, Jingjing Li, Jiaxing Liu, Zhiquan Xiong, Yupeng Ma, Yong Vasilakos, Athanasios V. Li, Xinghua Ma, Jianfeng Xidian University School of Cyber Engineering Xi’an710071 China Jinan University College of Cyber Security Guangzhou510632 China Jiangxi Normal University Department of Computer Science and Technology Nanchang330022 China Department of Networks and Communications College of Computer Science and Information Technology Dammam31441 Saudi Arabia Grimstad4879 Norway
The prerequisite for implementing incentive mechanisms and reliable participant selection schemes in federated learning is to obtain the contribution of each participant. Available evaluation methods for participant c... 详细信息
来源: 评论
Neural Network-Based State Estimation for Nonlinear Systems With Denial-of-Service Attack Under Try-Once-Discard Protocol
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第10期11卷 2182-2184页
作者: Xueli Wang Shangwei Zhao Ming Yang Xin Wang Xiaoming Wu the Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan 250014 Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250014China Department of Automation Shanghai Jiao Tong UniversityShanghai 200240China
Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)*** specifically,to reduce the communication burden... 详细信息
来源: 评论
A power consumption prediction algorithm based on job similarity judgment  8
A power consumption prediction algorithm based on job simila...
收藏 引用
8th International Conference on Intelligent Computing and Signal Processing, ICSP 2023
作者: Yang, Meihong Chen, Yongjie Wang, Jibin Guo, Ying Qin, Shuwei Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong Intelligent Public Security Joint Innovation Center Department of Public Security of Shandong Province Jinan China
Facing the high energy consumption problem of High Performance Computing(HPC) clusters, power consumption prediction of HPC clusters can help data centers improve energy efficiency and formulate energy-saving strategi... 详细信息
来源: 评论
Neuroadaptive Incentivization in Healthcare using Blockchain and IoT
收藏 引用
SN computer Science 2024年 第1期5卷 13页
作者: Kumar, Ajay Singh, Rajiv Ranjan Chatterjee, Indranath Sharma, Nikita Rana, Vaishali Department of Computer Science and Informatics Central University of Himachal Pradesh Himachal Pradesh Dharamshala India Department of Cyber Security and Networks Glasgow Caledonian University Glasgow Scotland United Kingdom Department of Computer Engineering Tongmyong University Busan South Korea School of Technology Woxsen University Hyderabad India
Financially incentivizing health-related behaviors can improve health record outcomes and reduce healthcare costs. Blockchain and IoT technologies can be used to develop safe and transparent incentive schemes in healt... 详细信息
来源: 评论
An Unmanned Aerial Vehicle as a Multi-State System  16
An Unmanned Aerial Vehicle as a Multi-State System
收藏 引用
16th IEEE International Conference on Advanced Trends in Radioelectronics, Telecommunications and computer Engineering, TCSET 2022
作者: Kliushnikov, Ihor Kharchenko, Vyacheslav Fesenko, Herman Department of Computer Systems Networks and Cyber Security National Aerospace University 'KhAI' Kharkiv Ukraine
An unmanned aerial vehicle (UAV) is considered as a multi-state system (MSS). The results of the decomposition of the UAV into degradable and non-degradable components are presented. The reliability models of UAV as M... 详细信息
来源: 评论
IoT-Enhanced Gesture Recognition System for Healthcare Applications
IoT-Enhanced Gesture Recognition System for Healthcare Appli...
收藏 引用
2024 International Telecommunications Conference, ITC-Egypt 2024
作者: Krithika, L.B. Nallakaruppan, M.K. Baza, Mohamed Badr, Mahmoud Deora, Yuvraj Singh School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India College of Charleston Deparment of Computer Science CharlestonSC United States Polytechnic Institute Department of Networks and Computer Security UticaNY12201 United States
In response to the prevalent language barriers in medical settings, this paper proposes an innovative solution leveraging gesture recognition technology. Through the integration of deep learning models and Internet of... 详细信息
来源: 评论
Extensive Study of Cloud Computing Technologies, Threats and Solutions Prospective
收藏 引用
computer Systems Science & Engineering 2022年 第4期41卷 225-240页
作者: Mwaffaq Abu-Alhaija Nidal M.Turab AbdelRahman Hamza Department of Networks and Information Security Faculty of Information TechnologyAl-Ahliyya Amman UniversityAmman19328Jordan Department of Computer Science Information TechnologyAl-Ahliyya Amman UniversityAmman19328Jordan
Infrastructure as a Service(IaaS)provides logical separation between data,network,applications and machines from the physical constrains of real *** is one of the basis of cloud ***,security issues are also gradually ... 详细信息
来源: 评论
A bytecode-based integrated detection and repair method for reentrancy vulnerabilities in smart contracts
IET Blockchain
收藏 引用
IET Blockchain 2024年 第3期4卷 235-251页
作者: Feng, Zijun Feng, Yuming He, Hui Zhang, Weizhe Zhang, Yu School of Cyberspace Science Harbin Institute of Technology Harbin China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Department of New Networks Peng Cheng Laboratory Shenzhen China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Shenzhen China
The reentrancy vulnerability in smart contracts has caused significant losses in the digital currency economy. Existing solutions for detecting and repairing this vulnerability are limited in scope and lack a comprehe... 详细信息
来源: 评论
Traffic Congestion Prediction Using Machine Learning: Amman City Case Study
Traffic Congestion Prediction Using Machine Learning: Amman ...
收藏 引用
2024 International Conference on Medical Imaging, Electronic Imaging, Information Technologies, and Sensors, MIEITS 2024
作者: Arabiat, Areen Hassan, Mohammad Al Momani, Omar Department of Communication and Computer Engineering Faculty of Engineering Al Ahliyya Amman University Amman19111 Jordan Department of Networks security Faculty of Information Technology The World Islamic Sciences and Educations University WISE Amman Jordan
Traffic congestion leads to wasted time, pollution, and increased fuel usage. Traffic congestion prediction has become a developing research topic in recent years, particularly in the field of machine learning (ML). T... 详细信息
来源: 评论